City: unknown
Region: unknown
Country: Lithuania
Internet Service Provider: Tele Asia Limited
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackspam | Rude login attack (4 tries in 1d) |
2020-01-04 02:13:10 |
IP | Type | Details | Datetime |
---|---|---|---|
45.125.66.22 | attackbots | (ftpd) Failed FTP login from 45.125.66.22 (LT/Republic of Lithuania/-): 5 in the last 3600 secs; Ports: 20,21; Direction: in; Trigger: LF_FTPD; Logs: Oct 14 01:10:24 hostingremote proftpd[702140]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading (Login failed): Incorrect password Oct 14 01:10:25 hostingremote proftpd[702141]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21 Oct 14 01:10:25 hostingremote proftpd[702142]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER admin@akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21 Oct 14 01:10:25 hostingremote proftpd[702144]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading@akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21 Oct 14 01:10:25 hostingremote proftpd[702145]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttradi: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21 |
2020-10-14 03:56:58 |
45.125.66.22 | attackspambots | proto=tcp . spt=61669 . dpt=110 . src=45.125.66.22 . dst=xx.xx.4.1 . Found on Github Combined on 3 lists (58) |
2020-10-13 19:17:53 |
45.125.66.21 | attackspambots | Tried our host z. |
2020-09-28 02:06:03 |
45.125.66.21 | attackbots | Tried our host z. |
2020-09-27 18:10:29 |
45.125.66.137 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018 |
2020-09-26 08:00:09 |
45.125.66.137 | attackbots | lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018 |
2020-09-26 01:15:10 |
45.125.66.137 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018 |
2020-09-25 16:52:35 |
45.125.66.26 | attackbotsspam | Firewall Dropped Connection |
2020-08-26 02:29:25 |
45.125.66.22 | attackbots | (ftpd) Failed FTP login from 45.125.66.22 (LT/Republic of Lithuania/-): 10 in the last 3600 secs |
2020-08-13 19:49:57 |
45.125.66.205 | attackspam | [2020-06-17 08:05:13] NOTICE[1273][C-00001dce] chan_sip.c: Call from '' (45.125.66.205:5070) to extension '442037697412' rejected because extension not found in context 'public'. [2020-06-17 08:05:13] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-17T08:05:13.562-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="442037697412",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.205/5070",ACLName="no_extension_match" [2020-06-17 08:05:13] NOTICE[1273][C-00001dcf] chan_sip.c: Call from '' (45.125.66.205:5070) to extension '00442037697412' rejected because extension not found in context 'public'. [2020-06-17 08:05:13] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-17T08:05:13.905-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00442037697412",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.2 ... |
2020-06-17 20:44:21 |
45.125.66.204 | attackbotsspam | [portscan] tcp/81 [alter-web/web-proxy] *(RWIN=1024)(04301449) |
2020-05-01 01:46:02 |
45.125.66.168 | attack | Rude login attack (7 tries in 1d) |
2020-02-16 08:11:35 |
45.125.66.212 | attack | Rude login attack (6 tries in 1d) |
2020-02-16 08:07:45 |
45.125.66.68 | attack | Rude login attack (4 tries in 1d) |
2020-02-16 08:01:43 |
45.125.66.231 | attackbots | Rude login attack (4 tries in 1d) |
2020-02-16 07:59:20 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.125.66.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.125.66.154. IN A
;; AUTHORITY SECTION:
. 348 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020010300 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 04 02:13:06 CST 2020
;; MSG SIZE rcvd: 117
Host 154.66.125.45.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 154.66.125.45.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
89.64.13.83 | attack | Autoban 89.64.13.83 AUTH/CONNECT |
2019-08-05 13:48:24 |
38.64.178.194 | attackbots | proto=tcp . spt=33306 . dpt=25 . (listed on Blocklist de Aug 04) (702) |
2019-08-05 14:18:14 |
89.152.228.249 | attackspambots | Autoban 89.152.228.249 AUTH/CONNECT |
2019-08-05 14:17:53 |
89.157.18.233 | attackspambots | Autoban 89.157.18.233 AUTH/CONNECT |
2019-08-05 14:12:35 |
115.78.1.103 | attack | 2019-08-05T04:08:51.046708abusebot-6.cloudsearch.cf sshd\[10304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.1.103 user=root |
2019-08-05 13:26:15 |
106.111.95.132 | attackspam | Aug 4 21:05:41 wildwolf ssh-honeypotd[26164]: Failed password for pi from 106.111.95.132 port 53526 ssh2 (target: 158.69.100.150:22, password: raspberry) Aug 4 21:05:44 wildwolf ssh-honeypotd[26164]: Failed password for pi from 106.111.95.132 port 54242 ssh2 (target: 158.69.100.150:22, password: 12345) Aug 4 21:05:48 wildwolf ssh-honeypotd[26164]: Failed password for pi from 106.111.95.132 port 54992 ssh2 (target: 158.69.100.150:22, password: 123321) Aug 4 21:05:50 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 106.111.95.132 port 55698 ssh2 (target: 158.69.100.150:22, password: ubnt) Aug 4 21:05:53 wildwolf ssh-honeypotd[26164]: Failed password for openhabian from 106.111.95.132 port 56337 ssh2 (target: 158.69.100.150:22, password: openhabian) Aug 4 21:05:56 wildwolf ssh-honeypotd[26164]: Failed password for netscreen from 106.111.95.132 port 57004 ssh2 (target: 158.69.100.150:22, password: netscreen) Aug 4 21:06:02 wildwolf ssh-honeypotd[26164]: Fa........ ------------------------------ |
2019-08-05 14:26:06 |
89.64.26.168 | attack | Autoban 89.64.26.168 AUTH/CONNECT |
2019-08-05 13:46:42 |
89.210.157.52 | attackbots | Autoban 89.210.157.52 AUTH/CONNECT |
2019-08-05 14:03:45 |
172.68.46.212 | attackbotsspam | Wordpress XMLRPC attack |
2019-08-05 14:14:55 |
77.40.2.185 | attackspam | [Aegis] @ 2019-08-04 22:14:21 0100 -> Attempt to use mail server as relay (550: Requested action not taken). |
2019-08-05 13:42:55 |
90.148.230.114 | attackspam | Autoban 90.148.230.114 AUTH/CONNECT |
2019-08-05 13:39:02 |
73.8.91.33 | attackspam | Aug 4 21:26:17 MK-Soft-VM4 sshd[11021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.8.91.33 Aug 4 21:26:19 MK-Soft-VM4 sshd[11021]: Failed password for invalid user agustina from 73.8.91.33 port 51034 ssh2 ... |
2019-08-05 13:27:14 |
197.82.207.21 | attack | Automatic report - Port Scan Attack |
2019-08-05 13:56:25 |
89.163.152.184 | attackbotsspam | Autoban 89.163.152.184 AUTH/CONNECT |
2019-08-05 14:09:01 |
89.109.80.244 | attackspam | Autoban 89.109.80.244 AUTH/CONNECT |
2019-08-05 14:27:10 |