Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Bunea Telecom SRL

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Jul 26 11:56:39 mail postfix/smtpd[124332]: warning: unknown[45.148.10.73]: SASL LOGIN authentication failed: generic failure
Jul 26 11:56:39 mail postfix/smtpd[124332]: warning: unknown[45.148.10.73]: SASL LOGIN authentication failed: generic failure
Jul 26 11:56:39 mail postfix/smtpd[124332]: warning: unknown[45.148.10.73]: SASL LOGIN authentication failed: generic failure
...
2020-07-26 20:03:09
attack
Jul 25 04:58:23 mail postfix/smtpd[92326]: warning: unknown[45.148.10.73]: SASL LOGIN authentication failed: generic failure
Jul 25 04:58:23 mail postfix/smtpd[92326]: warning: unknown[45.148.10.73]: SASL LOGIN authentication failed: generic failure
Jul 25 04:58:23 mail postfix/smtpd[92326]: warning: unknown[45.148.10.73]: SASL LOGIN authentication failed: generic failure
...
2020-07-25 13:17:33
Comments on same subnet:
IP Type Details Datetime
45.148.10.247 botsattack
45.148.10.247/Trojan Linux
2025-11-19 14:09:00
45.148.10.241 attack
DDoS Inbound
2023-11-15 18:54:04
45.148.10.28 attackspam
Oct 13 20:18:40 sshgateway sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
Oct 13 20:18:43 sshgateway sshd\[2360\]: Failed password for root from 45.148.10.28 port 40178 ssh2
Oct 13 20:19:07 sshgateway sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
2020-10-14 02:28:44
45.148.10.15 attackspambots
Bruteforce detected by fail2ban
2020-10-13 21:25:53
45.148.10.186 attackspam
Unable to negotiate with 45.148.10.186 port 47964: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2020-10-13 21:24:21
45.148.10.28 attackbotsspam
SSH Server Abuse (45.148.10.28 as ): 
...
2020-10-13 17:43:00
45.148.10.15 attackbotsspam
Oct 13 05:18:03 server2 sshd\[31409\]: Invalid user user from 45.148.10.15
Oct 13 05:18:48 server2 sshd\[31424\]: Invalid user server from 45.148.10.15
Oct 13 05:19:33 server2 sshd\[31465\]: Invalid user steam from 45.148.10.15
Oct 13 05:20:17 server2 sshd\[31678\]: Invalid user vmware from 45.148.10.15
Oct 13 05:21:00 server2 sshd\[31685\]: Invalid user microsoft from 45.148.10.15
Oct 13 05:21:44 server2 sshd\[31730\]: Invalid user cloud from 45.148.10.15
2020-10-13 12:52:46
45.148.10.186 attackspam
Oct 13 05:33:03 ns308116 sshd[11001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:05 ns308116 sshd[11001]: Failed password for root from 45.148.10.186 port 41866 ssh2
Oct 13 05:33:38 ns308116 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:40 ns308116 sshd[11016]: Failed password for root from 45.148.10.186 port 39380 ssh2
Oct 13 05:34:15 ns308116 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
...
2020-10-13 12:50:57
45.148.10.15 attack
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: Invalid user user from 45.148.10.15
Oct 12 23:36:08 srv-ubuntu-dev3 sshd[31523]: Failed password for invalid user user from 45.148.10.15 port 40704 ssh2
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:40 srv-ubuntu-dev3 sshd[31590]: Failed password for invalid user 123Diego from 45.148.10.15 port 59760 ssh2
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: Invalid user Alphanetworks from 45.148.10.15
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-10-13 05:40:39
45.148.10.186 attack
Fail2Ban
2020-10-13 05:39:02
45.148.10.15 attackbotsspam
Fail2Ban
2020-10-12 05:52:51
45.148.10.65 attackbots
Invalid user ubuntu from 45.148.10.65 port 43138
2020-10-12 05:36:52
45.148.10.15 attack
Brute force attempt
2020-10-11 21:59:38
45.148.10.65 attackspam
Oct 01 10:49:15 host sshd[12378]: Invalid user ubuntu from 45.148.10.65 port 41060
2020-10-11 21:43:21
45.148.10.28 attack
Fail2Ban automatic report:
SSH brute-force:
2020-10-11 21:05:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.10.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.148.10.73.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072402 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 25 13:17:28 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 73.10.148.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.10.148.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
69.245.220.97 attackspam
Nov 30 14:09:12 plusreed sshd[31292]: Invalid user webmaster from 69.245.220.97
...
2019-12-01 03:45:09
103.88.219.170 attack
Unauthorized connection attempt from IP address 103.88.219.170 on Port 445(SMB)
2019-12-01 03:27:37
37.187.97.33 attackbots
Nov 30 15:38:23 Invalid user ching from 37.187.97.33 port 40903
2019-12-01 03:40:24
42.118.10.118 attackbotsspam
Unauthorized connection attempt from IP address 42.118.10.118 on Port 445(SMB)
2019-12-01 03:39:36
113.116.92.193 attack
Unauthorized connection attempt from IP address 113.116.92.193 on Port 445(SMB)
2019-12-01 03:59:23
157.100.234.45 attack
fail2ban
2019-12-01 03:41:09
92.46.239.114 attackspam
Unauthorized connection attempt from IP address 92.46.239.114 on Port 445(SMB)
2019-12-01 03:54:11
182.184.44.6 attackspambots
Nov 30 04:57:28 hanapaa sshd\[11307\]: Invalid user asterisk from 182.184.44.6
Nov 30 04:57:28 hanapaa sshd\[11307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.184.44.6
Nov 30 04:57:30 hanapaa sshd\[11307\]: Failed password for invalid user asterisk from 182.184.44.6 port 41550 ssh2
Nov 30 05:02:50 hanapaa sshd\[11372\]: Invalid user bridget from 182.184.44.6
Nov 30 05:02:50 hanapaa sshd\[11372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.184.44.6
2019-12-01 04:01:20
59.13.139.50 attack
Nov 30 18:22:01 host sshd[20584]: Invalid user cinema from 59.13.139.50 port 49914
...
2019-12-01 04:00:27
188.166.105.228 attackbots
Nov 30 07:19:13 auw2 sshd\[21863\]: Invalid user diya from 188.166.105.228
Nov 30 07:19:13 auw2 sshd\[21863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.105.228
Nov 30 07:19:14 auw2 sshd\[21863\]: Failed password for invalid user diya from 188.166.105.228 port 52610 ssh2
Nov 30 07:22:12 auw2 sshd\[22085\]: Invalid user dressler from 188.166.105.228
Nov 30 07:22:12 auw2 sshd\[22085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.105.228
2019-12-01 03:58:55
47.74.219.129 attackspam
Nov 30 18:48:47 Ubuntu-1404-trusty-64-minimal sshd\[10740\]: Invalid user ulva from 47.74.219.129
Nov 30 18:48:47 Ubuntu-1404-trusty-64-minimal sshd\[10740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.219.129
Nov 30 18:48:49 Ubuntu-1404-trusty-64-minimal sshd\[10740\]: Failed password for invalid user ulva from 47.74.219.129 port 45228 ssh2
Nov 30 19:04:37 Ubuntu-1404-trusty-64-minimal sshd\[29083\]: Invalid user vince from 47.74.219.129
Nov 30 19:04:37 Ubuntu-1404-trusty-64-minimal sshd\[29083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.219.129
2019-12-01 03:32:58
194.182.82.52 attack
SSH Brute Force
2019-12-01 03:38:54
122.51.128.9 attackspam
Invalid user pane from 122.51.128.9 port 40800
2019-12-01 03:58:10
222.186.15.18 attackbotsspam
Nov 30 20:38:44 OPSO sshd\[29749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Nov 30 20:38:46 OPSO sshd\[29749\]: Failed password for root from 222.186.15.18 port 33514 ssh2
Nov 30 20:38:48 OPSO sshd\[29749\]: Failed password for root from 222.186.15.18 port 33514 ssh2
Nov 30 20:38:51 OPSO sshd\[29749\]: Failed password for root from 222.186.15.18 port 33514 ssh2
Nov 30 20:40:54 OPSO sshd\[30296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
2019-12-01 03:42:49
109.229.69.180 attackspam
HTTP contact form spam
2019-12-01 03:51:56

Recently Reported IPs

45.251.241.238 38.63.180.50 177.42.119.25 115.171.86.128
79.129.117.118 50.205.82.157 104.224.187.120 222.209.131.130
59.41.64.239 103.131.71.196 198.23.159.154 36.148.12.251
213.43.88.148 189.154.139.44 2401:4900:51c9:b502:4c99:8d7b:6240:900 37.49.224.105
104.131.57.95 77.68.72.53 47.92.114.157 91.121.91.157