City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| Type | Details | Datetime |
|---|---|---|
| attackbots | Only those who intend to destroy a site make attempts like this below, so if this ip appears on your site, block it immediately 45.148.10.0/24 is high risk: 45.148.10.40 - - [03/Nov/2019:23:35:31 -0300] "GET /.git/index HTTP/1.1" 404 101 "-" "git/2.0.0" 45.148.10.40 - - [04/Nov/2019:00:16:32 -0300] "GET /.git/index HTTP/1.1" 404 101 "-" "git/2.0.0" 45.148.10.40 - - [04/Nov/2019:00:16:33 -0300] "GET /.git/index HTTP/1.1" 404 101 "-" "git/2.0.0" |
2019-11-06 08:42:25 |
| attackspam | git attack |
2019-11-05 16:54:08 |
| attackspambots | Bad user agent |
2019-11-05 13:15:57 |
| attackbotsspam | 15 probes eg: /.git/ia user agent: Mozilla/5.0 (Linux; U; Android 8.1.0; zh-CN; EML-AL00 Build/HUAWEIEML-AL00) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/57.0.2987.108 baidu.sogo.uc.UCBrowser/11.9.4.974 UWS/2.13.1.48 Mobile Safari/537.36 AliApp(DingTalk/4.5.11) com.alibaba.android.rimet/10487439 Channel/227200 language/zh-CN |
2019-10-16 22:44:35 |
| attack | 09/23/2019-08:53:44.570874 45.148.10.40 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306 |
2019-09-23 21:52:25 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.148.10.247 | botsattack | 45.148.10.247/Trojan Linux |
2025-11-19 14:09:00 |
| 45.148.10.241 | attack | DDoS Inbound |
2023-11-15 18:54:04 |
| 45.148.10.28 | attackspam | Oct 13 20:18:40 sshgateway sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28 user=root Oct 13 20:18:43 sshgateway sshd\[2360\]: Failed password for root from 45.148.10.28 port 40178 ssh2 Oct 13 20:19:07 sshgateway sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28 user=root |
2020-10-14 02:28:44 |
| 45.148.10.15 | attackspambots | Bruteforce detected by fail2ban |
2020-10-13 21:25:53 |
| 45.148.10.186 | attackspam | Unable to negotiate with 45.148.10.186 port 47964: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] |
2020-10-13 21:24:21 |
| 45.148.10.28 | attackbotsspam | SSH Server Abuse (45.148.10.28 as |
2020-10-13 17:43:00 |
| 45.148.10.15 | attackbotsspam | Oct 13 05:18:03 server2 sshd\[31409\]: Invalid user user from 45.148.10.15 Oct 13 05:18:48 server2 sshd\[31424\]: Invalid user server from 45.148.10.15 Oct 13 05:19:33 server2 sshd\[31465\]: Invalid user steam from 45.148.10.15 Oct 13 05:20:17 server2 sshd\[31678\]: Invalid user vmware from 45.148.10.15 Oct 13 05:21:00 server2 sshd\[31685\]: Invalid user microsoft from 45.148.10.15 Oct 13 05:21:44 server2 sshd\[31730\]: Invalid user cloud from 45.148.10.15 |
2020-10-13 12:52:46 |
| 45.148.10.186 | attackspam | Oct 13 05:33:03 ns308116 sshd[11001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root Oct 13 05:33:05 ns308116 sshd[11001]: Failed password for root from 45.148.10.186 port 41866 ssh2 Oct 13 05:33:38 ns308116 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root Oct 13 05:33:40 ns308116 sshd[11016]: Failed password for root from 45.148.10.186 port 39380 ssh2 Oct 13 05:34:15 ns308116 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root ... |
2020-10-13 12:50:57 |
| 45.148.10.15 | attack | Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15 Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: Invalid user user from 45.148.10.15 Oct 12 23:36:08 srv-ubuntu-dev3 sshd[31523]: Failed password for invalid user user from 45.148.10.15 port 40704 ssh2 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15 Oct 12 23:36:40 srv-ubuntu-dev3 sshd[31590]: Failed password for invalid user 123Diego from 45.148.10.15 port 59760 ssh2 Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: Invalid user Alphanetworks from 45.148.10.15 Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh ... |
2020-10-13 05:40:39 |
| 45.148.10.186 | attack | Fail2Ban |
2020-10-13 05:39:02 |
| 45.148.10.15 | attackbotsspam | Fail2Ban |
2020-10-12 05:52:51 |
| 45.148.10.65 | attackbots | Invalid user ubuntu from 45.148.10.65 port 43138 |
2020-10-12 05:36:52 |
| 45.148.10.15 | attack | Brute force attempt |
2020-10-11 21:59:38 |
| 45.148.10.65 | attackspam | Oct 01 10:49:15 host sshd[12378]: Invalid user ubuntu from 45.148.10.65 port 41060 |
2020-10-11 21:43:21 |
| 45.148.10.28 | attack | Fail2Ban automatic report: SSH brute-force: |
2020-10-11 21:05:28 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.10.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.148.10.40. IN A
;; AUTHORITY SECTION:
. 258 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019092300 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 23 21:52:22 CST 2019
;; MSG SIZE rcvd: 116
Host 40.10.148.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 40.10.148.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.12.52.188 | attackspam | suspicious action Thu, 05 Mar 2020 10:32:12 -0300 |
2020-03-06 04:14:26 |
| 132.232.52.86 | attack | suspicious action Thu, 05 Mar 2020 11:33:49 -0300 |
2020-03-06 04:25:51 |
| 73.29.37.188 | attackbots | SSH-bruteforce attempts |
2020-03-06 04:37:30 |
| 213.230.67.32 | attackbotsspam | Mar 5 09:00:13 tdfoods sshd\[30207\]: Invalid user jingxin from 213.230.67.32 Mar 5 09:00:13 tdfoods sshd\[30207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.67.32 Mar 5 09:00:15 tdfoods sshd\[30207\]: Failed password for invalid user jingxin from 213.230.67.32 port 21287 ssh2 Mar 5 09:09:40 tdfoods sshd\[30962\]: Invalid user customer from 213.230.67.32 Mar 5 09:09:40 tdfoods sshd\[30962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.67.32 |
2020-03-06 04:50:11 |
| 154.44.178.65 | attackspambots | SMTP brute force ... |
2020-03-06 04:33:59 |
| 183.89.229.114 | attackspam | suspicious action Thu, 05 Mar 2020 10:32:06 -0300 |
2020-03-06 04:21:46 |
| 168.0.4.27 | attackbots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-06 04:25:06 |
| 161.117.195.97 | attackspambots | suspicious action Thu, 05 Mar 2020 15:21:40 -0300 |
2020-03-06 04:46:01 |
| 222.186.175.140 | attackbotsspam | 2020-03-05T21:42:18.066017scmdmz1 sshd[19197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140 user=root 2020-03-05T21:42:19.582788scmdmz1 sshd[19197]: Failed password for root from 222.186.175.140 port 48216 ssh2 2020-03-05T21:42:22.586816scmdmz1 sshd[19197]: Failed password for root from 222.186.175.140 port 48216 ssh2 ... |
2020-03-06 04:44:08 |
| 84.232.249.242 | attackspam | Email rejected due to spam filtering |
2020-03-06 04:28:48 |
| 122.171.218.230 | attack | Email rejected due to spam filtering |
2020-03-06 04:46:28 |
| 173.11.209.26 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-06 04:37:01 |
| 114.116.246.54 | attackbots | SIP/5060 Probe, BF, Hack - |
2020-03-06 04:30:59 |
| 202.63.195.25 | attackspambots | suspicious action Thu, 05 Mar 2020 10:32:02 -0300 |
2020-03-06 04:32:04 |
| 186.134.198.4 | attackbots | Unauthorized connection attempt from IP address 186.134.198.4 on Port 445(SMB) |
2020-03-06 04:49:13 |