City: Realeza
Region: Parana
Country: Brazil
Internet Service Provider: Asm Equipamentos de Informatica Ltda
Hostname: unknown
Organization: unknown
Usage Type: Fixed Line ISP
| Type | Details | Datetime |
|---|---|---|
| attack | Jul 29 02:28:48 server sshd\[28498\]: User root from 45.160.149.47 not allowed because listed in DenyUsers Jul 29 02:28:48 server sshd\[28498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.47 user=root Jul 29 02:28:50 server sshd\[28498\]: Failed password for invalid user root from 45.160.149.47 port 49650 ssh2 Jul 29 02:34:26 server sshd\[5864\]: Invalid user com from 45.160.149.47 port 44972 Jul 29 02:34:26 server sshd\[5864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.47 |
2019-07-29 13:18:42 |
| attackspambots | Jul 27 19:32:03 yabzik sshd[944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.47 Jul 27 19:32:05 yabzik sshd[944]: Failed password for invalid user welc0m3 from 45.160.149.47 port 37258 ssh2 Jul 27 19:38:02 yabzik sshd[3223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.47 |
2019-07-28 03:09:10 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.160.149.4 | attackbots | Sep 3 13:23:34 markkoudstaal sshd[17023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.4 Sep 3 13:23:36 markkoudstaal sshd[17023]: Failed password for invalid user franbella from 45.160.149.4 port 41714 ssh2 Sep 3 13:28:47 markkoudstaal sshd[17494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.4 |
2019-09-04 00:11:35 |
| 45.160.149.46 | attackbots | 2019-08-13T10:23:07.767021abusebot-4.cloudsearch.cf sshd\[28586\]: Invalid user vic from 45.160.149.46 port 57620 |
2019-08-14 01:54:04 |
| 45.160.149.46 | attackbotsspam | Aug 10 16:57:00 www4 sshd\[20646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.46 user=root Aug 10 16:57:02 www4 sshd\[20646\]: Failed password for root from 45.160.149.46 port 47156 ssh2 Aug 10 17:02:30 www4 sshd\[21424\]: Invalid user tgz from 45.160.149.46 ... |
2019-08-10 22:06:25 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.160.149.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44782
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.160.149.47. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072700 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 28 03:09:04 CST 2019
;; MSG SIZE rcvd: 117
Host 47.149.160.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 47.149.160.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.105.1.49 | attack | Unauthorized connection attempt detected from IP address 5.105.1.49 to port 222 [J] |
2020-01-27 00:31:59 |
| 77.42.93.100 | attack | Unauthorized connection attempt detected from IP address 77.42.93.100 to port 23 [J] |
2020-01-27 00:27:34 |
| 124.235.138.75 | attackspambots | Unauthorized connection attempt detected from IP address 124.235.138.75 to port 8081 [J] |
2020-01-27 00:44:29 |
| 123.145.37.225 | attackbots | Unauthorized connection attempt detected from IP address 123.145.37.225 to port 8081 [J] |
2020-01-27 00:18:03 |
| 119.18.154.170 | attackspambots | Unauthorized connection attempt detected from IP address 119.18.154.170 to port 80 [J] |
2020-01-27 00:46:01 |
| 216.230.142.22 | attackspambots | Unauthorized connection attempt detected from IP address 216.230.142.22 to port 23 [J] |
2020-01-27 00:35:04 |
| 85.135.87.50 | attack | Unauthorized connection attempt detected from IP address 85.135.87.50 to port 2220 [J] |
2020-01-27 00:24:09 |
| 212.64.60.187 | attack | Jan 26 16:33:02 OPSO sshd\[29016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.60.187 user=root Jan 26 16:33:04 OPSO sshd\[29016\]: Failed password for root from 212.64.60.187 port 44900 ssh2 Jan 26 16:37:54 OPSO sshd\[29717\]: Invalid user elsa from 212.64.60.187 port 36546 Jan 26 16:37:54 OPSO sshd\[29717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.60.187 Jan 26 16:37:57 OPSO sshd\[29717\]: Failed password for invalid user elsa from 212.64.60.187 port 36546 ssh2 |
2020-01-27 00:03:48 |
| 185.156.177.169 | attackspambots | Unauthorized connection attempt detected from IP address 185.156.177.169 to port 3002 [J] |
2020-01-27 00:39:52 |
| 213.57.29.57 | attackspambots | Unauthorized connection attempt detected from IP address 213.57.29.57 to port 81 [J] |
2020-01-27 00:35:23 |
| 186.178.6.42 | attack | Unauthorized connection attempt detected from IP address 186.178.6.42 to port 445 |
2020-01-27 00:09:37 |
| 216.218.139.75 | attackbots | Jan 26 16:13:16 hosting sshd[12224]: Invalid user www from 216.218.139.75 port 54042 ... |
2020-01-27 00:06:09 |
| 85.140.214.21 | attackspam | Unauthorized connection attempt detected from IP address 85.140.214.21 to port 23 [J] |
2020-01-27 00:23:39 |
| 170.106.36.137 | attackbots | Unauthorized connection attempt detected from IP address 170.106.36.137 to port 6666 [J] |
2020-01-27 00:42:54 |
| 87.191.22.125 | attack | 26.01.2020 14:13:18 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2020-01-27 00:08:09 |