This IP address has been reported a total of 254
times from 159 distinct
sources.
170.64.145.148 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 15 01:24:30 vmi585337 sshd[1901553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreNov 15 01:24:30 vmi585337 sshd[1901553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
Nov 15 01:24:33 vmi585337 sshd[1901553]: Failed password for invalid user data from 170.64.145.148 port 35852 ssh2
Nov 15 01:24:34 vmi585337 sshd[1901555]: Invalid user user1 from 170.64.145.148 port 41248
Nov 15 01:24:34 vmi585337 sshd[1901555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
Nov 15 01:24:36 vmi585337 sshd[1901555]: Failed password for invalid user user1 from 170.64.145.148 port 41248 ssh2
... show less
Brute-ForceSSH
Anonymous
Nov 14 18:22:25 *host* sshd\[11264\]: User *user* from 170.64.145.148 not allowed because none of us ... show moreNov 14 18:22:25 *host* sshd\[11264\]: User *user* from 170.64.145.148 not allowed because none of user\'s groups are listed in AllowGroups show less
Nov 14 17:00:45 xproot sshd[3312161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreNov 14 17:00:45 xproot sshd[3312161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
Nov 14 17:00:47 xproot sshd[3312161]: Failed password for invalid user zabbix from 170.64.145.148 port 60846 ssh2
Nov 14 17:00:46 xproot sshd[3312163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
Nov 14 17:00:49 xproot sshd[3312163]: Failed password for invalid user wang from 170.64.145.148 port 49226 ssh2
Nov 14 17:10:47 xproot sshd[3312488]: Invalid user postgres from 170.64.145.148 port 38808
... show less
2024-11-14T16:50:38.393308fra sshd[766371]: pam_unix(sshd:auth): authentication failure; logname= ui ... show more2024-11-14T16:50:38.393308fra sshd[766371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
2024-11-14T16:50:40.750721fra sshd[766371]: Failed password for invalid user data from 170.64.145.148 port 51960 ssh2
2024-11-14T16:50:41.697132fra sshd[766373]: Invalid user user1 from 170.64.145.148 port 57770
2024-11-14T16:50:42.269216fra sshd[766373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
2024-11-14T16:50:44.842492fra sshd[766373]: Failed password for invalid user user1 from 170.64.145.148 port 57770 ssh2
... show less
Nov 14 16:50:36 xproot sshd[3311869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreNov 14 16:50:36 xproot sshd[3311869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
Nov 14 16:50:38 xproot sshd[3311869]: Failed password for invalid user data from 170.64.145.148 port 38044 ssh2
Nov 14 16:50:39 xproot sshd[3311871]: Invalid user user1 from 170.64.145.148 port 43854
Nov 14 16:50:39 xproot sshd[3311871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
Nov 14 16:50:41 xproot sshd[3311871]: Failed password for invalid user user1 from 170.64.145.148 port 43854 ssh2
... show less
[rede-164-29] (sshd) Failed SSH login from 170.64.145.148 (AU/Australia/-): 5 in the last 3600 secs; ... show more[rede-164-29] (sshd) Failed SSH login from 170.64.145.148 (AU/Australia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 14 13:48:03 sshd[28464]: Did not receive identification string from 170.64.145.148 port 55508
Nov 14 13:48:29 sshd[28470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148 user=[USERNAME]
Nov 14 13:48:31 sshd[28470]: Failed password for [USERNAME] from 170.64.145.148 port 42120 ssh2
Nov 14 13:50:37 sshd[28562]: Invalid user [USERNAME] from 170.64.145.148 port 58512
Nov 14 13:50:39 sshd[28562]: Failed password for invalid user [USERNAME] show less
Report 1448255 with IP 2495805 for SSH brute-force attack by source 2490480 via ssh-honeypot/0.2.0+h ... show moreReport 1448255 with IP 2495805 for SSH brute-force attack by source 2490480 via ssh-honeypot/0.2.0+http show less
Nov 14 17:16:20 vmi147057 sshd[4043360]: Failed password for invalid user data from 170.64.145.148 p ... show moreNov 14 17:16:20 vmi147057 sshd[4043360]: Failed password for invalid user data from 170.64.145.148 port 53884 ssh2
Nov 14 17:16:22 vmi147057 sshd[4043378]: Invalid user user1 from 170.64.145.148 port 59530
Nov 14 17:16:22 vmi147057 sshd[4043378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.145.148
Nov 14 17:16:22 vmi147057 sshd[4043378]: Invalid user user1 from 170.64.145.148 port 59530
Nov 14 17:16:25 vmi147057 sshd[4043378]: Failed password for invalid user user1 from 170.64.145.148 port 59530 ssh2
... show less