Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Bunea Telecom SRL

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
SSH Scan
2020-07-14 13:59:00
Comments on same subnet:
IP Type Details Datetime
45.148.10.247 botsattack
45.148.10.247/Trojan Linux
2025-11-19 14:09:00
45.148.10.241 attack
DDoS Inbound
2023-11-15 18:54:04
45.148.10.28 attackspam
Oct 13 20:18:40 sshgateway sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
Oct 13 20:18:43 sshgateway sshd\[2360\]: Failed password for root from 45.148.10.28 port 40178 ssh2
Oct 13 20:19:07 sshgateway sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
2020-10-14 02:28:44
45.148.10.15 attackspambots
Bruteforce detected by fail2ban
2020-10-13 21:25:53
45.148.10.186 attackspam
Unable to negotiate with 45.148.10.186 port 47964: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2020-10-13 21:24:21
45.148.10.28 attackbotsspam
SSH Server Abuse (45.148.10.28 as ): 
...
2020-10-13 17:43:00
45.148.10.15 attackbotsspam
Oct 13 05:18:03 server2 sshd\[31409\]: Invalid user user from 45.148.10.15
Oct 13 05:18:48 server2 sshd\[31424\]: Invalid user server from 45.148.10.15
Oct 13 05:19:33 server2 sshd\[31465\]: Invalid user steam from 45.148.10.15
Oct 13 05:20:17 server2 sshd\[31678\]: Invalid user vmware from 45.148.10.15
Oct 13 05:21:00 server2 sshd\[31685\]: Invalid user microsoft from 45.148.10.15
Oct 13 05:21:44 server2 sshd\[31730\]: Invalid user cloud from 45.148.10.15
2020-10-13 12:52:46
45.148.10.186 attackspam
Oct 13 05:33:03 ns308116 sshd[11001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:05 ns308116 sshd[11001]: Failed password for root from 45.148.10.186 port 41866 ssh2
Oct 13 05:33:38 ns308116 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:40 ns308116 sshd[11016]: Failed password for root from 45.148.10.186 port 39380 ssh2
Oct 13 05:34:15 ns308116 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
...
2020-10-13 12:50:57
45.148.10.15 attack
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: Invalid user user from 45.148.10.15
Oct 12 23:36:08 srv-ubuntu-dev3 sshd[31523]: Failed password for invalid user user from 45.148.10.15 port 40704 ssh2
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:40 srv-ubuntu-dev3 sshd[31590]: Failed password for invalid user 123Diego from 45.148.10.15 port 59760 ssh2
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: Invalid user Alphanetworks from 45.148.10.15
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-10-13 05:40:39
45.148.10.186 attack
Fail2Ban
2020-10-13 05:39:02
45.148.10.15 attackbotsspam
Fail2Ban
2020-10-12 05:52:51
45.148.10.65 attackbots
Invalid user ubuntu from 45.148.10.65 port 43138
2020-10-12 05:36:52
45.148.10.15 attack
Brute force attempt
2020-10-11 21:59:38
45.148.10.65 attackspam
Oct 01 10:49:15 host sshd[12378]: Invalid user ubuntu from 45.148.10.65 port 41060
2020-10-11 21:43:21
45.148.10.28 attack
Fail2Ban automatic report:
SSH brute-force:
2020-10-11 21:05:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.10.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62421
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.148.10.45.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071400 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 14 13:58:54 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 45.10.148.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 45.10.148.45.in-addr.arpa.: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
134.122.16.152 attackbotsspam
Apr 21 02:15:20 gw1 sshd[23544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.16.152
Apr 21 02:15:22 gw1 sshd[23544]: Failed password for invalid user sg from 134.122.16.152 port 35416 ssh2
...
2020-04-21 05:29:00
129.28.78.8 attackbotsspam
Invalid user postgres from 129.28.78.8 port 41980
2020-04-21 06:07:36
14.29.164.137 attackbotsspam
Apr 21 03:53:17 webhost01 sshd[28775]: Failed password for root from 14.29.164.137 port 35303 ssh2
Apr 21 04:01:39 webhost01 sshd[28913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.164.137
...
2020-04-21 05:51:31
159.65.35.14 attackbotsspam
Apr 20 22:55:33 vmd48417 sshd[9209]: Failed password for root from 159.65.35.14 port 50224 ssh2
2020-04-21 05:52:45
45.116.115.130 attack
SSH Brute-Forcing (server1)
2020-04-21 05:31:47
222.186.42.136 attack
Apr 20 21:31:26 localhost sshd[84251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
Apr 20 21:31:29 localhost sshd[84251]: Failed password for root from 222.186.42.136 port 46439 ssh2
Apr 20 21:31:31 localhost sshd[84251]: Failed password for root from 222.186.42.136 port 46439 ssh2
Apr 20 21:31:26 localhost sshd[84251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
Apr 20 21:31:29 localhost sshd[84251]: Failed password for root from 222.186.42.136 port 46439 ssh2
Apr 20 21:31:31 localhost sshd[84251]: Failed password for root from 222.186.42.136 port 46439 ssh2
Apr 20 21:31:26 localhost sshd[84251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
Apr 20 21:31:29 localhost sshd[84251]: Failed password for root from 222.186.42.136 port 46439 ssh2
Apr 20 21:31:31 localhost sshd[84251]: Fa
...
2020-04-21 05:43:16
47.111.113.87 attackbotsspam
2020-04-20T15:38:24.5670101495-001 sshd[43834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.111.113.87  user=root
2020-04-20T15:38:26.3103601495-001 sshd[43834]: Failed password for root from 47.111.113.87 port 59254 ssh2
2020-04-20T15:39:33.9634261495-001 sshd[43902]: Invalid user oq from 47.111.113.87 port 43888
2020-04-20T15:39:33.9744751495-001 sshd[43902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.111.113.87
2020-04-20T15:39:33.9634261495-001 sshd[43902]: Invalid user oq from 47.111.113.87 port 43888
2020-04-20T15:39:36.1896071495-001 sshd[43902]: Failed password for invalid user oq from 47.111.113.87 port 43888 ssh2
...
2020-04-21 05:40:03
94.191.61.57 attackbotsspam
sshd jail - ssh hack attempt
2020-04-21 05:55:23
125.161.128.134 attackspam
RDP Brute-Force (honeypot 7)
2020-04-21 05:42:19
185.61.137.143 attackbots
Apr 20 16:16:05 : SSH login attempts with invalid user
2020-04-21 06:05:58
111.231.87.204 attackbots
Apr 20 23:12:43 host sshd[10443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.87.204  user=root
Apr 20 23:12:45 host sshd[10443]: Failed password for root from 111.231.87.204 port 42748 ssh2
...
2020-04-21 05:37:19
80.82.77.234 attackspambots
04/20/2020-17:08:47.666290 80.82.77.234 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-21 06:03:14
157.230.153.75 attackspambots
Apr 20 18:52:00 ws24vmsma01 sshd[231977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.153.75
Apr 20 18:52:01 ws24vmsma01 sshd[231977]: Failed password for invalid user jb from 157.230.153.75 port 34734 ssh2
...
2020-04-21 05:53:15
212.161.76.140 attack
Apr 20 22:00:26 ovpn sshd\[25596\]: Invalid user admin from 212.161.76.140
Apr 20 22:00:26 ovpn sshd\[25596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.161.76.140
Apr 20 22:00:29 ovpn sshd\[25596\]: Failed password for invalid user admin from 212.161.76.140 port 35078 ssh2
Apr 20 22:06:35 ovpn sshd\[26999\]: Invalid user jb from 212.161.76.140
Apr 20 22:06:35 ovpn sshd\[26999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.161.76.140
2020-04-21 05:35:53
119.254.7.114 attackbotsspam
2020-04-20T19:49:19.446267abusebot-4.cloudsearch.cf sshd[25700]: Invalid user mz from 119.254.7.114 port 10890
2020-04-20T19:49:19.454194abusebot-4.cloudsearch.cf sshd[25700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.7.114
2020-04-20T19:49:19.446267abusebot-4.cloudsearch.cf sshd[25700]: Invalid user mz from 119.254.7.114 port 10890
2020-04-20T19:49:21.448313abusebot-4.cloudsearch.cf sshd[25700]: Failed password for invalid user mz from 119.254.7.114 port 10890 ssh2
2020-04-20T19:56:15.572849abusebot-4.cloudsearch.cf sshd[26169]: Invalid user info from 119.254.7.114 port 62649
2020-04-20T19:56:15.579364abusebot-4.cloudsearch.cf sshd[26169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.7.114
2020-04-20T19:56:15.572849abusebot-4.cloudsearch.cf sshd[26169]: Invalid user info from 119.254.7.114 port 62649
2020-04-20T19:56:17.682936abusebot-4.cloudsearch.cf sshd[26169]: Failed password f
...
2020-04-21 05:31:06

Recently Reported IPs

150.129.8.14 14.40.65.91 53.56.53.92 114.118.5.188
109.99.178.58 46.0.140.118 159.69.189.220 197.162.254.234
42.115.229.89 151.15.75.100 41.44.252.236 49.235.196.128
85.172.174.5 192.142.179.68 50.200.220.18 187.167.194.48
89.70.32.50 212.95.137.173 74.178.166.32 205.185.126.6