This IP address has been reported a total of 43
times from 39 distinct
sources.
45.197.106.142 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 10 21:14:22 OakCottage sshd[23414]: Failed password for root from 45.197.106.142 port 47954 ssh2 ... show moreNov 10 21:14:22 OakCottage sshd[23414]: Failed password for root from 45.197.106.142 port 47954 ssh2
Nov 10 21:14:26 OakCottage sshd[23421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.197.106.142 user=root
Nov 10 21:14:28 OakCottage sshd[23421]: Failed password for root from 45.197.106.142 port 47970 ssh2
... show less
2024-11-10T09:25:22.035652-08:00 RoblOracle sshd-session[1840321]: Invalid user user from 45.197.106 ... show more2024-11-10T09:25:22.035652-08:00 RoblOracle sshd-session[1840321]: Invalid user user from 45.197.106.142 port 39718
2024-11-10T09:25:23.377429-08:00 RoblOracle sshd-session[1840326]: Invalid user user from 45.197.106.142 port 39730
2024-11-10T09:25:24.620518-08:00 RoblOracle sshd-session[1840328]: Invalid user user from 45.197.106.142 port 39740
2024-11-10T09:25:25.756112-08:00 RoblOracle sshd-session[1840333]: Invalid user user from 45.197.106.142 port 39742
2024-11-10T09:25:26.905143-08:00 RoblOracle sshd-session[1840335]: Invalid user user from 45.197.106.142 port 39754
... show less
2024-11-10T19:24:39.118557+02:00 GTS1 sshd[1008126]: Failed password for root from 45.197.106.142 po ... show more2024-11-10T19:24:39.118557+02:00 GTS1 sshd[1008126]: Failed password for root from 45.197.106.142 port 47590 ssh2
2024-11-10T19:24:40.710461+02:00 GTS1 sshd[1008206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.197.106.142 user=root
2024-11-10T19:24:43.202614+02:00 GTS1 sshd[1008206]: Failed password for root from 45.197.106.142 port 50372 ssh2
... show less
Nov 10 17:09:34 mail sshd[2680671]: Failed password for root from 45.197.106.142 port 33906 ssh2<br ... show moreNov 10 17:09:34 mail sshd[2680671]: Failed password for root from 45.197.106.142 port 33906 ssh2
Nov 10 17:09:37 mail sshd[2680673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.197.106.142 user=root
Nov 10 17:09:39 mail sshd[2680673]: Failed password for root from 45.197.106.142 port 33914 ssh2
Nov 10 17:09:41 mail sshd[2680675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.197.106.142 user=root
Nov 10 17:09:43 mail sshd[2680675]: Failed password for root from 45.197.106.142 port 40006 ssh2
... show less
45.197.106.142 (ZA/South Africa/-), 5 distributed sshd attacks on account [root] in the last 3600 se ... show more45.197.106.142 (ZA/South Africa/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Nov 10 06:43:02 server2 sshd[16954]: Failed password for root from 113.106.63.54 port 3847 ssh2
Nov 10 06:44:33 server2 sshd[17418]: Failed password for root from 159.203.161.10 port 53662 ssh2
Nov 10 06:47:14 server2 sshd[18433]: Failed password for root from 45.197.106.142 port 40848 ssh2
Nov 10 06:47:16 server2 sshd[18466]: Failed password for root from 45.197.106.142 port 40864 ssh2
Nov 10 06:45:29 server2 sshd[17824]: Failed password for root from 47.237.132.128 port 56290 ssh2
IP Addresses Blocked:
113.106.63.54 (CN/China/-)
159.203.161.10 (US/United States/-) show less