This IP address has been reported a total of 23,613
times from 1,424 distinct
sources.
197.5.145.150 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-12-12T21:31:27.786019+01:00 nc2.motyka.pro sshd[398255]: Invalid user bnk from 197.5.145.150 po ... show more2024-12-12T21:31:27.786019+01:00 nc2.motyka.pro sshd[398255]: Invalid user bnk from 197.5.145.150 port 19853
2024-12-12T21:31:27.788640+01:00 nc2.motyka.pro sshd[398255]: Failed password for invalid user bnk from 197.5.145.150 port 19853 ssh2
2024-12-12T21:34:21.183670+01:00 nc2.motyka.pro sshd[401269]: Failed password for root from 197.5.145.150 port 19854 ssh2
2024-12-12T21:36:15.270500+01:00 nc2.motyka.pro sshd[403274]: Invalid user sgeadmin from 197.5.145.150 port 19855
2024-12-12T21:36:15.273701+01:00 nc2.motyka.pro sshd[403274]: Failed password for invalid user sgeadmin from 197.5.145.150 port 19855 ssh2
... show less
Dec 12 21:15:23 jira sshd[1631656]: Disconnected from invalid user sxm 197.5.145.150 port 20828 [pre ... show moreDec 12 21:15:23 jira sshd[1631656]: Disconnected from invalid user sxm 197.5.145.150 port 20828 [preauth]
Dec 12 21:17:15 jira sshd[1631664]: Connection from 197.5.145.150 port 20829 on 138.201.123.138 port 22 rdomain ""
Dec 12 21:17:15 jira sshd[1631664]: Invalid user txy from 197.5.145.150 port 20829
Dec 12 21:17:15 jira sshd[1631664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.150
Dec 12 21:17:17 jira sshd[1631664]: Failed password for invalid user txy from 197.5.145.150 port 20829 ssh2
... show less
Dec 12 20:47:27 jira sshd[1631159]: Disconnected from invalid user stat 197.5.145.150 port 20814 [pr ... show moreDec 12 20:47:27 jira sshd[1631159]: Disconnected from invalid user stat 197.5.145.150 port 20814 [preauth]
Dec 12 20:50:07 jira sshd[1631203]: Connection from 197.5.145.150 port 20815 on 138.201.123.138 port 22 rdomain ""
Dec 12 20:50:07 jira sshd[1631203]: Invalid user ntr from 197.5.145.150 port 20815
Dec 12 20:50:07 jira sshd[1631203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.150
Dec 12 20:50:09 jira sshd[1631203]: Failed password for invalid user ntr from 197.5.145.150 port 20815 ssh2
... show less
Brute-ForceSSH
Anonymous
Dec 12 19:06:56 de-fra2-dns1 sshd[362284]: Invalid user hjn from 197.5.145.150 port 20424
Dec ... show moreDec 12 19:06:56 de-fra2-dns1 sshd[362284]: Invalid user hjn from 197.5.145.150 port 20424
Dec 12 19:10:42 de-fra2-dns1 sshd[362338]: Invalid user afr from 197.5.145.150 port 20426
Dec 12 19:14:27 de-fra2-dns1 sshd[362381]: Invalid user mrx from 197.5.145.150 port 20428
... show less
Dec 12 19:03:01 nervous-edison8 sshd[1544733]: Failed password for invalid user wsd from 197.5.145.1 ... show moreDec 12 19:03:01 nervous-edison8 sshd[1544733]: Failed password for invalid user wsd from 197.5.145.150 port 18730 ssh2
Dec 12 19:05:21 nervous-edison8 sshd[1545713]: Invalid user bmp from 197.5.145.150 port 18731
Dec 12 19:05:21 nervous-edison8 sshd[1545713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.150
Dec 12 19:05:22 nervous-edison8 sshd[1545713]: Failed password for invalid user bmp from 197.5.145.150 port 18731 ssh2
Dec 12 19:07:15 nervous-edison8 sshd[1546542]: Invalid user hjn from 197.5.145.150 port 18732
... show less
2024-12-12T19:04:20.669716 jumphost sshd[929139]: Connection from 197.5.145.150 port 18735 on 192.16 ... show more2024-12-12T19:04:20.669716 jumphost sshd[929139]: Connection from 197.5.145.150 port 18735 on 192.168.40.4 port 22 rdomain ""
2024-12-12T19:04:20.978168 jumphost sshd[929139]: Invalid user bmp from 197.5.145.150 port 18735
... show less
2024-12-12T18:20:32.579135+00:00 edge-hur-fmt01.int.pdx.net.uk sshd[1657116]: Invalid user hfjk from ... show more2024-12-12T18:20:32.579135+00:00 edge-hur-fmt01.int.pdx.net.uk sshd[1657116]: Invalid user hfjk from 197.5.145.150 port 14693
2024-12-12T18:22:45.230999+00:00 edge-hur-fmt01.int.pdx.net.uk sshd[1657620]: Invalid user trs from 197.5.145.150 port 14694
2024-12-12T18:24:39.119788+00:00 edge-hur-fmt01.int.pdx.net.uk sshd[1658047]: Invalid user lte from 197.5.145.150 port 14695
... show less
Report 1501149 with IP 985339 for SSH brute-force attack by source 1077675 via ssh-honeypot/0.2.0+ht ... show moreReport 1501149 with IP 985339 for SSH brute-force attack by source 1077675 via ssh-honeypot/0.2.0+http show less
(sshd) Failed SSH login from 197.5.145.150 (TN/-/-): 5 in the last 3600 secs; Ports: *; Direction: i ... show more(sshd) Failed SSH login from 197.5.145.150 (TN/-/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Dec 12 11:14:19 na-s3 sshd[1635903]: Invalid user rke from 197.5.145.150 port 17598
Dec 12 11:17:45 na-s3 sshd[1676778]: Invalid user flairAi from 197.5.145.150 port 17599
Dec 12 11:19:47 na-s3 sshd[1703044]: Invalid user share from 197.5.145.150 port 17600
Dec 12 11:21:42 na-s3 sshd[1725996]: Invalid user johndoe from 197.5.145.150 port 17601
Dec 12 11:23:32 na-s3 sshd[1749967]: Invalid user hlo from 197.5.145.150 port 17602 show less
Dec 12 16:14:02 Sildom2 sshd[2215517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreDec 12 16:14:02 Sildom2 sshd[2215517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.150
Dec 12 16:14:05 Sildom2 sshd[2215517]: Failed password for invalid user rke from 197.5.145.150 port 20110 ssh2
... show less