This IP address has been reported a total of 178
times from 91 distinct
sources.
45.55.70.142 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
10 Sep 2024 00:41:15UTC:Distributed Brute Force Password Attack (smtp, ftp, imap, pop, ssh) includin ... show more10 Sep 2024 00:41:15UTC:Distributed Brute Force Password Attack (smtp, ftp, imap, pop, ssh) including ip address 45.55.70.142 show less
2024-08-13T19:50:05.014741angela sshd[2898444]: Failed password for root from 45.55.70.142 port 4307 ... show more2024-08-13T19:50:05.014741angela sshd[2898444]: Failed password for root from 45.55.70.142 port 43074 ssh2
2024-08-13T20:08:45.457088angela sshd[2900500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142 user=root
2024-08-13T20:08:47.342929angela sshd[2900500]: Failed password for root from 45.55.70.142 port 48412 ssh2
... show less
2024-08-13T21:44:20.747981+02:00 proxmox sshd[2452227]: Failed password for root from 45.55.70.142 p ... show more2024-08-13T21:44:20.747981+02:00 proxmox sshd[2452227]: Failed password for root from 45.55.70.142 port 47384 ssh2
2024-08-13T22:01:44.502547+02:00 proxmox sshd[2467041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142 user=root
2024-08-13T22:01:46.593265+02:00 proxmox sshd[2467041]: Failed password for root from 45.55.70.142 port 36502 ssh2
... show less
Brute-ForceSSH
Anonymous
45.55.70.142 (US/United States/-), 6 distributed sshd attacks on account [root] in the last 3600 sec ... show more45.55.70.142 (US/United States/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Aug 13 15:34:44 server5 sshd[24403]: Failed password for root from 80.89.193.5 port 57858 ssh2
Aug 13 15:35:08 server5 sshd[24813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.28.146 user=root
Aug 13 15:34:56 server5 sshd[24660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142 user=root
Aug 13 15:34:57 server5 sshd[24660]: Failed password for root from 45.55.70.142 port 41954 ssh2
Aug 13 15:34:42 server5 sshd[24397]: Failed password for root from 3.111.13.5 port 38870 ssh2
Aug 13 15:34:42 server5 sshd[24403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.89.193.5 user=root
IP Addresses Blocked:
80.89.193.5 (RU/Russia/-)
134.209.28.146 (GB/United Kingdom/-) show less
Aug 13 12:52:19 dev sshd[2849282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreAug 13 12:52:19 dev sshd[2849282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142
Aug 13 12:52:21 dev sshd[2849282]: Failed password for invalid user tmxnews from 45.55.70.142 port 39358 ssh2
Aug 13 13:00:41 dev sshd[2849811]: Invalid user waterwaysnetwork from 45.55.70.142 port 58330
Aug 13 13:00:41 dev sshd[2849811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142
Aug 13 13:00:44 dev sshd[2849811]: Failed password for invalid user waterwaysnetwork from 45.55.70.142 port 58330 ssh2
... show less
Aug 13 11:16:07 dev sshd[2844031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreAug 13 11:16:07 dev sshd[2844031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142
Aug 13 11:16:09 dev sshd[2844031]: Failed password for invalid user tmxnews from 45.55.70.142 port 34832 ssh2
Aug 13 11:24:07 dev sshd[2844519]: Invalid user waterwaysnetwork from 45.55.70.142 port 32874
Aug 13 11:24:07 dev sshd[2844519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142
Aug 13 11:24:09 dev sshd[2844519]: Failed password for invalid user waterwaysnetwork from 45.55.70.142 port 32874 ssh2
... show less
Multiple login attempts via RDP and/or SSH using wrong credentials. Attack automatically blocked by ... show moreMultiple login attempts via RDP and/or SSH using wrong credentials. Attack automatically blocked by SkyDancer Ai. EXT-SYS-4 show less
Aug 13 09:39:22 dev sshd[2838258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreAug 13 09:39:22 dev sshd[2838258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142
Aug 13 09:39:24 dev sshd[2838258]: Failed password for invalid user tmxnews from 45.55.70.142 port 43144 ssh2
Aug 13 09:47:49 dev sshd[2838733]: Invalid user waterwaysnetwork from 45.55.70.142 port 54490
Aug 13 09:47:49 dev sshd[2838733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.70.142
Aug 13 09:47:52 dev sshd[2838733]: Failed password for invalid user waterwaysnetwork from 45.55.70.142 port 54490 ssh2
... show less