City: unknown
Region: unknown
Country: Russian Federation
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.80.104.195 | attackbots | Chat Spam |
2020-08-18 08:30:32 |
| 45.80.104.119 | attackbots | 9.260.741,85-03/02 [bc18/m74] PostRequest-Spammer scoring: Lusaka01 |
2019-11-20 07:30:46 |
| 45.80.104.152 | attack | Name: 'gekllokjwer' Street: 'DXJXKCusGwzJU' City: 'chOjdNXZYEVOMtMwe' Zip: 'DeRgRoRKaO' Message: 'Ñåìåé Ïÿòèãîðñê Àòûðàó, Êàçàõñòàí êóïèòü Ýêñòàçè (Mdma) Äçåðæèíñê Äåðáåíò Àõàíãàìà, Øðè-Ëàíêà êóïèòü Ñêîðîñòü ÑÊ êðèñòàëëû (ñîëü-Àëüôà-ÏÂÏ) Îáíèíñê Ìàãíèòîãîðñê |
2019-10-22 05:11:19 |
| 45.80.104.101 | attackbots | 45.80.104.101 - - [20/Oct/2019:07:59:55 -0400] "GET /?page=..%2f..%2f..%2fetc%2fpasswd&action=view&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 16395 "https://newportbrassfaucets.com/?page=..%2f..%2f..%2fetc%2fpasswd&action=view&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36" ... |
2019-10-21 01:15:22 |
| 45.80.104.109 | attackspambots | 45.80.104.109 - - [20/Oct/2019:08:03:33 -0400] "GET /?page=products&action=..%2f..%2fetc%2fpasswd%00&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 17152 "https://newportbrassfaucets.com/?page=products&action=..%2f..%2fetc%2fpasswd%00&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36" ... |
2019-10-20 21:57:02 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.80.104.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.80.104.142. IN A
;; AUTHORITY SECTION:
. 469 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 152 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:14:41 CST 2022
;; MSG SIZE rcvd: 106
Host 142.104.80.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.104.80.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.208.112.240 | attackspam | 2020-04-11T04:44:03.156364abusebot-2.cloudsearch.cf sshd[5463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.112.240 user=root 2020-04-11T04:44:05.242346abusebot-2.cloudsearch.cf sshd[5463]: Failed password for root from 182.208.112.240 port 62516 ssh2 2020-04-11T04:47:54.686773abusebot-2.cloudsearch.cf sshd[5669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.112.240 user=root 2020-04-11T04:47:56.486215abusebot-2.cloudsearch.cf sshd[5669]: Failed password for root from 182.208.112.240 port 62535 ssh2 2020-04-11T04:51:44.989545abusebot-2.cloudsearch.cf sshd[6022]: Invalid user maya from 182.208.112.240 port 62542 2020-04-11T04:51:45.004874abusebot-2.cloudsearch.cf sshd[6022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.112.240 2020-04-11T04:51:44.989545abusebot-2.cloudsearch.cf sshd[6022]: Invalid user maya from 182.208.112.240 port ... |
2020-04-11 15:34:08 |
| 178.128.121.180 | attackspambots | Apr 11 09:17:22 OPSO sshd\[21224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.180 user=root Apr 11 09:17:24 OPSO sshd\[21224\]: Failed password for root from 178.128.121.180 port 35380 ssh2 Apr 11 09:21:36 OPSO sshd\[22385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.180 user=root Apr 11 09:21:38 OPSO sshd\[22385\]: Failed password for root from 178.128.121.180 port 44876 ssh2 Apr 11 09:25:37 OPSO sshd\[23292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.180 user=root |
2020-04-11 15:28:18 |
| 14.160.123.231 | attackspambots | Unauthorized connection attempt from IP address 14.160.123.231 on Port 445(SMB) |
2020-04-11 15:21:21 |
| 118.24.232.241 | attackbots | Apr 11 09:06:57 markkoudstaal sshd[20289]: Failed password for root from 118.24.232.241 port 60628 ssh2 Apr 11 09:09:16 markkoudstaal sshd[20581]: Failed password for root from 118.24.232.241 port 57222 ssh2 |
2020-04-11 15:16:57 |
| 222.186.175.140 | attackbotsspam | port scan and connect, tcp 22 (ssh) |
2020-04-11 15:31:40 |
| 59.124.127.186 | attack | 20/4/11@02:38:08: FAIL: Alarm-Network address from=59.124.127.186 20/4/11@02:38:08: FAIL: Alarm-Network address from=59.124.127.186 ... |
2020-04-11 15:30:23 |
| 113.11.255.28 | attack | Invalid user ubuntu from 113.11.255.28 port 51834 |
2020-04-11 15:01:16 |
| 51.158.120.255 | attackbots | SSH login attempts. |
2020-04-11 15:11:51 |
| 213.32.23.58 | attackspam | Automatic report BANNED IP |
2020-04-11 15:25:26 |
| 108.5.106.131 | attackspambots | Apr 11 09:03:40 mout sshd[26033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.5.106.131 user=root Apr 11 09:03:42 mout sshd[26033]: Failed password for root from 108.5.106.131 port 34712 ssh2 Apr 11 09:07:04 mout sshd[26165]: Invalid user ivan from 108.5.106.131 port 48607 |
2020-04-11 15:10:15 |
| 203.195.235.135 | attack | Apr 11 06:51:37 eventyay sshd[864]: Failed password for root from 203.195.235.135 port 35740 ssh2 Apr 11 06:55:09 eventyay sshd[932]: Failed password for root from 203.195.235.135 port 50602 ssh2 ... |
2020-04-11 15:11:08 |
| 45.133.99.14 | attackbotsspam | Apr 11 09:22:16 srv01 postfix/smtpd\[30834\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 11 09:22:33 srv01 postfix/smtpd\[30834\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 11 09:33:00 srv01 postfix/smtpd\[30834\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 11 09:33:16 srv01 postfix/smtpd\[25092\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 11 09:33:32 srv01 postfix/smtpd\[31890\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-04-11 15:37:57 |
| 219.75.134.27 | attack | Apr 11 08:46:28 nextcloud sshd\[28095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27 user=root Apr 11 08:46:30 nextcloud sshd\[28095\]: Failed password for root from 219.75.134.27 port 57532 ssh2 Apr 11 09:00:28 nextcloud sshd\[14779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27 user=root |
2020-04-11 15:11:38 |
| 123.119.48.149 | attackspambots | [portscan] Port scan |
2020-04-11 14:57:37 |
| 45.83.118.106 | attackspam | [2020-04-11 03:16:58] NOTICE[12114][C-000041ee] chan_sip.c: Call from '' (45.83.118.106:50222) to extension '701146842002315' rejected because extension not found in context 'public'. [2020-04-11 03:16:58] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-11T03:16:58.886-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="701146842002315",SessionID="0x7f020c08adb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.83.118.106/50222",ACLName="no_extension_match" [2020-04-11 03:21:04] NOTICE[12114][C-000041f8] chan_sip.c: Call from '' (45.83.118.106:61698) to extension '9901146842002315' rejected because extension not found in context 'public'. [2020-04-11 03:21:04] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-11T03:21:04.430-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9901146842002315",SessionID="0x7f020c08adb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV ... |
2020-04-11 15:25:12 |