City: unknown
Region: unknown
Country: United States
Internet Service Provider: DigitalOcean LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackbotsspam | familiengesundheitszentrum-fulda.de 45.55.34.87 \[28/Jul/2019:23:20:00 +0200\] "POST /wp-login.php HTTP/1.1" 200 5692 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" familiengesundheitszentrum-fulda.de 45.55.34.87 \[28/Jul/2019:23:20:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 5687 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-07-29 12:48:41 |
attackspam | 45.55.34.87 - - [26/Jul/2019:02:53:39 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 45.55.34.87 - - [26/Jul/2019:02:53:39 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 45.55.34.87 - - [26/Jul/2019:02:53:40 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 45.55.34.87 - - [26/Jul/2019:02:53:40 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 45.55.34.87 - - [26/Jul/2019:02:53:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 45.55.34.87 - - [26/Jul/2019:02:53:41 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-07-26 16:29:36 |
IP | Type | Details | Datetime |
---|---|---|---|
45.55.34.91 | attack | Port Scan detected! ... |
2020-06-03 17:17:22 |
45.55.34.91 | attack | firewall-block, port(s): 9102/tcp |
2020-04-27 21:38:15 |
45.55.34.91 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 10025 resulting in total of 3 scans from 45.55.0.0/16 block. |
2020-04-26 00:02:33 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.55.34.87
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31323
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.55.34.87. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072600 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 26 16:29:30 CST 2019
;; MSG SIZE rcvd: 115
Host 87.34.55.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 87.34.55.45.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
140.143.136.89 | attack | Feb 22 04:00:45 firewall sshd[32702]: Invalid user squad from 140.143.136.89 Feb 22 04:00:47 firewall sshd[32702]: Failed password for invalid user squad from 140.143.136.89 port 46776 ssh2 Feb 22 04:05:15 firewall sshd[370]: Invalid user bitrix from 140.143.136.89 ... |
2020-02-22 15:20:35 |
213.140.144.122 | attackspam | RDP Bruteforce |
2020-02-22 15:37:47 |
114.67.104.242 | attackspam | Invalid user simran from 114.67.104.242 port 53890 |
2020-02-22 15:26:21 |
210.121.223.61 | attackspambots | Invalid user mc3 from 210.121.223.61 port 41296 |
2020-02-22 15:26:39 |
92.63.194.22 | attackspambots | ssh intrusion attempt |
2020-02-22 15:28:21 |
14.235.241.73 | attack | Email rejected due to spam filtering |
2020-02-22 15:48:08 |
70.31.147.37 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-22 15:30:32 |
34.210.64.61 | attackbots | xmlrpc attack |
2020-02-22 15:45:24 |
37.49.226.117 | attackspam | " " |
2020-02-22 15:57:12 |
93.158.161.13 | attackspam | port scan and connect, tcp 80 (http) |
2020-02-22 15:39:25 |
181.115.156.59 | attackspambots | Feb 22 07:47:41 server sshd\[9898\]: Invalid user vserver from 181.115.156.59 Feb 22 07:47:41 server sshd\[9898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.115.156.59 Feb 22 07:47:44 server sshd\[9898\]: Failed password for invalid user vserver from 181.115.156.59 port 43914 ssh2 Feb 22 07:51:10 server sshd\[10572\]: Invalid user samba from 181.115.156.59 Feb 22 07:51:10 server sshd\[10572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.115.156.59 ... |
2020-02-22 15:30:12 |
1.220.185.149 | attack | Feb 22 07:31:27 nextcloud sshd\[31935\]: Invalid user admin from 1.220.185.149 Feb 22 07:31:27 nextcloud sshd\[31935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.220.185.149 Feb 22 07:31:30 nextcloud sshd\[31935\]: Failed password for invalid user admin from 1.220.185.149 port 13576 ssh2 |
2020-02-22 15:34:17 |
185.153.199.155 | attackbots | $f2bV_matches |
2020-02-22 15:41:22 |
93.174.95.73 | attackbotsspam | Feb 22 08:15:32 debian-2gb-nbg1-2 kernel: \[4614938.374186\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.95.73 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=26153 PROTO=TCP SPT=55399 DPT=8709 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-22 15:21:16 |
138.197.143.221 | attackbots | Invalid user user from 138.197.143.221 port 46076 |
2020-02-22 15:25:34 |