This IP address has been reported a total of 1,288
times from 543 distinct
sources.
132.145.109.41 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 4 12:30:37 bbb8 sshd[3944637]: Failed password for root from 132.145.109.41 port 49224 ssh2<br ... show moreDec 4 12:30:37 bbb8 sshd[3944637]: Failed password for root from 132.145.109.41 port 49224 ssh2
Dec 4 12:30:40 bbb8 sshd[3944637]: Failed password for root from 132.145.109.41 port 49224 ssh2
Dec 4 12:30:42 bbb8 sshd[3944637]: Failed password for root from 132.145.109.41 port 49224 ssh2
... show less
2023-12-04T12:05:27.413983+01:00 plg sshd[2569552]: Failed password for root from 132.145.109.41 por ... show more2023-12-04T12:05:27.413983+01:00 plg sshd[2569552]: Failed password for root from 132.145.109.41 port 34410 ssh2
2023-12-04T12:05:29.876131+01:00 plg sshd[2569552]: Failed password for root from 132.145.109.41 port 34410 ssh2
2023-12-04T12:05:33.019323+01:00 plg sshd[2569552]: Failed password for root from 132.145.109.41 port 34410 ssh2
2023-12-04T12:05:36.701037+01:00 plg sshd[2569552]: Failed password for root from 132.145.109.41 port 34410 ssh2
2023-12-04T12:05:40.167622+01:00 plg sshd[2569552]: Failed password for root from 132.145.109.41 port 34410 ssh2
2023-12-04T12:05:41.825771+01:00 plg sshd[2569552]: error: maximum authentication attempts exceeded for root from 132.145.109.41 port 34410 ssh2 [preauth]
2023-12-04T12:05:42.882922+01:00 plg sshd[2569554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.109.41 user=root
2023-12-04T12:05:44.912358+01:00 plg sshd[2569554]: Failed password for root from 132.145.109.41 port 42050 ssh2
2
... show less
(sshd) Failed SSH login from 132.145.109.41 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direct ... show more(sshd) Failed SSH login from 132.145.109.41 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Dec 4 10:05:09 vps sshd[560336]: error: maximum authentication attempts exceeded for root from 132.145.109.41 port 46460 ssh2 [preauth]
Dec 4 10:05:11 vps sshd[560338]: error: maximum authentication attempts exceeded for root from 132.145.109.41 port 46468 ssh2 [preauth]
Dec 4 10:05:13 vps sshd[560345]: Invalid user admin from 132.145.109.41 port 46490
Dec 4 10:05:14 vps sshd[560347]: Invalid user admin from 132.145.109.41 port 46492
Dec 4 10:05:16 vps sshd[560349]: Invalid user admin from 132.145.109.41 port 46504 show less
Dec 4 10:03:03 vm-networkmanager sshd[542832]: Failed password for root from 132.145.109.41 port 57 ... show moreDec 4 10:03:03 vm-networkmanager sshd[542832]: Failed password for root from 132.145.109.41 port 57894 ssh2
Dec 4 10:03:07 vm-networkmanager sshd[542832]: Failed password for root from 132.145.109.41 port 57894 ssh2
Dec 4 10:03:10 vm-networkmanager sshd[542832]: Failed password for root from 132.145.109.41 port 57894 ssh2
Dec 4 10:03:14 vm-networkmanager sshd[542832]: Failed password for root from 132.145.109.41 port 57894 ssh2
Dec 4 10:03:18 vm-networkmanager sshd[542832]: Failed password for root from 132.145.109.41 port 57894 ssh2
... show less
2023-12-04T08:58:13.555700host sshd[10717]: pam_unix(sshd:auth): authentication failure; logname= ui ... show more2023-12-04T08:58:13.555700host sshd[10717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.109.41 user=root
2023-12-04T08:58:15.510935host sshd[10717]: Failed password for invalid user XXXX from 132.145.109.41 port 40210 ssh2
2023-12-04T08:58:17.812739host sshd[10717]: Failed password for invalid user XXXX from 132.145.109.41 port 40210 ssh2
2023-12-04T08:58:20.395289host sshd[10717]: Failed password for invalid user XXXX from 132.145.109.41 port 40210 ssh2
2023-12-04T08:58:22.056756host sshd[10717]: Failed password for invalid user XXXX from 132.145.109.41 port 40210 ssh2
... show less