City: Lagos
Region: Lagos
Country: Nigeria
Internet Service Provider: University of Lagos
Hostname: unknown
Organization: unknown
Usage Type: University/College/School
| Type | Details | Datetime |
|---|---|---|
| attackspam | Nov 15 10:42:57 hosting sshd[9175]: Invalid user asdfg12345^ from 196.45.48.59 port 43112 ... |
2019-11-15 19:43:39 |
| attack | Nov 5 10:02:35 vps691689 sshd[11232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Nov 5 10:02:37 vps691689 sshd[11232]: Failed password for invalid user WAIWAICHUANQI from 196.45.48.59 port 60580 ssh2 ... |
2019-11-05 17:41:58 |
| attackbotsspam | Oct 17 07:52:04 pornomens sshd\[14181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 user=root Oct 17 07:52:06 pornomens sshd\[14181\]: Failed password for root from 196.45.48.59 port 48570 ssh2 Oct 17 07:56:38 pornomens sshd\[14183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 user=root ... |
2019-10-17 13:57:14 |
| attack | Oct 16 13:20:35 MK-Soft-VM3 sshd[30573]: Failed password for root from 196.45.48.59 port 52616 ssh2 ... |
2019-10-16 19:35:32 |
| attackspambots | Oct 13 22:42:01 dedicated sshd[307]: Invalid user zxcasdqwe123 from 196.45.48.59 port 41072 |
2019-10-14 06:15:45 |
| attack | Oct 13 08:13:49 vps647732 sshd[17238]: Failed password for root from 196.45.48.59 port 50826 ssh2 ... |
2019-10-13 14:34:56 |
| attackbots | Oct 12 01:13:54 php1 sshd\[10304\]: Invalid user 123Tan from 196.45.48.59 Oct 12 01:13:54 php1 sshd\[10304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Oct 12 01:13:56 php1 sshd\[10304\]: Failed password for invalid user 123Tan from 196.45.48.59 port 49650 ssh2 Oct 12 01:18:35 php1 sshd\[10684\]: Invalid user pass1@3\$ from 196.45.48.59 Oct 12 01:18:35 php1 sshd\[10684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 |
2019-10-12 21:12:51 |
| attackspam | Oct 5 22:41:43 MK-Soft-VM7 sshd[9127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Oct 5 22:41:44 MK-Soft-VM7 sshd[9127]: Failed password for invalid user Digital@123 from 196.45.48.59 port 51704 ssh2 ... |
2019-10-06 06:01:19 |
| attack | Oct 4 04:13:00 php1 sshd\[27565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ir.unilag.edu.ng user=root Oct 4 04:13:02 php1 sshd\[27565\]: Failed password for root from 196.45.48.59 port 36924 ssh2 Oct 4 04:17:52 php1 sshd\[28218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ir.unilag.edu.ng user=root Oct 4 04:17:54 php1 sshd\[28218\]: Failed password for root from 196.45.48.59 port 49354 ssh2 Oct 4 04:22:48 php1 sshd\[28788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ir.unilag.edu.ng user=root |
2019-10-04 22:32:05 |
| attackspambots | Aug 31 21:42:36 web9 sshd\[6738\]: Invalid user malcom from 196.45.48.59 Aug 31 21:42:36 web9 sshd\[6738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Aug 31 21:42:38 web9 sshd\[6738\]: Failed password for invalid user malcom from 196.45.48.59 port 37732 ssh2 Aug 31 21:47:24 web9 sshd\[7724\]: Invalid user class2004 from 196.45.48.59 Aug 31 21:47:24 web9 sshd\[7724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 |
2019-09-01 20:34:21 |
| attackspambots | 2019-08-27T21:10:27.258634abusebot-2.cloudsearch.cf sshd\[22546\]: Invalid user fd from 196.45.48.59 port 35598 |
2019-08-28 05:11:57 |
| attackbotsspam | Aug 22 00:43:04 plex sshd[4684]: Failed password for invalid user nareng from 196.45.48.59 port 45044 ssh2 Aug 22 00:43:02 plex sshd[4684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Aug 22 00:43:02 plex sshd[4684]: Invalid user nareng from 196.45.48.59 port 45044 Aug 22 00:43:04 plex sshd[4684]: Failed password for invalid user nareng from 196.45.48.59 port 45044 ssh2 Aug 22 00:47:45 plex sshd[4797]: Invalid user postgres from 196.45.48.59 port 34252 |
2019-08-22 07:07:53 |
| attackbotsspam | Aug 11 10:11:56 Ubuntu-1404-trusty-64-minimal sshd\[26026\]: Invalid user bs from 196.45.48.59 Aug 11 10:11:56 Ubuntu-1404-trusty-64-minimal sshd\[26026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Aug 11 10:11:58 Ubuntu-1404-trusty-64-minimal sshd\[26026\]: Failed password for invalid user bs from 196.45.48.59 port 52566 ssh2 Aug 11 10:23:09 Ubuntu-1404-trusty-64-minimal sshd\[31614\]: Invalid user sic from 196.45.48.59 Aug 11 10:23:09 Ubuntu-1404-trusty-64-minimal sshd\[31614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 |
2019-08-11 18:07:23 |
| attackspambots | Aug 10 19:15:12 server01 sshd\[6107\]: Invalid user javier from 196.45.48.59 Aug 10 19:15:12 server01 sshd\[6107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Aug 10 19:15:14 server01 sshd\[6107\]: Failed password for invalid user javier from 196.45.48.59 port 37098 ssh2 ... |
2019-08-11 02:11:07 |
| attackspambots | Aug 9 22:52:50 dallas01 sshd[17817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Aug 9 22:52:53 dallas01 sshd[17817]: Failed password for invalid user amanda from 196.45.48.59 port 33232 ssh2 Aug 9 23:02:38 dallas01 sshd[20171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 |
2019-08-10 19:58:02 |
| attackbotsspam | Invalid user sybase from 196.45.48.59 port 39968 |
2019-08-01 01:52:55 |
| attackspambots | Jul 14 10:57:11 lnxded63 sshd[27716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Jul 14 10:57:11 lnxded63 sshd[27716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 |
2019-07-14 17:21:09 |
| attackbotsspam | Jul 5 13:59:28 SilenceServices sshd[24211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59 Jul 5 13:59:31 SilenceServices sshd[24211]: Failed password for invalid user mia from 196.45.48.59 port 38738 ssh2 Jul 5 14:02:05 SilenceServices sshd[25451]: Failed password for root from 196.45.48.59 port 36042 ssh2 |
2019-07-05 20:05:26 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 196.45.48.48 | attack | C1,WP GET /suche/wp-login.php |
2020-01-04 00:51:35 |
| 196.45.48.48 | attackspambots | Automatic report - Banned IP Access |
2019-12-30 17:14:38 |
| 196.45.48.48 | attackspambots | Automatic report - XMLRPC Attack |
2019-11-26 04:16:39 |
| 196.45.48.48 | attack | Automatic report - XMLRPC Attack |
2019-11-03 05:53:29 |
| 196.45.48.48 | attackbots | Nov 1 10:17:06 lnxmysql61 sshd[27125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.48 Nov 1 10:17:08 lnxmysql61 sshd[27125]: Failed password for invalid user admin from 196.45.48.48 port 60066 ssh2 Nov 1 10:17:10 lnxmysql61 sshd[27125]: Failed password for invalid user admin from 196.45.48.48 port 60066 ssh2 Nov 1 10:17:12 lnxmysql61 sshd[27125]: Failed password for invalid user admin from 196.45.48.48 port 60066 ssh2 |
2019-11-01 17:43:02 |
| 196.45.48.48 | attackspambots | fail2ban honeypot |
2019-07-02 23:16:39 |
| 196.45.48.48 | attackbotsspam | 20 attempts against mh-ssh on leaf.magehost.pro |
2019-07-02 03:26:48 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.45.48.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37365
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.45.48.59. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019070500 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 05 20:05:17 CST 2019
;; MSG SIZE rcvd: 116
59.48.45.196.in-addr.arpa domain name pointer ir.unilag.edu.ng.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
59.48.45.196.in-addr.arpa name = ir.unilag.edu.ng.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 114.26.196.112 | attackbots | Attempted connection to port 23. |
2020-05-26 07:12:30 |
| 112.85.42.172 | attackspambots | May 26 01:35:38 * sshd[9335]: Failed password for root from 112.85.42.172 port 47457 ssh2 May 26 01:35:51 * sshd[9335]: Failed password for root from 112.85.42.172 port 47457 ssh2 May 26 01:35:51 * sshd[9335]: error: maximum authentication attempts exceeded for root from 112.85.42.172 port 47457 ssh2 [preauth] |
2020-05-26 07:39:46 |
| 121.162.235.44 | attackbotsspam | Invalid user dkk from 121.162.235.44 port 51288 |
2020-05-26 07:06:03 |
| 190.85.145.162 | attackspambots | May 25 15:09:28 mockhub sshd[5086]: Failed password for root from 190.85.145.162 port 43190 ssh2 ... |
2020-05-26 07:07:35 |
| 104.248.29.200 | attack | Automatic report - XMLRPC Attack |
2020-05-26 07:29:32 |
| 114.84.48.55 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-05-26 07:34:23 |
| 36.133.38.134 | attackspambots | May 25 05:21:41: Invalid user serwis from 36.133.38.134 port 54254 |
2020-05-26 07:11:09 |
| 222.186.31.83 | attackspam | May 25 20:04:25 firewall sshd[5934]: Failed password for root from 222.186.31.83 port 51776 ssh2 May 25 20:04:26 firewall sshd[5934]: Failed password for root from 222.186.31.83 port 51776 ssh2 May 25 20:04:29 firewall sshd[5934]: Failed password for root from 222.186.31.83 port 51776 ssh2 ... |
2020-05-26 07:05:12 |
| 219.136.243.47 | attackspam | May 25 23:19:29 * sshd[27161]: Failed password for root from 219.136.243.47 port 38952 ssh2 |
2020-05-26 07:17:33 |
| 222.186.30.218 | attackspambots | 25.05.2020 23:04:26 SSH access blocked by firewall |
2020-05-26 07:09:04 |
| 217.59.215.82 | attack | Honeypot attack, port: 445, PTR: host82-215-static.59-217-b.business.telecomitalia.it. |
2020-05-26 07:31:14 |
| 150.109.99.68 | attackspam | May 25 19:23:16 NPSTNNYC01T sshd[26134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.99.68 May 25 19:23:19 NPSTNNYC01T sshd[26134]: Failed password for invalid user jet from 150.109.99.68 port 58498 ssh2 May 25 19:29:06 NPSTNNYC01T sshd[26686]: Failed password for root from 150.109.99.68 port 37426 ssh2 ... |
2020-05-26 07:36:44 |
| 203.195.211.173 | attackbots | 2020-05-25T23:24:27.981410shield sshd\[11595\]: Invalid user gasiago from 203.195.211.173 port 46440 2020-05-25T23:24:27.985049shield sshd\[11595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.211.173 2020-05-25T23:24:29.887894shield sshd\[11595\]: Failed password for invalid user gasiago from 203.195.211.173 port 46440 ssh2 2020-05-25T23:28:49.830188shield sshd\[12767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.211.173 user=root 2020-05-25T23:28:51.702762shield sshd\[12767\]: Failed password for root from 203.195.211.173 port 40832 ssh2 |
2020-05-26 07:42:15 |
| 94.191.14.213 | attackbotsspam | May 25 17:37:31 Tower sshd[39223]: Connection from 94.191.14.213 port 47822 on 192.168.10.220 port 22 rdomain "" May 25 17:37:35 Tower sshd[39223]: Failed password for root from 94.191.14.213 port 47822 ssh2 May 25 17:37:35 Tower sshd[39223]: Received disconnect from 94.191.14.213 port 47822:11: Bye Bye [preauth] May 25 17:37:35 Tower sshd[39223]: Disconnected from authenticating user root 94.191.14.213 port 47822 [preauth] |
2020-05-26 07:21:18 |
| 46.119.83.6 | attack | 20/5/25@16:17:37: FAIL: Alarm-Network address from=46.119.83.6 20/5/25@16:17:38: FAIL: Alarm-Network address from=46.119.83.6 ... |
2020-05-26 07:13:04 |