Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Bunea Telecom SRL

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
scans once in preceeding hours on the ports (in chronological order) 10000 resulting in total of 6 scans from 45.148.10.0/24 block.
2020-05-07 03:38:49
Comments on same subnet:
IP Type Details Datetime
45.148.10.247 botsattack
45.148.10.247/Trojan Linux
2025-11-19 14:09:00
45.148.10.241 attack
DDoS Inbound
2023-11-15 18:54:04
45.148.10.28 attackspam
Oct 13 20:18:40 sshgateway sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
Oct 13 20:18:43 sshgateway sshd\[2360\]: Failed password for root from 45.148.10.28 port 40178 ssh2
Oct 13 20:19:07 sshgateway sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
2020-10-14 02:28:44
45.148.10.15 attackspambots
Bruteforce detected by fail2ban
2020-10-13 21:25:53
45.148.10.186 attackspam
Unable to negotiate with 45.148.10.186 port 47964: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2020-10-13 21:24:21
45.148.10.28 attackbotsspam
SSH Server Abuse (45.148.10.28 as ): 
...
2020-10-13 17:43:00
45.148.10.15 attackbotsspam
Oct 13 05:18:03 server2 sshd\[31409\]: Invalid user user from 45.148.10.15
Oct 13 05:18:48 server2 sshd\[31424\]: Invalid user server from 45.148.10.15
Oct 13 05:19:33 server2 sshd\[31465\]: Invalid user steam from 45.148.10.15
Oct 13 05:20:17 server2 sshd\[31678\]: Invalid user vmware from 45.148.10.15
Oct 13 05:21:00 server2 sshd\[31685\]: Invalid user microsoft from 45.148.10.15
Oct 13 05:21:44 server2 sshd\[31730\]: Invalid user cloud from 45.148.10.15
2020-10-13 12:52:46
45.148.10.186 attackspam
Oct 13 05:33:03 ns308116 sshd[11001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:05 ns308116 sshd[11001]: Failed password for root from 45.148.10.186 port 41866 ssh2
Oct 13 05:33:38 ns308116 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:40 ns308116 sshd[11016]: Failed password for root from 45.148.10.186 port 39380 ssh2
Oct 13 05:34:15 ns308116 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
...
2020-10-13 12:50:57
45.148.10.15 attack
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: Invalid user user from 45.148.10.15
Oct 12 23:36:08 srv-ubuntu-dev3 sshd[31523]: Failed password for invalid user user from 45.148.10.15 port 40704 ssh2
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:40 srv-ubuntu-dev3 sshd[31590]: Failed password for invalid user 123Diego from 45.148.10.15 port 59760 ssh2
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: Invalid user Alphanetworks from 45.148.10.15
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-10-13 05:40:39
45.148.10.186 attack
Fail2Ban
2020-10-13 05:39:02
45.148.10.15 attackbotsspam
Fail2Ban
2020-10-12 05:52:51
45.148.10.65 attackbots
Invalid user ubuntu from 45.148.10.65 port 43138
2020-10-12 05:36:52
45.148.10.15 attack
Brute force attempt
2020-10-11 21:59:38
45.148.10.65 attackspam
Oct 01 10:49:15 host sshd[12378]: Invalid user ubuntu from 45.148.10.65 port 41060
2020-10-11 21:43:21
45.148.10.28 attack
Fail2Ban automatic report:
SSH brute-force:
2020-10-11 21:05:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.10.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.148.10.153.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050601 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 03:38:46 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 153.10.148.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 153.10.148.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.173.145.222 attack
[2020-09-05 20:26:32] NOTICE[1194][C-0000101c] chan_sip.c: Call from '' (62.173.145.222:56143) to extension '3614234273128' rejected because extension not found in context 'public'.
[2020-09-05 20:26:32] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-05T20:26:32.604-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="3614234273128",SessionID="0x7f2ddc04e988",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.173.145.222/56143",ACLName="no_extension_match"
[2020-09-05 20:31:32] NOTICE[1194][C-00001020] chan_sip.c: Call from '' (62.173.145.222:56535) to extension '525214234273128' rejected because extension not found in context 'public'.
[2020-09-05 20:31:32] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-05T20:31:32.027-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="525214234273128",SessionID="0x7f2ddc04e988",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/6
...
2020-09-06 18:27:47
118.40.248.20 attack
Sep  6 10:20:56 root sshd[3033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.40.248.20 
...
2020-09-06 18:14:28
116.98.140.102 attack
Attempted connection to port 23.
2020-09-06 17:55:48
23.94.2.235 attackspambots
(From edingershock362@gmail.com) Hello!

I am a freelancer who's designed and improved hundreds of websites over the past decade. I'd like the opportunity to discuss with you how I can help you upgrade your site or build you a new one that will provide all the modern features that a website should have, as well as an effortlessly beautiful user-interface. This can all be done at a very affordable price.

I am an expert in WordPress and experienced in many other web platforms and shopping carts. If you're not familiar with it, then I'd like to show you how easy it is to develop your site on a platform that gives you an incredible number of features. In addition to the modern features that make the most business processes easier, I can also include some elements that your site needs to make it more user-friendly and profitable.

I would like to send you my portfolio of work from previous clients and include how the profitability of those businesses increased after the improvements that I made to their web
2020-09-06 18:22:11
167.99.153.200 attackbotsspam
reported through recidive - multiple failed attempts(SSH)
2020-09-06 18:11:59
87.101.149.194 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 17:58:56
176.118.44.112 attack
SSH login attempt
2020-09-06 17:59:55
218.92.0.250 attackbotsspam
Sep  6 11:45:34 abendstille sshd\[17267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Sep  6 11:45:37 abendstille sshd\[17267\]: Failed password for root from 218.92.0.250 port 55925 ssh2
Sep  6 11:45:40 abendstille sshd\[17267\]: Failed password for root from 218.92.0.250 port 55925 ssh2
Sep  6 11:45:44 abendstille sshd\[17267\]: Failed password for root from 218.92.0.250 port 55925 ssh2
Sep  6 11:45:48 abendstille sshd\[17267\]: Failed password for root from 218.92.0.250 port 55925 ssh2
...
2020-09-06 17:49:03
200.61.163.27 attack
06.09.2020 03:08:32 SSH access blocked by firewall
2020-09-06 17:54:42
190.207.85.114 attack
Lines containing failures of 190.207.85.114
Sep  4 00:08:53 kopano sshd[25501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.207.85.114  user=r.r
Sep  4 00:08:55 kopano sshd[25501]: Failed password for r.r from 190.207.85.114 port 39034 ssh2
Sep  4 00:09:10 kopano sshd[25501]: Received disconnect from 190.207.85.114 port 39034:11: Bye Bye [preauth]
Sep  4 00:09:10 kopano sshd[25501]: Disconnected from authenticating user r.r 190.207.85.114 port 39034 [preauth]
Sep  4 00:33:55 kopano sshd[13899]: Connection reset by 190.207.85.114 port 42496 [preauth]
Sep  4 00:43:45 kopano sshd[22014]: Connection closed by 190.207.85.114 port 42628 [preauth]
Sep  4 00:53:47 kopano sshd[30029]: Invalid user tom from 190.207.85.114 port 42742
Sep  4 00:53:47 kopano sshd[30029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.207.85.114


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.
2020-09-06 17:59:27
93.157.63.26 attackbotsspam
93.157.63.26 (RU/Russia/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  6 04:12:32 server2 sshd[20114]: Failed password for root from 93.157.63.26 port 40832 ssh2
Sep  6 04:12:44 server2 sshd[20130]: Failed password for root from 178.128.21.38 port 39912 ssh2
Sep  6 04:13:05 server2 sshd[20433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.180.119.192  user=root
Sep  6 04:12:58 server2 sshd[20171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.50.84  user=root
Sep  6 04:12:59 server2 sshd[20171]: Failed password for root from 165.227.50.84 port 45024 ssh2

IP Addresses Blocked:
2020-09-06 18:28:27
112.85.42.74 attack
Sep  6 11:23:39 * sshd[20246]: Failed password for root from 112.85.42.74 port 22857 ssh2
2020-09-06 18:17:01
106.38.203.230 attackbots
$f2bV_matches
2020-09-06 18:17:39
94.237.76.134 attack
Lines containing failures of 94.237.76.134
Sep  4 14:13:31 dns01 sshd[7571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.237.76.134  user=r.r
Sep  4 14:13:32 dns01 sshd[7571]: Failed password for r.r from 94.237.76.134 port 45324 ssh2
Sep  4 14:13:33 dns01 sshd[7571]: Received disconnect from 94.237.76.134 port 45324:11: Bye Bye [preauth]
Sep  4 14:13:33 dns01 sshd[7571]: Disconnected from authenticating user r.r 94.237.76.134 port 45324 [preauth]
Sep  4 14:33:00 dns01 sshd[11460]: Invalid user lina from 94.237.76.134 port 46330
Sep  4 14:33:00 dns01 sshd[11460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.237.76.134
Sep  4 14:33:02 dns01 sshd[11460]: Failed password for invalid user lina from 94.237.76.134 port 46330 ssh2
Sep  4 14:33:03 dns01 sshd[11460]: Received disconnect from 94.237.76.134 port 46330:11: Bye Bye [preauth]
Sep  4 14:33:03 dns01 sshd[11460]: Disconnected fro........
------------------------------
2020-09-06 18:21:02
111.125.220.202 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 18:03:09

Recently Reported IPs

121.30.208.197 14.18.62.124 106.13.179.45 121.142.172.106
46.245.116.71 114.67.120.110 69.49.203.105 62.110.172.102
192.236.161.26 106.117.204.135 167.71.228.227 162.243.144.8
154.202.28.246 89.43.215.211 177.71.77.202 190.64.89.218
189.152.111.58 177.230.151.183 121.227.102.42 2.51.232.88