City: unknown
Region: unknown
Country: Lithuania
Internet Service Provider: Tele Asia Limited
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackspam | Rude login attack (4 tries in 1d) |
2020-01-04 02:22:21 |
IP | Type | Details | Datetime |
---|---|---|---|
45.125.66.22 | attackbots | (ftpd) Failed FTP login from 45.125.66.22 (LT/Republic of Lithuania/-): 5 in the last 3600 secs; Ports: 20,21; Direction: in; Trigger: LF_FTPD; Logs: Oct 14 01:10:24 hostingremote proftpd[702140]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading (Login failed): Incorrect password Oct 14 01:10:25 hostingremote proftpd[702141]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21 Oct 14 01:10:25 hostingremote proftpd[702142]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER admin@akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21 Oct 14 01:10:25 hostingremote proftpd[702144]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading@akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21 Oct 14 01:10:25 hostingremote proftpd[702145]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttradi: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21 |
2020-10-14 03:56:58 |
45.125.66.22 | attackspambots | proto=tcp . spt=61669 . dpt=110 . src=45.125.66.22 . dst=xx.xx.4.1 . Found on Github Combined on 3 lists (58) |
2020-10-13 19:17:53 |
45.125.66.21 | attackspambots | Tried our host z. |
2020-09-28 02:06:03 |
45.125.66.21 | attackbots | Tried our host z. |
2020-09-27 18:10:29 |
45.125.66.137 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018 |
2020-09-26 08:00:09 |
45.125.66.137 | attackbots | lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018 |
2020-09-26 01:15:10 |
45.125.66.137 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018 |
2020-09-25 16:52:35 |
45.125.66.26 | attackbotsspam | Firewall Dropped Connection |
2020-08-26 02:29:25 |
45.125.66.22 | attackbots | (ftpd) Failed FTP login from 45.125.66.22 (LT/Republic of Lithuania/-): 10 in the last 3600 secs |
2020-08-13 19:49:57 |
45.125.66.205 | attackspam | [2020-06-17 08:05:13] NOTICE[1273][C-00001dce] chan_sip.c: Call from '' (45.125.66.205:5070) to extension '442037697412' rejected because extension not found in context 'public'. [2020-06-17 08:05:13] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-17T08:05:13.562-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="442037697412",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.205/5070",ACLName="no_extension_match" [2020-06-17 08:05:13] NOTICE[1273][C-00001dcf] chan_sip.c: Call from '' (45.125.66.205:5070) to extension '00442037697412' rejected because extension not found in context 'public'. [2020-06-17 08:05:13] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-17T08:05:13.905-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00442037697412",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.2 ... |
2020-06-17 20:44:21 |
45.125.66.204 | attackbotsspam | [portscan] tcp/81 [alter-web/web-proxy] *(RWIN=1024)(04301449) |
2020-05-01 01:46:02 |
45.125.66.168 | attack | Rude login attack (7 tries in 1d) |
2020-02-16 08:11:35 |
45.125.66.212 | attack | Rude login attack (6 tries in 1d) |
2020-02-16 08:07:45 |
45.125.66.68 | attack | Rude login attack (4 tries in 1d) |
2020-02-16 08:01:43 |
45.125.66.231 | attackbots | Rude login attack (4 tries in 1d) |
2020-02-16 07:59:20 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.125.66.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.125.66.157. IN A
;; AUTHORITY SECTION:
. 283 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020010300 1800 900 604800 86400
;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 04 02:22:17 CST 2020
;; MSG SIZE rcvd: 117
Host 157.66.125.45.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 157.66.125.45.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
123.207.188.95 | attack | Automatic report - Banned IP Access |
2019-10-30 07:48:20 |
222.186.169.192 | attackbots | 2019-10-30T00:51:36.4554511240 sshd\[6960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root 2019-10-30T00:51:38.6841801240 sshd\[6960\]: Failed password for root from 222.186.169.192 port 34350 ssh2 2019-10-30T00:51:41.8572931240 sshd\[6960\]: Failed password for root from 222.186.169.192 port 34350 ssh2 ... |
2019-10-30 07:52:29 |
103.101.52.48 | attack | Invalid user ubuntu from 103.101.52.48 port 50436 |
2019-10-30 07:50:01 |
45.81.233.184 | attackspambots | Oct 30 06:56:52 server sshd\[12823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.81.233.184 user=root Oct 30 06:56:54 server sshd\[12823\]: Failed password for root from 45.81.233.184 port 43666 ssh2 Oct 30 06:56:54 server sshd\[12824\]: Received disconnect from 45.81.233.184: 3: com.jcraft.jsch.JSchException: Auth fail Oct 30 06:56:57 server sshd\[12827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.81.233.184 user=root Oct 30 06:56:59 server sshd\[12827\]: Failed password for root from 45.81.233.184 port 44058 ssh2 ... |
2019-10-30 12:05:57 |
132.232.47.41 | attackbots | 2019-10-30T03:50:13.737880shield sshd\[10016\]: Invalid user sa from 132.232.47.41 port 37570 2019-10-30T03:50:13.742226shield sshd\[10016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.47.41 2019-10-30T03:50:15.778532shield sshd\[10016\]: Failed password for invalid user sa from 132.232.47.41 port 37570 ssh2 2019-10-30T03:57:03.252821shield sshd\[10659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.47.41 user=root 2019-10-30T03:57:05.575105shield sshd\[10659\]: Failed password for root from 132.232.47.41 port 54246 ssh2 |
2019-10-30 12:02:45 |
103.239.55.121 | attackspambots | postfix (unknown user, SPF fail or relay access denied) |
2019-10-30 12:14:12 |
177.4.197.132 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/177.4.197.132/ BR - 1H : (397) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN8167 IP : 177.4.197.132 CIDR : 177.4.192.0/18 PREFIX COUNT : 299 UNIQUE IP COUNT : 4493824 ATTACKS DETECTED ASN8167 : 1H - 2 3H - 3 6H - 7 12H - 11 24H - 21 DateTime : 2019-10-29 21:00:03 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-30 07:48:59 |
91.191.223.229 | attackbots | Invalid user ispapps from 91.191.223.229 port 36144 |
2019-10-30 07:45:20 |
95.47.200.13 | attackbotsspam | 2019-10-29T15:56:12.635545WS-Zach sshd[137806]: Invalid user administrator from 95.47.200.13 port 37168 2019-10-29T15:56:12.639078WS-Zach sshd[137806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.47.200.13 2019-10-29T15:56:12.635545WS-Zach sshd[137806]: Invalid user administrator from 95.47.200.13 port 37168 2019-10-29T15:56:14.887505WS-Zach sshd[137806]: Failed password for invalid user administrator from 95.47.200.13 port 37168 ssh2 2019-10-29T16:00:03.094926WS-Zach sshd[138245]: User root from 95.47.200.13 not allowed because none of user's groups are listed in AllowGroups ... |
2019-10-30 07:50:19 |
91.222.19.225 | attackbotsspam | Oct 29 23:37:54 dedicated sshd[27465]: Invalid user yi9527zui, from 91.222.19.225 port 52460 |
2019-10-30 07:46:35 |
88.178.98.204 | attack | Oct 29 19:59:51 sshgateway sshd\[2954\]: Invalid user admin from 88.178.98.204 Oct 29 19:59:51 sshgateway sshd\[2954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.178.98.204 Oct 29 19:59:53 sshgateway sshd\[2954\]: Failed password for invalid user admin from 88.178.98.204 port 59844 ssh2 |
2019-10-30 08:00:51 |
58.76.223.206 | attackbotsspam | Oct 29 23:52:23 ny01 sshd[1116]: Failed password for root from 58.76.223.206 port 50195 ssh2 Oct 29 23:56:48 ny01 sshd[2230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.76.223.206 Oct 29 23:56:50 ny01 sshd[2230]: Failed password for invalid user luca from 58.76.223.206 port 40665 ssh2 |
2019-10-30 12:11:37 |
180.247.183.121 | attackspambots | [Wed Oct 30 10:56:43.113491 2019] [:error] [pid 8207:tid 140256674461440] [client 180.247.183.121:49177] [client 180.247.183.121] ModSecurity: Access denied with code 403 (phase 2). detected XSS using libinjection. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf"] [line "761"] [id "941101"] [msg "XSS Attack Detected via libinjection"] [data "Matched Data: https://karangploso.jatim.bmkg.go.id/OneSignalSDKUpdaterWorker.js?appId=cc4b4b58-d602-4719-be42-28414d733f7f found within REQUEST_HEADERS:Referer: https://karangploso.jatim.bmkg.go.id/OneSignalSDKUpdaterWorker.js?appId=cc4b4b58-d602-4719-be42-28414d733f7f"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-xss"] [tag "OWASP_CRS"] [tag "OWASP_CRS/WEB_ATTACK/XSS"] [tag "WASCTC/WASC-8"] [tag "WASCTC/WASC-22"] [tag "OWASP_TOP_10/A3"] [tag "OWASP_AppSensor/IE1"] [tag "CAPEC-242"] [tag "paranoia-level/2"] [hostn ... |
2019-10-30 12:16:19 |
176.107.133.97 | attackspambots | SSH-BruteForce |
2019-10-30 07:47:08 |
120.230.95.44 | attackspambots | Oct 30 04:56:47 host proftpd[47170]: 0.0.0.0 (120.230.95.44[120.230.95.44]) - USER adminserver.es: no such user found from 120.230.95.44 [120.230.95.44] to 62.210.146.38:21 ... |
2019-10-30 12:12:33 |