City: unknown
Region: unknown
Country: Netherlands
Internet Service Provider: Bunea Telecom SRL
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attack | SSH Brute Force |
2020-02-17 19:47:37 |
| attackspambots | Feb 16 21:40:43 mail sshd\[14411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=root Feb 16 21:40:45 mail sshd\[14411\]: Failed password for root from 45.148.10.99 port 45996 ssh2 Feb 16 21:40:58 mail sshd\[14462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=root ... |
2020-02-17 04:50:23 |
| attack | Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Connection from 45.148.10.99 port 41920 on 45.62.248.66 port 22 Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Did not receive identification string from 45.148.10.99 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: Connection from 45.148.10.99 port 48236 on 45.62.248.66 port 22 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: User r.r from 45.148.10.99 not allowed because not listed in AllowUsers Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=r.r Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Failed password for invalid user r.r from 45.148.10.99 port 48236 ssh2 Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Received disconnect from 45.148.10.99: 11: Normal Shutdown, Thank you for playing [preauth] Feb 12 05:46:14 UTC__SANYALnet-Labs__cac13 sshd[29520]: Connec........ ------------------------------- |
2020-02-16 15:46:54 |
| attackspam | Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Connection from 45.148.10.99 port 41920 on 45.62.248.66 port 22 Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Did not receive identification string from 45.148.10.99 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: Connection from 45.148.10.99 port 48236 on 45.62.248.66 port 22 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: User r.r from 45.148.10.99 not allowed because not listed in AllowUsers Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=r.r Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Failed password for invalid user r.r from 45.148.10.99 port 48236 ssh2 Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Received disconnect from 45.148.10.99: 11: Normal Shutdown, Thank you for playing [preauth] Feb 12 05:46:14 UTC__SANYALnet-Labs__cac13 sshd[29520]: Connec........ ------------------------------- |
2020-02-16 03:25:31 |
| attackbots | 2020-02-15T10:28:27.097667 sshd[4397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=root 2020-02-15T10:28:29.388240 sshd[4397]: Failed password for root from 45.148.10.99 port 42912 ssh2 2020-02-15T10:28:42.374034 sshd[4405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=root 2020-02-15T10:28:44.057354 sshd[4405]: Failed password for root from 45.148.10.99 port 43030 ssh2 ... |
2020-02-15 17:52:14 |
| attackspam | Feb 15 01:09:27 Ubuntu-1404-trusty-64-minimal sshd\[14005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=root Feb 15 01:09:29 Ubuntu-1404-trusty-64-minimal sshd\[14005\]: Failed password for root from 45.148.10.99 port 54166 ssh2 Feb 15 01:09:43 Ubuntu-1404-trusty-64-minimal sshd\[14049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=root Feb 15 01:09:45 Ubuntu-1404-trusty-64-minimal sshd\[14049\]: Failed password for root from 45.148.10.99 port 55328 ssh2 Feb 15 01:09:59 Ubuntu-1404-trusty-64-minimal sshd\[14099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=root |
2020-02-15 08:41:17 |
| attack | Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Connection from 45.148.10.99 port 41920 on 45.62.248.66 port 22 Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Did not receive identification string from 45.148.10.99 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: Connection from 45.148.10.99 port 48236 on 45.62.248.66 port 22 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: User r.r from 45.148.10.99 not allowed because not listed in AllowUsers Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=r.r Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Failed password for invalid user r.r from 45.148.10.99 port 48236 ssh2 Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Received disconnect from 45.148.10.99: 11: Normal Shutdown, Thank you for playing [preauth] Feb 12 05:46:14 UTC__SANYALnet-Labs__cac13 sshd[29520]: Connec........ ------------------------------- |
2020-02-14 18:42:13 |
| attackspambots | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-02-13 13:17:52 |
| attackspambots | Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Connection from 45.148.10.99 port 41920 on 45.62.248.66 port 22 Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Did not receive identification string from 45.148.10.99 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: Connection from 45.148.10.99 port 48236 on 45.62.248.66 port 22 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: User r.r from 45.148.10.99 not allowed because not listed in AllowUsers Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=r.r Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Failed password for invalid user r.r from 45.148.10.99 port 48236 ssh2 Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Received disconnect from 45.148.10.99: 11: Normal Shutdown, Thank you for playing [preauth] Feb 12 05:46:14 UTC__SANYALnet-Labs__cac13 sshd[29520]: Connec........ ------------------------------- |
2020-02-13 08:28:19 |
| attack | Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Connection from 45.148.10.99 port 41920 on 45.62.248.66 port 22 Feb 12 05:45:29 UTC__SANYALnet-Labs__cac13 sshd[29491]: Did not receive identification string from 45.148.10.99 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: Connection from 45.148.10.99 port 48236 on 45.62.248.66 port 22 Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: User r.r from 45.148.10.99 not allowed because not listed in AllowUsers Feb 12 05:45:53 UTC__SANYALnet-Labs__cac13 sshd[29492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.99 user=r.r Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Failed password for invalid user r.r from 45.148.10.99 port 48236 ssh2 Feb 12 05:45:56 UTC__SANYALnet-Labs__cac13 sshd[29492]: Received disconnect from 45.148.10.99: 11: Normal Shutdown, Thank you for playing [preauth] Feb 12 05:46:14 UTC__SANYALnet-Labs__cac13 sshd[29520]: Connec........ ------------------------------- |
2020-02-12 23:35:37 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.148.10.247 | botsattack | 45.148.10.247/Trojan Linux |
2025-11-19 14:09:00 |
| 45.148.10.241 | attack | DDoS Inbound |
2023-11-15 18:54:04 |
| 45.148.10.28 | attackspam | Oct 13 20:18:40 sshgateway sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28 user=root Oct 13 20:18:43 sshgateway sshd\[2360\]: Failed password for root from 45.148.10.28 port 40178 ssh2 Oct 13 20:19:07 sshgateway sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28 user=root |
2020-10-14 02:28:44 |
| 45.148.10.15 | attackspambots | Bruteforce detected by fail2ban |
2020-10-13 21:25:53 |
| 45.148.10.186 | attackspam | Unable to negotiate with 45.148.10.186 port 47964: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] |
2020-10-13 21:24:21 |
| 45.148.10.28 | attackbotsspam | SSH Server Abuse (45.148.10.28 as |
2020-10-13 17:43:00 |
| 45.148.10.15 | attackbotsspam | Oct 13 05:18:03 server2 sshd\[31409\]: Invalid user user from 45.148.10.15 Oct 13 05:18:48 server2 sshd\[31424\]: Invalid user server from 45.148.10.15 Oct 13 05:19:33 server2 sshd\[31465\]: Invalid user steam from 45.148.10.15 Oct 13 05:20:17 server2 sshd\[31678\]: Invalid user vmware from 45.148.10.15 Oct 13 05:21:00 server2 sshd\[31685\]: Invalid user microsoft from 45.148.10.15 Oct 13 05:21:44 server2 sshd\[31730\]: Invalid user cloud from 45.148.10.15 |
2020-10-13 12:52:46 |
| 45.148.10.186 | attackspam | Oct 13 05:33:03 ns308116 sshd[11001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root Oct 13 05:33:05 ns308116 sshd[11001]: Failed password for root from 45.148.10.186 port 41866 ssh2 Oct 13 05:33:38 ns308116 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root Oct 13 05:33:40 ns308116 sshd[11016]: Failed password for root from 45.148.10.186 port 39380 ssh2 Oct 13 05:34:15 ns308116 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186 user=root ... |
2020-10-13 12:50:57 |
| 45.148.10.15 | attack | Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15 Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: Invalid user user from 45.148.10.15 Oct 12 23:36:08 srv-ubuntu-dev3 sshd[31523]: Failed password for invalid user user from 45.148.10.15 port 40704 ssh2 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15 Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15 Oct 12 23:36:40 srv-ubuntu-dev3 sshd[31590]: Failed password for invalid user 123Diego from 45.148.10.15 port 59760 ssh2 Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: Invalid user Alphanetworks from 45.148.10.15 Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh ... |
2020-10-13 05:40:39 |
| 45.148.10.186 | attack | Fail2Ban |
2020-10-13 05:39:02 |
| 45.148.10.15 | attackbotsspam | Fail2Ban |
2020-10-12 05:52:51 |
| 45.148.10.65 | attackbots | Invalid user ubuntu from 45.148.10.65 port 43138 |
2020-10-12 05:36:52 |
| 45.148.10.15 | attack | Brute force attempt |
2020-10-11 21:59:38 |
| 45.148.10.65 | attackspam | Oct 01 10:49:15 host sshd[12378]: Invalid user ubuntu from 45.148.10.65 port 41060 |
2020-10-11 21:43:21 |
| 45.148.10.28 | attack | Fail2Ban automatic report: SSH brute-force: |
2020-10-11 21:05:28 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.10.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.148.10.99. IN A
;; AUTHORITY SECTION:
. 190 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020021200 1800 900 604800 86400
;; Query time: 227 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 23:35:29 CST 2020
;; MSG SIZE rcvd: 116
Host 99.10.148.45.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 99.10.148.45.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 133.130.113.207 | attackbotsspam | Jun 21 07:17:45 pkdns2 sshd\[35973\]: Invalid user qswang from 133.130.113.207Jun 21 07:17:48 pkdns2 sshd\[35973\]: Failed password for invalid user qswang from 133.130.113.207 port 47606 ssh2Jun 21 07:21:30 pkdns2 sshd\[36137\]: Invalid user telegram from 133.130.113.207Jun 21 07:21:33 pkdns2 sshd\[36137\]: Failed password for invalid user telegram from 133.130.113.207 port 48846 ssh2Jun 21 07:25:12 pkdns2 sshd\[36296\]: Invalid user trainee from 133.130.113.207Jun 21 07:25:14 pkdns2 sshd\[36296\]: Failed password for invalid user trainee from 133.130.113.207 port 50088 ssh2 ... |
2020-06-21 12:44:10 |
| 68.69.167.149 | attackspambots | Invalid user ronald from 68.69.167.149 port 40470 |
2020-06-21 12:05:08 |
| 183.134.217.162 | attack | leo_www |
2020-06-21 12:34:54 |
| 121.69.89.78 | attackbotsspam | Jun 21 06:30:21 [host] sshd[4971]: Invalid user ar Jun 21 06:30:21 [host] sshd[4971]: pam_unix(sshd:a Jun 21 06:30:22 [host] sshd[4971]: Failed password |
2020-06-21 12:32:38 |
| 222.201.139.62 | attackspambots | Jun 21 03:57:22 ip-172-31-61-156 sshd[25683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.201.139.62 Jun 21 03:57:22 ip-172-31-61-156 sshd[25683]: Invalid user furukawa from 222.201.139.62 Jun 21 03:57:24 ip-172-31-61-156 sshd[25683]: Failed password for invalid user furukawa from 222.201.139.62 port 51144 ssh2 Jun 21 03:58:55 ip-172-31-61-156 sshd[25734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.201.139.62 user=root Jun 21 03:58:57 ip-172-31-61-156 sshd[25734]: Failed password for root from 222.201.139.62 port 60479 ssh2 ... |
2020-06-21 12:46:23 |
| 213.153.155.96 | attackspambots | DATE:2020-06-21 05:59:52, IP:213.153.155.96, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2020-06-21 12:04:34 |
| 202.103.37.40 | attackbotsspam | Jun 21 05:54:38 inter-technics sshd[26914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.103.37.40 user=root Jun 21 05:54:39 inter-technics sshd[26914]: Failed password for root from 202.103.37.40 port 41558 ssh2 Jun 21 05:58:32 inter-technics sshd[27174]: Invalid user factorio from 202.103.37.40 port 34622 Jun 21 05:58:32 inter-technics sshd[27174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.103.37.40 Jun 21 05:58:32 inter-technics sshd[27174]: Invalid user factorio from 202.103.37.40 port 34622 Jun 21 05:58:34 inter-technics sshd[27174]: Failed password for invalid user factorio from 202.103.37.40 port 34622 ssh2 ... |
2020-06-21 12:15:19 |
| 106.12.69.35 | attack | Jun 21 04:11:25 onepixel sshd[3929032]: Invalid user mve from 106.12.69.35 port 50412 Jun 21 04:11:25 onepixel sshd[3929032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.69.35 Jun 21 04:11:25 onepixel sshd[3929032]: Invalid user mve from 106.12.69.35 port 50412 Jun 21 04:11:27 onepixel sshd[3929032]: Failed password for invalid user mve from 106.12.69.35 port 50412 ssh2 Jun 21 04:15:24 onepixel sshd[3930841]: Invalid user ny from 106.12.69.35 port 40368 |
2020-06-21 12:18:10 |
| 14.189.173.164 | attackspambots | 20/6/20@23:59:41: FAIL: Alarm-Network address from=14.189.173.164 ... |
2020-06-21 12:09:44 |
| 218.4.239.146 | attackbots | Suspicious access to SMTP/POP/IMAP services. |
2020-06-21 12:17:39 |
| 185.53.88.198 | attackbotsspam | LGS,DEF GET /admin/ |
2020-06-21 12:23:26 |
| 51.161.109.105 | attackspam | 2020-06-21T05:56:04.223503vps751288.ovh.net sshd\[32426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip105.ip-51-161-109.net user=root 2020-06-21T05:56:06.693694vps751288.ovh.net sshd\[32426\]: Failed password for root from 51.161.109.105 port 57056 ssh2 2020-06-21T05:59:27.609337vps751288.ovh.net sshd\[32482\]: Invalid user jxl from 51.161.109.105 port 58574 2020-06-21T05:59:27.618588vps751288.ovh.net sshd\[32482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip105.ip-51-161-109.net 2020-06-21T05:59:29.619209vps751288.ovh.net sshd\[32482\]: Failed password for invalid user jxl from 51.161.109.105 port 58574 ssh2 |
2020-06-21 12:22:36 |
| 194.5.193.141 | attackspambots | $f2bV_matches |
2020-06-21 12:25:44 |
| 167.99.224.160 | attackbots | Jun 21 05:59:21 jane sshd[10198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.224.160 Jun 21 05:59:22 jane sshd[10198]: Failed password for invalid user teamspeak from 167.99.224.160 port 36470 ssh2 ... |
2020-06-21 12:26:35 |
| 129.204.147.84 | attack | $f2bV_matches |
2020-06-21 12:29:49 |