City: unknown
Region: unknown
Country: Albania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 46.252.45.29 | attack | This IP address is of a little 12 year old boy, he needs to be controlled by a guardian or parent. The things he says online to people is not very appropriate for others, he probably does this to get attention from older people. Please if anyone could come and teach him a lesson, it would be honestly necessary. This type of behavior gets you to a bad place and its a bad influence for other younger kids. This shows that the internet is a bad place for little kids like him. If you have anything else to ask or say, my email is pleasekillyourself85@gmail.com |
2023-08-04 00:59:13 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.252.45.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3609
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.252.45.135. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:25:40 CST 2022
;; MSG SIZE rcvd: 106
Host 135.45.252.46.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 135.45.252.46.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 161.35.103.140 | attackspambots | May 31 19:15:09 OPSO sshd\[11693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.103.140 user=root May 31 19:15:11 OPSO sshd\[11693\]: Failed password for root from 161.35.103.140 port 43734 ssh2 May 31 19:15:23 OPSO sshd\[11830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.103.140 user=root May 31 19:15:25 OPSO sshd\[11830\]: Failed password for root from 161.35.103.140 port 55132 ssh2 May 31 19:15:36 OPSO sshd\[11835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.103.140 user=root |
2020-06-01 01:35:59 |
| 14.29.239.215 | attackbots | 2020-05-31T08:56:01.7803131495-001 sshd[47404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.239.215 user=root 2020-05-31T08:56:03.9304591495-001 sshd[47404]: Failed password for root from 14.29.239.215 port 39248 ssh2 2020-05-31T08:57:36.8017751495-001 sshd[47463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.239.215 user=root 2020-05-31T08:57:38.6607851495-001 sshd[47463]: Failed password for root from 14.29.239.215 port 56622 ssh2 2020-05-31T08:59:06.2076361495-001 sshd[47488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.239.215 user=root 2020-05-31T08:59:07.7555211495-001 sshd[47488]: Failed password for root from 14.29.239.215 port 45764 ssh2 ... |
2020-06-01 01:34:22 |
| 14.186.147.224 | attack | (smtpauth) Failed SMTP AUTH login from 14.186.147.224 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-31 16:38:31 login authenticator failed for ([127.0.0.1]) [14.186.147.224]: 535 Incorrect authentication data (set_id=info) |
2020-06-01 01:59:04 |
| 88.156.122.72 | attackspam | (sshd) Failed SSH login from 88.156.122.72 (PL/Poland/088156122072.tarnowskiegory.vectranet.pl): 5 in the last 3600 secs |
2020-06-01 01:41:46 |
| 91.121.175.61 | attackbots | May 31 14:12:28 nas sshd[14452]: Failed password for root from 91.121.175.61 port 58472 ssh2 May 31 14:24:57 nas sshd[14788]: Failed password for root from 91.121.175.61 port 45900 ssh2 ... |
2020-06-01 01:25:25 |
| 103.93.16.105 | attack | 2020-05-31T14:03:35.203624struts4.enskede.local sshd\[23941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 user=root 2020-05-31T14:03:38.594580struts4.enskede.local sshd\[23941\]: Failed password for root from 103.93.16.105 port 52588 ssh2 2020-05-31T14:07:12.385299struts4.enskede.local sshd\[23950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 user=root 2020-05-31T14:07:14.963105struts4.enskede.local sshd\[23950\]: Failed password for root from 103.93.16.105 port 55730 ssh2 2020-05-31T14:08:30.613514struts4.enskede.local sshd\[23953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 user=root ... |
2020-06-01 02:00:28 |
| 45.143.220.246 | attack |
|
2020-06-01 01:27:01 |
| 201.234.66.133 | attack | 2020-05-31 14:08:48,985 fail2ban.actions: WARNING [ssh] Ban 201.234.66.133 |
2020-06-01 01:48:50 |
| 111.231.103.192 | attack | May 31 16:11:16 vlre-nyc-1 sshd\[31079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.103.192 user=root May 31 16:11:18 vlre-nyc-1 sshd\[31079\]: Failed password for root from 111.231.103.192 port 54126 ssh2 May 31 16:14:22 vlre-nyc-1 sshd\[31159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.103.192 user=root May 31 16:14:23 vlre-nyc-1 sshd\[31159\]: Failed password for root from 111.231.103.192 port 54312 ssh2 May 31 16:15:49 vlre-nyc-1 sshd\[31191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.103.192 user=root ... |
2020-06-01 01:28:28 |
| 103.85.9.85 | attack | 1590926924 - 05/31/2020 14:08:44 Host: 103.85.9.85/103.85.9.85 Port: 445 TCP Blocked |
2020-06-01 01:51:48 |
| 41.38.28.123 | attackspam | 20/5/31@08:08:44: FAIL: Alarm-Network address from=41.38.28.123 ... |
2020-06-01 01:50:48 |
| 222.95.134.120 | attackspambots | Lines containing failures of 222.95.134.120 (max 1000) May 28 13:02:31 efa3 sshd[22596]: Invalid user wwwadmin from 222.95.134.120 port 37036 May 28 13:02:31 efa3 sshd[22596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.95.134.120 May 28 13:02:34 efa3 sshd[22596]: Failed password for invalid user wwwadmin from 222.95.134.120 port 37036 ssh2 May 28 13:02:35 efa3 sshd[22596]: Received disconnect from 222.95.134.120 port 37036:11: Bye Bye [preauth] May 28 13:02:35 efa3 sshd[22596]: Disconnected from 222.95.134.120 port 37036 [preauth] May 28 13:04:50 efa3 sshd[22896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.95.134.120 user=r.r May 28 13:04:52 efa3 sshd[22896]: Failed password for r.r from 222.95.134.120 port 59676 ssh2 May 28 13:04:52 efa3 sshd[22896]: Received disconnect from 222.95.134.120 port 59676:11: Bye Bye [preauth] May 28 13:04:52 efa3 sshd[22896]: Disconnected from........ ------------------------------ |
2020-06-01 01:56:58 |
| 159.65.146.110 | attackbots | May 31 12:46:22 Host-KEWR-E sshd[7887]: Disconnected from invalid user root 159.65.146.110 port 36648 [preauth] ... |
2020-06-01 01:59:37 |
| 210.183.21.48 | attackspambots | May 31 19:08:51 amit sshd\[26256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.21.48 user=root May 31 19:08:53 amit sshd\[26256\]: Failed password for root from 210.183.21.48 port 14532 ssh2 May 31 19:16:33 amit sshd\[26847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.21.48 user=root ... |
2020-06-01 01:34:47 |
| 1.162.199.45 | attackbots | Attempted connection to port 23. |
2020-06-01 01:50:25 |