City: unknown
Region: unknown
Country: United States of America
Internet Service Provider: DigitalOcean LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attackspambots | fail2ban detected bruce force on ssh iptables |
2020-10-13 01:42:53 |
| attack | Oct 12 08:11:35 xeon sshd[43682]: Failed password for root from 45.55.52.145 port 43538 ssh2 |
2020-10-12 17:05:41 |
| attack | SSH Invalid Login |
2020-10-07 07:12:43 |
| attack | sshd: Failed password for .... from 45.55.52.145 port 12902 ssh2 (8 attempts) |
2020-10-06 23:33:51 |
| attackbotsspam | Oct 6 06:49:04 jumpserver sshd[520203]: Failed password for root from 45.55.52.145 port 45042 ssh2 Oct 6 06:53:10 jumpserver sshd[520308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.52.145 user=root Oct 6 06:53:11 jumpserver sshd[520308]: Failed password for root from 45.55.52.145 port 43301 ssh2 ... |
2020-10-06 15:22:48 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.55.52.13 | attack | WordPress brute force |
2020-06-04 05:14:28 |
| 45.55.52.223 | attackspam | Unauthorized connection attempt detected, IP banned. |
2020-03-01 09:28:18 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.55.52.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.55.52.145. IN A
;; AUTHORITY SECTION:
. 500 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020100600 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 06 15:22:44 CST 2020
;; MSG SIZE rcvd: 116
Host 145.52.55.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 145.52.55.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.154.108.203 | attackbotsspam | Nov 29 12:38:57 server sshd\[12169\]: Invalid user server from 195.154.108.203 Nov 29 12:38:57 server sshd\[12169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-108-203.rev.poneytelecom.eu Nov 29 12:39:00 server sshd\[12169\]: Failed password for invalid user server from 195.154.108.203 port 45144 ssh2 Nov 29 12:56:35 server sshd\[16845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-108-203.rev.poneytelecom.eu user=root Nov 29 12:56:38 server sshd\[16845\]: Failed password for root from 195.154.108.203 port 54410 ssh2 ... |
2019-11-29 22:08:41 |
| 61.42.1.203 | attackspam | Unauthorized connection attempt from IP address 61.42.1.203 on Port 445(SMB) |
2019-11-29 22:27:38 |
| 217.70.188.144 | attackbots | Nov 29 15:26:01 cvbnet sshd[13485]: Failed password for root from 217.70.188.144 port 34672 ssh2 ... |
2019-11-29 22:33:39 |
| 84.42.75.242 | attack | DATE:2019-11-29 15:29:32, IP:84.42.75.242, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2019-11-29 22:39:04 |
| 177.101.245.180 | attackbots | Unauthorized connection attempt from IP address 177.101.245.180 on Port 445(SMB) |
2019-11-29 22:12:08 |
| 66.131.143.17 | attackspambots | FW IP Spoofing Attempt Detected; Interface mismatch: expected= for TCP 66.131.143.17:63246 (dhcp) -> XX.XXX.XXX.XXX:XXX |
2019-11-29 22:45:50 |
| 77.222.101.10 | attackbotsspam | Unauthorized connection attempt from IP address 77.222.101.10 on Port 445(SMB) |
2019-11-29 22:26:00 |
| 59.115.126.105 | attackspambots | Port 22 Scan, PTR: 59-115-126-105.dynamic-ip.hinet.net. |
2019-11-29 22:30:19 |
| 164.132.104.58 | attackspambots | 2019-11-29T08:17:25.962459shield sshd\[7358\]: Invalid user hyunkie from 164.132.104.58 port 33276 2019-11-29T08:17:25.967276shield sshd\[7358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-164-132-104.eu 2019-11-29T08:17:28.383483shield sshd\[7358\]: Failed password for invalid user hyunkie from 164.132.104.58 port 33276 ssh2 2019-11-29T08:21:23.110567shield sshd\[8230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-164-132-104.eu user=root 2019-11-29T08:21:24.864730shield sshd\[8230\]: Failed password for root from 164.132.104.58 port 42190 ssh2 |
2019-11-29 22:17:14 |
| 212.51.156.48 | attackbotsspam | 2019-11-29T15:29:29.972144scmdmz1 sshd\[1957\]: Invalid user pi from 212.51.156.48 port 41940 2019-11-29T15:29:29.973344scmdmz1 sshd\[1959\]: Invalid user pi from 212.51.156.48 port 41944 2019-11-29T15:29:30.000969scmdmz1 sshd\[1959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.51.156.48 2019-11-29T15:29:30.000970scmdmz1 sshd\[1957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.51.156.48 ... |
2019-11-29 22:39:23 |
| 37.79.130.67 | attackbots | Unauthorized connection attempt from IP address 37.79.130.67 on Port 445(SMB) |
2019-11-29 22:27:05 |
| 121.137.106.165 | attackbots | Nov 29 14:00:20 server sshd\[1513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.137.106.165 user=root Nov 29 14:00:22 server sshd\[1513\]: Failed password for root from 121.137.106.165 port 53378 ssh2 Nov 29 14:18:55 server sshd\[5919\]: Invalid user twofirst from 121.137.106.165 Nov 29 14:18:55 server sshd\[5919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.137.106.165 Nov 29 14:18:57 server sshd\[5919\]: Failed password for invalid user twofirst from 121.137.106.165 port 32788 ssh2 ... |
2019-11-29 22:10:23 |
| 123.125.71.14 | attack | Bad bot/spoofed identity |
2019-11-29 22:37:44 |
| 139.59.7.76 | attack | Nov 29 15:21:03 lnxded64 sshd[392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.76 Nov 29 15:21:05 lnxded64 sshd[392]: Failed password for invalid user carey from 139.59.7.76 port 56204 ssh2 Nov 29 15:29:42 lnxded64 sshd[2511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.76 |
2019-11-29 22:30:44 |
| 151.80.42.234 | attack | Nov 29 19:29:27 gw1 sshd[28150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.42.234 Nov 29 19:29:28 gw1 sshd[28150]: Failed password for invalid user bets from 151.80.42.234 port 35484 ssh2 ... |
2019-11-29 22:40:32 |