Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: SC Netsilvania Network SRL

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Bruteforce detected by fail2ban
2020-10-06 04:54:39
attack
Bruteforce detected by fail2ban
2020-10-05 20:57:38
attack
Oct  5 01:05:13 mout sshd[21090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.149.38  user=root
Oct  5 01:05:15 mout sshd[21090]: Failed password for root from 45.14.149.38 port 37428 ssh2
Oct  5 01:05:15 mout sshd[21090]: Disconnected from authenticating user root 45.14.149.38 port 37428 [preauth]
2020-10-05 12:47:32
attack
"Unauthorized connection attempt on SSHD detected"
2020-09-29 01:20:02
attack
"Unauthorized connection attempt on SSHD detected"
2020-09-28 17:23:15
attackspambots
 TCP (SYN) 45.14.149.38:42618 -> port 10938, len 44
2020-08-10 15:56:36
attack
Jul 28 03:57:15 *** sshd[1812]: Invalid user shachunyang from 45.14.149.38
2020-07-28 12:42:19
attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 25 - port: 6520 proto: tcp cat: Misc Attackbytes: 60
2020-07-27 21:41:15
attackbots
SSH Invalid Login
2020-07-17 05:53:22
attackbots
Multiple SSH authentication failures from 45.14.149.38
2020-07-01 14:12:26
attackbots
Invalid user ydc from 45.14.149.38 port 40756
2020-06-29 18:53:50
attackbotsspam
Jun 28 12:09:49 onepixel sshd[1034361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.149.38 
Jun 28 12:09:49 onepixel sshd[1034361]: Invalid user qwer from 45.14.149.38 port 40928
Jun 28 12:09:51 onepixel sshd[1034361]: Failed password for invalid user qwer from 45.14.149.38 port 40928 ssh2
Jun 28 12:14:55 onepixel sshd[1037409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.149.38  user=root
Jun 28 12:14:57 onepixel sshd[1037409]: Failed password for root from 45.14.149.38 port 33064 ssh2
2020-06-28 20:57:03
attackspambots
Jun 26 07:38:17 Tower sshd[22378]: Connection from 45.14.149.38 port 35742 on 192.168.10.220 port 22 rdomain ""
Jun 26 07:38:28 Tower sshd[22378]: Invalid user temp1 from 45.14.149.38 port 35742
Jun 26 07:38:28 Tower sshd[22378]: error: Could not get shadow information for NOUSER
Jun 26 07:38:28 Tower sshd[22378]: Failed password for invalid user temp1 from 45.14.149.38 port 35742 ssh2
Jun 26 07:38:29 Tower sshd[22378]: Received disconnect from 45.14.149.38 port 35742:11: Bye Bye [preauth]
Jun 26 07:38:29 Tower sshd[22378]: Disconnected from invalid user temp1 45.14.149.38 port 35742 [preauth]
2020-06-26 20:36:58
attackbotsspam
Invalid user martina from 45.14.149.38 port 52546
2020-05-15 15:28:56
Comments on same subnet:
IP Type Details Datetime
45.14.149.46 attack
Multiple SSH authentication failures from 45.14.149.46
2020-07-30 21:51:39
45.14.149.46 attackspambots
Jul 23 16:12:18 ajax sshd[10304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.149.46 
Jul 23 16:12:19 ajax sshd[10304]: Failed password for invalid user ego from 45.14.149.46 port 41032 ssh2
2020-07-24 02:26:43
45.14.149.46 attackbotsspam
(sshd) Failed SSH login from 45.14.149.46 (RO/Romania/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 22 16:23:15 grace sshd[18899]: Invalid user ace from 45.14.149.46 port 38312
Jul 22 16:23:17 grace sshd[18899]: Failed password for invalid user ace from 45.14.149.46 port 38312 ssh2
Jul 22 16:39:07 grace sshd[21609]: Invalid user lupita from 45.14.149.46 port 46330
Jul 22 16:39:09 grace sshd[21609]: Failed password for invalid user lupita from 45.14.149.46 port 46330 ssh2
Jul 22 16:50:55 grace sshd[23498]: Invalid user guest from 45.14.149.46 port 33246
2020-07-23 00:57:36
45.14.149.46 attackbotsspam
Jul 11 22:58:43 lukav-desktop sshd\[6639\]: Invalid user lexi from 45.14.149.46
Jul 11 22:58:43 lukav-desktop sshd\[6639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.149.46
Jul 11 22:58:45 lukav-desktop sshd\[6639\]: Failed password for invalid user lexi from 45.14.149.46 port 52532 ssh2
Jul 11 23:07:44 lukav-desktop sshd\[13463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.149.46  user=www-data
Jul 11 23:07:47 lukav-desktop sshd\[13463\]: Failed password for www-data from 45.14.149.46 port 50716 ssh2
2020-07-12 05:06:18
45.14.149.46 attack
Jun 28 14:14:27 srv sshd[11112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.149.46
2020-06-28 21:25:11
45.14.149.46 attackbotsspam
Invalid user wordpress from 45.14.149.46 port 32884
2020-06-26 22:14:36
45.14.149.46 attack
Jun 23 00:51:20 fhem-rasp sshd[30318]: Invalid user ubuntu from 45.14.149.46 port 43190
...
2020-06-23 06:56:47
45.14.149.46 attackbotsspam
$f2bV_matches
2020-06-21 03:40:00
45.14.149.46 attackbotsspam
Invalid user gsh from 45.14.149.46 port 42798
2020-06-18 07:43:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.14.149.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.14.149.38.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050600 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 22:20:20 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 38.149.14.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.149.14.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.29.241.29 attackbotsspam
Invalid user zabbix from 14.29.241.29 port 58128
2020-04-20 22:11:34
62.72.236.2 attackspambots
Invalid user ftpuser from 62.72.236.2 port 47794
2020-04-20 21:58:01
73.253.70.51 attackbotsspam
Apr 20 14:24:36 ns382633 sshd\[1426\]: Invalid user test from 73.253.70.51 port 35210
Apr 20 14:24:36 ns382633 sshd\[1426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.253.70.51
Apr 20 14:24:38 ns382633 sshd\[1426\]: Failed password for invalid user test from 73.253.70.51 port 35210 ssh2
Apr 20 14:48:04 ns382633 sshd\[6765\]: Invalid user qm from 73.253.70.51 port 43041
Apr 20 14:48:04 ns382633 sshd\[6765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.253.70.51
2020-04-20 21:54:33
218.17.162.119 attackbots
Invalid user bs from 218.17.162.119 port 58656
2020-04-20 22:15:58
67.207.89.207 attackspambots
Invalid user tester from 67.207.89.207 port 60716
2020-04-20 21:55:51
104.248.205.67 attack
Bruteforce detected by fail2ban
2020-04-20 21:48:08
61.19.23.170 attackspambots
Brute force SMTP login attempted.
...
2020-04-20 21:58:56
220.156.170.176 attackspambots
Invalid user admin from 220.156.170.176 port 60027
2020-04-20 22:15:24
106.250.131.11 attack
2020-04-20T14:43:06.991640ns386461 sshd\[25376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.131.11  user=root
2020-04-20T14:43:08.592343ns386461 sshd\[25376\]: Failed password for root from 106.250.131.11 port 52072 ssh2
2020-04-20T14:51:57.570603ns386461 sshd\[1118\]: Invalid user admin from 106.250.131.11 port 47452
2020-04-20T14:51:57.575027ns386461 sshd\[1118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.131.11
2020-04-20T14:52:00.073855ns386461 sshd\[1118\]: Failed password for invalid user admin from 106.250.131.11 port 47452 ssh2
...
2020-04-20 21:42:39
106.12.156.160 attackbotsspam
Invalid user lv from 106.12.156.160 port 34266
2020-04-20 21:47:10
113.142.71.35 attackspam
Invalid user m from 113.142.71.35 port 25096
2020-04-20 21:38:40
37.59.98.64 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-20 22:07:23
110.39.186.254 attackbotsspam
Invalid user guest from 110.39.186.254 port 64339
2020-04-20 21:41:24
49.235.172.132 attack
Invalid user uuidd from 49.235.172.132 port 52748
2020-04-20 22:02:57
113.162.153.213 attackbotsspam
Invalid user admin from 113.162.153.213 port 44754
2020-04-20 21:38:19

Recently Reported IPs

39.61.57.18 134.236.131.82 59.91.237.150 37.49.226.40
217.107.106.67 184.22.75.166 162.243.143.49 39.35.35.247
36.71.234.136 117.242.135.122 74.84.255.220 14.176.121.233
176.111.104.46 162.243.137.209 103.145.12.72 162.243.136.142
187.123.92.70 162.243.142.61 162.243.141.119 201.34.221.2