City: Amsterdam
Region: North Holland
Country: Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| Type | Details | Datetime |
|---|---|---|
| attackbots | (smtpauth) Failed SMTP AUTH login from 45.148.10.46 (NL/Netherlands/-): 5 in the last 3600 secs |
2020-05-09 06:24:04 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.148.10.247 | botsattack | 45.148.10.247/Trojan Linux |
2025-11-19 14:09:00 |
| 45.148.10.241 | attack | DDoS Inbound |
2023-11-15 18:54:04 |
| 45.148.10.28 | attackspam | Oct 13 20:18:40 sshgateway sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28 user=root Oct 13 20:18:43 sshgateway sshd\[2360\]: Failed password for root from 45.148.10.28 port 40178 ssh2 Oct 13 20:19:07 sshgateway sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28 user=root |
2020-10-14 02:28:44 |
| 45.148.10.15 | attackspambots | Bruteforce detected by fail2ban |
2020-10-13 21:25:53 |
| 45.148.10.186 | attackspam | Unable to negotiate with 45.148.10.186 port 47964: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] |
2020-10-13 21:24:21 |
| 45.148.10.28 | attackbotsspam | SSH Server Abuse (45.148.10.28 as |
2020-10-13 17:43:00 |
| 45.148.10.15 | attackbotsspam | Oct 13 05:18:03 server2 sshd\[31409\]: Invalid user user from 45.148.10.15 Oct 13 05:18:48 server2 sshd\[31424\]: Invalid user server from 45.148.10.15 Oct 13 05:19:33 server2 sshd\[31465\]: Invalid user steam from 45.148.10.15 Oct 13 05:20:17 server2 sshd\[31678\]: Invalid user vmware from 45.148.10.15 Oct 13 05:21:00 server2 sshd\[31685\]: Invalid user microsoft from 45.148.10.15 Oct 13 05:21:44 server2 sshd\[31730\]: Invalid user cloud from 45.148.10.15 |
2020-10-13 12:52:46 |
| 45.148.10.186 | attackspam | Oct 13 05:33:03 ns308116 sshd[11001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root Oct 13 05:33:05 ns308116 sshd[11001]: Failed password for root from 45.148.10.186 port 41866 ssh2 Oct 13 05:33:38 ns308116 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root Oct 13 05:33:40 ns308116 sshd[11016]: Failed password for root from 45.148.10.186 port 39380 ssh2 Oct 13 05:34:15 ns308116 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root ... |
2020-10-13 12:50:57 |
| 45.148.10.15 | attack | Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15 Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: Invalid user user from 45.148.10.15 Oct 12 23:36:08 srv-ubuntu-dev3 sshd[31523]: Failed password for invalid user user from 45.148.10.15 port 40704 ssh2 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15 Oct 12 23:36:40 srv-ubuntu-dev3 sshd[31590]: Failed password for invalid user 123Diego from 45.148.10.15 port 59760 ssh2 Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: Invalid user Alphanetworks from 45.148.10.15 Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh ... |
2020-10-13 05:40:39 |
| 45.148.10.186 | attack | Fail2Ban |
2020-10-13 05:39:02 |
| 45.148.10.15 | attackbotsspam | Fail2Ban |
2020-10-12 05:52:51 |
| 45.148.10.65 | attackbots | Invalid user ubuntu from 45.148.10.65 port 43138 |
2020-10-12 05:36:52 |
| 45.148.10.15 | attack | Brute force attempt |
2020-10-11 21:59:38 |
| 45.148.10.65 | attackspam | Oct 01 10:49:15 host sshd[12378]: Invalid user ubuntu from 45.148.10.65 port 41060 |
2020-10-11 21:43:21 |
| 45.148.10.28 | attack | Fail2Ban automatic report: SSH brute-force: |
2020-10-11 21:05:28 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.10.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.148.10.46. IN A
;; AUTHORITY SECTION:
. 243 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020050801 1800 900 604800 86400
;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 09 06:24:00 CST 2020
;; MSG SIZE rcvd: 116
Host 46.10.148.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 46.10.148.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 118.89.240.179 | attack | firewall-block, port(s): 22/tcp |
2019-07-19 13:06:32 |
| 134.209.98.186 | attackbots | 2019-07-19T05:12:21.511369abusebot-5.cloudsearch.cf sshd\[11228\]: Invalid user dbtest from 134.209.98.186 port 50816 |
2019-07-19 13:51:13 |
| 199.33.127.74 | attack | Unauthorized connection attempt from IP address 199.33.127.74 on Port 445(SMB) |
2019-07-19 13:27:35 |
| 159.89.182.194 | attackspambots | Jul 19 07:39:13 legacy sshd[23226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.182.194 Jul 19 07:39:15 legacy sshd[23226]: Failed password for invalid user wang from 159.89.182.194 port 51892 ssh2 Jul 19 07:45:33 legacy sshd[23477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.182.194 ... |
2019-07-19 13:46:09 |
| 103.8.119.166 | attackbots | 2019-07-19T06:19:57.569634lon01.zurich-datacenter.net sshd\[18861\]: Invalid user ares from 103.8.119.166 port 47040 2019-07-19T06:19:57.576364lon01.zurich-datacenter.net sshd\[18861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.8.119.166 2019-07-19T06:20:00.025609lon01.zurich-datacenter.net sshd\[18861\]: Failed password for invalid user ares from 103.8.119.166 port 47040 ssh2 2019-07-19T06:25:31.937144lon01.zurich-datacenter.net sshd\[19083\]: Invalid user applmgr from 103.8.119.166 port 43892 2019-07-19T06:25:31.946673lon01.zurich-datacenter.net sshd\[19083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.8.119.166 ... |
2019-07-19 14:01:37 |
| 37.49.224.151 | attackbots | $f2bV_matches |
2019-07-19 13:38:33 |
| 84.72.10.172 | attackspam | Invalid user min from 84.72.10.172 port 58712 |
2019-07-19 13:39:28 |
| 170.178.211.38 | attackspam | Unauthorized connection attempt from IP address 170.178.211.38 on Port 445(SMB) |
2019-07-19 13:43:19 |
| 163.13.137.201 | attackspambots | Mar 20 18:09:43 vpn sshd[31816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.13.137.201 Mar 20 18:09:44 vpn sshd[31816]: Failed password for invalid user wwwroot from 163.13.137.201 port 58946 ssh2 Mar 20 18:15:03 vpn sshd[31842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.13.137.201 |
2019-07-19 13:13:31 |
| 180.183.232.217 | attackspambots | Jul 18 17:00:53 debian sshd\[30387\]: Invalid user tech from 180.183.232.217 port 50827 Jul 18 17:00:53 debian sshd\[30387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.183.232.217 Jul 18 17:00:55 debian sshd\[30387\]: Failed password for invalid user tech from 180.183.232.217 port 50827 ssh2 ... |
2019-07-19 13:37:43 |
| 185.81.153.7 | attackspambots | MagicSpam Rule: block_rbl_lists (dyna.spamrats.com); Spammer IP: 185.81.153.7 |
2019-07-19 13:09:14 |
| 118.174.45.29 | attackspambots | Jul 19 01:58:03 TORMINT sshd\[27018\]: Invalid user cubrid from 118.174.45.29 Jul 19 01:58:03 TORMINT sshd\[27018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 Jul 19 01:58:05 TORMINT sshd\[27018\]: Failed password for invalid user cubrid from 118.174.45.29 port 60392 ssh2 ... |
2019-07-19 13:58:22 |
| 103.72.163.180 | attackbots | 103.72.163.180 - - [19/Jul/2019:03:55:01 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.72.163.180 - - [19/Jul/2019:03:55:02 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.72.163.180 - - [19/Jul/2019:03:55:03 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.72.163.180 - - [19/Jul/2019:03:55:04 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.72.163.180 - - [19/Jul/2019:03:55:05 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.72.163.180 - - [19/Jul/2019:03:55:06 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-07-19 13:41:41 |
| 93.82.101.53 | attack | Jul 18 21:01:31 TCP Attack: SRC=93.82.101.53 DST=[Masked] LEN=52 TOS=0x08 PREC=0x20 TTL=51 DF PROTO=TCP SPT=42782 DPT=80 WINDOW=3650 RES=0x00 ACK URGP=0 |
2019-07-19 13:16:54 |
| 58.27.242.74 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 19:21:11,157 INFO [amun_request_handler] PortScan Detected on Port: 445 (58.27.242.74) |
2019-07-19 13:14:32 |