This IP address has been reported a total of 328
times from 191 distinct
sources.
45.139.104.168 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-02-16T07:05:55.565573-05:00 fynn sshd[1081538]: Failed password for root from 45.139.104.168 po ... show more2025-02-16T07:05:55.565573-05:00 fynn sshd[1081538]: Failed password for root from 45.139.104.168 port 42606 ssh2
2025-02-16T07:05:57.452621-05:00 fynn sshd[1081540]: Invalid user pi from 45.139.104.168 port 48890
2025-02-16T07:06:01.820078-05:00 fynn sshd[1081561]: Invalid user hive from 45.139.104.168 port 48898
2025-02-16T07:06:00.000585-05:00 fynn sshd[1081540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.139.104.168
2025-02-16T07:06:02.604116-05:00 fynn sshd[1081540]: Failed password for invalid user pi from 45.139.104.168 port 48890 ssh2
... show less
Feb 16 09:39:34 thecount sshd[2881996]: Connection closed by authenticating user root 45.139.104.168 ... show moreFeb 16 09:39:34 thecount sshd[2881996]: Connection closed by authenticating user root 45.139.104.168 port 37508 [preauth]
... show less
Bad SSHAUTH 2025.02.16 10:39:15
blocked until 2025.02.23 10:39:15
by HoneyPot US-EAST_as ... show moreBad SSHAUTH 2025.02.16 10:39:15
blocked until 2025.02.23 10:39:15
by HoneyPot US-EAST_ashburn01 show less
Feb 16 09:39:04 hecnet-us-east-gw sshd[602518]: User root from 45.139.104.168 not allowed because no ... show moreFeb 16 09:39:04 hecnet-us-east-gw sshd[602518]: User root from 45.139.104.168 not allowed because not listed in AllowUsers
Feb 16 09:39:06 hecnet-us-east-gw sshd[602518]: Failed none for invalid user root from 45.139.104.168 port 52678 ssh2
Feb 16 09:39:10 hecnet-us-east-gw sshd[602518]: Failed password for invalid user root from 45.139.104.168 port 52678 ssh2
... show less
Brute-Force
Anonymous
Feb 16 06:53:04 f2b auth.info sshd[321565]: Failed password for root from 45.139.104.168 port 52426 ... show moreFeb 16 06:53:04 f2b auth.info sshd[321565]: Failed password for root from 45.139.104.168 port 52426 ssh2
Feb 16 06:55:52 f2b auth.info sshd[321579]: Failed password for root from 45.139.104.168 port 44424 ssh2
Feb 16 06:55:54 f2b auth.info sshd[321581]: Invalid user pi from 45.139.104.168 port 44440
... show less
2025-02-16T01:27:14.104431-05:00 us1-bms-f7b96252 sshd[3481599]: pam_unix(sshd:auth): authentication ... show more2025-02-16T01:27:14.104431-05:00 us1-bms-f7b96252 sshd[3481599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.139.104.168 user=root
2025-02-16T01:27:16.439308-05:00 us1-bms-f7b96252 sshd[3481599]: Failed password for root from 45.139.104.168 port 32944 ssh2
2025-02-16T01:27:16.738845-05:00 us1-bms-f7b96252 sshd[3481855]: Invalid user pi from 45.139.104.168 port 32954
... show less
Feb 15 20:33:31 server01 sshd[25847]: Failed password for root from 45.139.104.168 port 59534 ssh2<b ... show moreFeb 15 20:33:31 server01 sshd[25847]: Failed password for root from 45.139.104.168 port 59534 ssh2
Feb 15 20:36:05 server01 sshd[26003]: Failed password for root from 45.139.104.168 port 37194 ssh2
... show less
2025-02-16T01:31:06.813528+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[573865]: Failed password for roo ... show more2025-02-16T01:31:06.813528+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[573865]: Failed password for root from 45.139.104.168 port 37366 ssh2
2025-02-16T01:33:58.077683+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[574471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.139.104.168 user=root
2025-02-16T01:33:59.983458+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[574471]: Failed password for root from 45.139.104.168 port 54456 ssh2
... show less
2025-02-16T02:07:28.325611+01:00 eu-south-mad1 sshd[2120593]: Failed password for root from 45.139.1 ... show more2025-02-16T02:07:28.325611+01:00 eu-south-mad1 sshd[2120593]: Failed password for root from 45.139.104.168 port 46666 ssh2
2025-02-16T02:07:30.596868+01:00 eu-south-mad1 sshd[2120593]: Connection closed by authenticating user root 45.139.104.168 port 46666 [preauth]
2025-02-16T02:09:51.642364+01:00 eu-south-mad1 sshd[2129484]: Invalid user pi from 45.139.104.168 port 51526
... show less