City: unknown
Region: unknown
Country: United States
Internet Service Provider: DigitalOcean LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attackspambots | May 31 22:31:04 nas sshd[28961]: Failed password for root from 45.55.210.248 port 59051 ssh2 May 31 22:39:45 nas sshd[29154]: Failed password for root from 45.55.210.248 port 35256 ssh2 ... |
2020-06-01 05:06:09 |
| attack | DATE:2020-05-24 23:43:50, IP:45.55.210.248, PORT:ssh SSH brute force auth (docker-dc) |
2020-05-25 06:46:13 |
| attackbots | May 21 22:39:25 vps687878 sshd\[29359\]: Invalid user cbs from 45.55.210.248 port 38921 May 21 22:39:25 vps687878 sshd\[29359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 May 21 22:39:27 vps687878 sshd\[29359\]: Failed password for invalid user cbs from 45.55.210.248 port 38921 ssh2 May 21 22:44:18 vps687878 sshd\[29845\]: Invalid user hta from 45.55.210.248 port 51421 May 21 22:44:18 vps687878 sshd\[29845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 ... |
2020-05-22 04:52:00 |
| attack | May 15 08:17:29 buvik sshd[22994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 May 15 08:17:31 buvik sshd[22994]: Failed password for invalid user vnc from 45.55.210.248 port 54789 ssh2 May 15 08:21:09 buvik sshd[23582]: Invalid user blower from 45.55.210.248 ... |
2020-05-15 14:32:35 |
| attackbotsspam | May 5 04:46:51 lock-38 sshd[1947879]: Disconnected from authenticating user root 45.55.210.248 port 38010 [preauth] May 5 05:00:31 lock-38 sshd[1948207]: Invalid user ln from 45.55.210.248 port 43790 May 5 05:00:31 lock-38 sshd[1948207]: Invalid user ln from 45.55.210.248 port 43790 May 5 05:00:31 lock-38 sshd[1948207]: Failed password for invalid user ln from 45.55.210.248 port 43790 ssh2 May 5 05:00:31 lock-38 sshd[1948207]: Disconnected from invalid user ln 45.55.210.248 port 43790 [preauth] ... |
2020-05-05 13:52:41 |
| attackspam | May 3 12:01:54 ift sshd\[12583\]: Failed password for root from 45.55.210.248 port 54712 ssh2May 3 12:04:06 ift sshd\[12745\]: Failed password for root from 45.55.210.248 port 45193 ssh2May 3 12:06:18 ift sshd\[13200\]: Invalid user jun from 45.55.210.248May 3 12:06:20 ift sshd\[13200\]: Failed password for invalid user jun from 45.55.210.248 port 35674 ssh2May 3 12:08:38 ift sshd\[13519\]: Invalid user ota from 45.55.210.248 ... |
2020-05-03 17:42:07 |
| attackbotsspam | *Port Scan* detected from 45.55.210.248 (US/United States/New Jersey/Clifton/-). 4 hits in the last 280 seconds |
2020-04-28 21:57:38 |
| attack | Apr 11 22:48:17 gw1 sshd[1896]: Failed password for root from 45.55.210.248 port 34890 ssh2 ... |
2020-04-12 02:05:23 |
| attackbotsspam | detected by Fail2Ban |
2020-04-11 17:36:43 |
| attack | Apr 7 16:29:30 eventyay sshd[3834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Apr 7 16:29:32 eventyay sshd[3834]: Failed password for invalid user sabrina from 45.55.210.248 port 56537 ssh2 Apr 7 16:33:20 eventyay sshd[3930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 ... |
2020-04-07 23:06:51 |
| attackspambots | Apr 6 00:42:20 cloud sshd[21181]: Failed password for root from 45.55.210.248 port 58635 ssh2 |
2020-04-06 07:58:46 |
| attack | Apr 4 10:53:25 santamaria sshd\[17107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 user=root Apr 4 10:53:27 santamaria sshd\[17107\]: Failed password for root from 45.55.210.248 port 42373 ssh2 Apr 4 10:57:12 santamaria sshd\[17161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 user=root ... |
2020-04-04 20:49:52 |
| attackspam | Invalid user hue from 45.55.210.248 port 52513 |
2020-04-01 18:24:00 |
| attackspambots | Mar 29 20:53:04 ourumov-web sshd\[18500\]: Invalid user tbh from 45.55.210.248 port 42142 Mar 29 20:53:04 ourumov-web sshd\[18500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Mar 29 20:53:05 ourumov-web sshd\[18500\]: Failed password for invalid user tbh from 45.55.210.248 port 42142 ssh2 ... |
2020-03-30 03:31:47 |
| attack | k+ssh-bruteforce |
2020-03-25 04:52:36 |
| attackbots | SSH Invalid Login |
2020-03-23 07:37:09 |
| attack | SSH Brute-Force attacks |
2020-03-19 00:40:07 |
| attack | Mar 12 05:59:26 h2779839 sshd[16630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 user=root Mar 12 05:59:28 h2779839 sshd[16630]: Failed password for root from 45.55.210.248 port 44447 ssh2 Mar 12 06:03:18 h2779839 sshd[16763]: Invalid user gaop from 45.55.210.248 port 50322 Mar 12 06:03:18 h2779839 sshd[16763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Mar 12 06:03:18 h2779839 sshd[16763]: Invalid user gaop from 45.55.210.248 port 50322 Mar 12 06:03:21 h2779839 sshd[16763]: Failed password for invalid user gaop from 45.55.210.248 port 50322 ssh2 Mar 12 06:06:47 h2779839 sshd[16826]: Invalid user david from 45.55.210.248 port 56194 Mar 12 06:06:47 h2779839 sshd[16826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Mar 12 06:06:47 h2779839 sshd[16826]: Invalid user david from 45.55.210.248 port 56194 Mar 12 06:06:4 ... |
2020-03-12 14:02:23 |
| attackbotsspam | Feb 27 07:07:58 localhost sshd\[31740\]: Invalid user nexus from 45.55.210.248 port 54917 Feb 27 07:07:58 localhost sshd\[31740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Feb 27 07:08:00 localhost sshd\[31740\]: Failed password for invalid user nexus from 45.55.210.248 port 54917 ssh2 Feb 27 07:17:14 localhost sshd\[31951\]: Invalid user nathan from 45.55.210.248 port 49589 Feb 27 07:17:14 localhost sshd\[31951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 ... |
2020-02-27 15:24:54 |
| attack | SSH bruteforce |
2020-02-14 02:13:03 |
| attackbots | Unauthorized connection attempt detected from IP address 45.55.210.248 to port 2220 [J] |
2020-01-22 02:18:30 |
| attackspam | Jan 3 01:03:42 v22018086721571380 sshd[26072]: Failed password for invalid user esd from 45.55.210.248 port 58095 ssh2 Jan 3 02:04:33 v22018086721571380 sshd[32550]: Failed password for invalid user pos from 45.55.210.248 port 41133 ssh2 |
2020-01-03 09:22:21 |
| attackspambots | Jan 2 20:30:07 mout sshd[27057]: Invalid user administrador from 45.55.210.248 port 44908 |
2020-01-03 03:30:25 |
| attack | Dec 30 07:59:25 silence02 sshd[25927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Dec 30 07:59:26 silence02 sshd[25927]: Failed password for invalid user melis from 45.55.210.248 port 52952 ssh2 Dec 30 08:02:49 silence02 sshd[26060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 |
2019-12-30 15:09:09 |
| attackbotsspam | Dec 29 15:53:02 cvbnet sshd[2939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Dec 29 15:53:04 cvbnet sshd[2939]: Failed password for invalid user elena from 45.55.210.248 port 57088 ssh2 ... |
2019-12-30 00:18:24 |
| attack | Dec 23 01:02:54 tdfoods sshd\[27556\]: Invalid user meri from 45.55.210.248 Dec 23 01:02:54 tdfoods sshd\[27556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Dec 23 01:02:56 tdfoods sshd\[27556\]: Failed password for invalid user meri from 45.55.210.248 port 35209 ssh2 Dec 23 01:07:43 tdfoods sshd\[27994\]: Invalid user silvas from 45.55.210.248 Dec 23 01:07:43 tdfoods sshd\[27994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 |
2019-12-23 19:15:59 |
| attackbotsspam | Dec 22 22:27:34 ns381471 sshd[24427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Dec 22 22:27:37 ns381471 sshd[24427]: Failed password for invalid user wwwadmin from 45.55.210.248 port 47569 ssh2 |
2019-12-23 05:47:15 |
| attack | Dec 22 00:20:13 hanapaa sshd\[30657\]: Invalid user erin from 45.55.210.248 Dec 22 00:20:13 hanapaa sshd\[30657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Dec 22 00:20:15 hanapaa sshd\[30657\]: Failed password for invalid user erin from 45.55.210.248 port 52770 ssh2 Dec 22 00:26:05 hanapaa sshd\[31169\]: Invalid user hr from 45.55.210.248 Dec 22 00:26:05 hanapaa sshd\[31169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 |
2019-12-22 20:24:01 |
| attackspambots | Dec 19 14:12:49 hpm sshd\[21001\]: Invalid user eung from 45.55.210.248 Dec 19 14:12:49 hpm sshd\[21001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Dec 19 14:12:51 hpm sshd\[21001\]: Failed password for invalid user eung from 45.55.210.248 port 41173 ssh2 Dec 19 14:18:29 hpm sshd\[21526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 user=root Dec 19 14:18:30 hpm sshd\[21526\]: Failed password for root from 45.55.210.248 port 45481 ssh2 |
2019-12-20 08:27:39 |
| attackspam | Dec 10 19:37:01 root sshd[31236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 Dec 10 19:37:03 root sshd[31236]: Failed password for invalid user server from 45.55.210.248 port 51486 ssh2 Dec 10 19:43:02 root sshd[31449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248 ... |
2019-12-11 02:56:59 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.55.210.156 | attackspam | Wordpress brute force |
2019-07-21 17:25:49 |
| 45.55.210.156 | attack | Automatic report - Banned IP Access |
2019-07-20 10:04:43 |
| 45.55.210.156 | attack | Automatic report - Web App Attack |
2019-06-29 10:57:47 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.55.210.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.55.210.248. IN A
;; AUTHORITY SECTION:
. 474 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019100900 1800 900 604800 86400
;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 09 19:26:47 CST 2019
;; MSG SIZE rcvd: 117
Host 248.210.55.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 248.210.55.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.30.57 | attackspambots | Aug 23 13:12:50 rush sshd[5430]: Failed password for root from 222.186.30.57 port 13822 ssh2 Aug 23 13:12:53 rush sshd[5430]: Failed password for root from 222.186.30.57 port 13822 ssh2 Aug 23 13:12:55 rush sshd[5430]: Failed password for root from 222.186.30.57 port 13822 ssh2 ... |
2020-08-23 21:16:32 |
| 104.223.143.118 | attack | Aug 21 19:08:25 lvpxxxxxxx88-92-201-20 sshd[17166]: Address 104.223.143.118 maps to amazone.sendgridspot.live, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Aug 21 19:08:26 lvpxxxxxxx88-92-201-20 sshd[17166]: Failed password for invalid user jsk from 104.223.143.118 port 49298 ssh2 Aug 21 19:08:27 lvpxxxxxxx88-92-201-20 sshd[17166]: Received disconnect from 104.223.143.118: 11: Bye Bye [preauth] Aug 21 19:10:10 lvpxxxxxxx88-92-201-20 sshd[17242]: Address 104.223.143.118 maps to amazone.sendgridspot.live, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Aug 21 19:10:10 lvpxxxxxxx88-92-201-20 sshd[17242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.223.143.118 user=r.r Aug 21 19:10:12 lvpxxxxxxx88-92-201-20 sshd[17242]: Failed password for r.r from 104.223.143.118 port 47296 ssh2 Aug 21 19:10:13 lvpxxxxxxx88-92-201-20 sshd[17242]: Received disconnect from 104.223.143.118: 11: B........ ------------------------------- |
2020-08-23 21:17:47 |
| 106.13.231.103 | attack | Aug 23 06:35:36 Host-KLAX-C sshd[24135]: Invalid user nat from 106.13.231.103 port 55920 ... |
2020-08-23 21:15:17 |
| 51.75.140.153 | attackspambots | $f2bV_matches |
2020-08-23 21:04:04 |
| 87.251.85.228 | attackbotsspam | Sending SPAM email |
2020-08-23 20:49:46 |
| 112.85.42.174 | attackbots | 2020-08-23T15:04:33.974261galaxy.wi.uni-potsdam.de sshd[4175]: Failed password for root from 112.85.42.174 port 58671 ssh2 2020-08-23T15:04:37.366745galaxy.wi.uni-potsdam.de sshd[4175]: Failed password for root from 112.85.42.174 port 58671 ssh2 2020-08-23T15:04:40.838115galaxy.wi.uni-potsdam.de sshd[4175]: Failed password for root from 112.85.42.174 port 58671 ssh2 2020-08-23T15:04:44.527110galaxy.wi.uni-potsdam.de sshd[4175]: Failed password for root from 112.85.42.174 port 58671 ssh2 2020-08-23T15:04:44.527304galaxy.wi.uni-potsdam.de sshd[4175]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 58671 ssh2 [preauth] 2020-08-23T15:04:44.527340galaxy.wi.uni-potsdam.de sshd[4175]: Disconnecting: Too many authentication failures [preauth] 2020-08-23T15:04:48.428009galaxy.wi.uni-potsdam.de sshd[4215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root 2020-08-23T15:04:50.670374galaxy.wi.uni-potsda ... |
2020-08-23 21:05:38 |
| 213.32.78.219 | attackspam | Aug 23 14:24:40 * sshd[28401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.78.219 Aug 23 14:24:42 * sshd[28401]: Failed password for invalid user sq from 213.32.78.219 port 43532 ssh2 |
2020-08-23 21:24:46 |
| 121.132.168.184 | attackspam | 2020-08-23T14:24:23.836465vps751288.ovh.net sshd\[4794\]: Invalid user dev2 from 121.132.168.184 port 37924 2020-08-23T14:24:23.843921vps751288.ovh.net sshd\[4794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.168.184 2020-08-23T14:24:26.178309vps751288.ovh.net sshd\[4794\]: Failed password for invalid user dev2 from 121.132.168.184 port 37924 ssh2 2020-08-23T14:25:04.915898vps751288.ovh.net sshd\[4806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.168.184 user=root 2020-08-23T14:25:07.210390vps751288.ovh.net sshd\[4806\]: Failed password for root from 121.132.168.184 port 46356 ssh2 |
2020-08-23 20:59:48 |
| 209.97.138.97 | attack | 209.97.138.97 - - [23/Aug/2020:14:25:13 +0200] "GET /wp-login.php HTTP/1.1" 200 9040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 209.97.138.97 - - [23/Aug/2020:14:25:15 +0200] "POST /wp-login.php HTTP/1.1" 200 9291 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 209.97.138.97 - - [23/Aug/2020:14:25:16 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-23 20:48:09 |
| 154.221.16.218 | attack | Aug 23 14:25:15 ns381471 sshd[17391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.16.218 Aug 23 14:25:16 ns381471 sshd[17391]: Failed password for invalid user zxg from 154.221.16.218 port 53760 ssh2 |
2020-08-23 20:48:33 |
| 101.251.219.100 | attackbotsspam | Aug 23 08:24:38 Tower sshd[37435]: Connection from 101.251.219.100 port 34546 on 192.168.10.220 port 22 rdomain "" Aug 23 08:24:42 Tower sshd[37435]: Failed password for root from 101.251.219.100 port 34546 ssh2 Aug 23 08:24:43 Tower sshd[37435]: Received disconnect from 101.251.219.100 port 34546:11: Bye Bye [preauth] Aug 23 08:24:43 Tower sshd[37435]: Disconnected from authenticating user root 101.251.219.100 port 34546 [preauth] |
2020-08-23 21:00:10 |
| 54.39.151.44 | attack | Aug 23 14:13:39 Invalid user wcj from 54.39.151.44 port 45242 |
2020-08-23 21:03:27 |
| 188.131.178.32 | attackbotsspam | detected by Fail2Ban |
2020-08-23 20:54:41 |
| 190.21.56.179 | attackbots | 2020-08-23T12:41:13.844376shield sshd\[21227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-21-56-179.baf.movistar.cl user=root 2020-08-23T12:41:15.840119shield sshd\[21227\]: Failed password for root from 190.21.56.179 port 39286 ssh2 2020-08-23T12:45:31.880137shield sshd\[22541\]: Invalid user front from 190.21.56.179 port 39338 2020-08-23T12:45:31.889199shield sshd\[22541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-21-56-179.baf.movistar.cl 2020-08-23T12:45:34.337195shield sshd\[22541\]: Failed password for invalid user front from 190.21.56.179 port 39338 ssh2 |
2020-08-23 20:56:40 |
| 118.193.35.172 | attackspambots | [ssh] SSH attack |
2020-08-23 20:55:30 |