This IP address has been reported a total of 521
times from 284 distinct
sources.
45.66.228.120 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 6 10:51:42 h2992075 sshd[339481]: Invalid user owncloud from 45.66.228.120 port 38892
Nov ... show moreNov 6 10:51:42 h2992075 sshd[339481]: Invalid user owncloud from 45.66.228.120 port 38892
Nov 6 10:51:42 h2992075 sshd[339481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120
Nov 6 10:51:42 h2992075 sshd[339481]: Invalid user owncloud from 45.66.228.120 port 38892
Nov 6 10:51:44 h2992075 sshd[339481]: Failed password for invalid user owncloud from 45.66.228.120 port 38892 ssh2
Nov 6 10:51:56 h2992075 sshd[339485]: Invalid user yt from 45.66.228.120 port 32760
... show less
Nov 6 09:40:59 nameserver-01 sshd[2728610]: pam_unix(sshd:auth): authentication failure; logname= u ... show moreNov 6 09:40:59 nameserver-01 sshd[2728610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120
Nov 6 09:41:01 nameserver-01 sshd[2728610]: Failed password for invalid user useradmin from 45.66.228.120 port 46376 ssh2
Nov 6 09:41:15 nameserver-01 sshd[2728614]: Invalid user dovecot from 45.66.228.120 port 10548
... show less
Nov 6 09:09:16 crazyapi sshd[1891282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreNov 6 09:09:16 crazyapi sshd[1891282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=root
Nov 6 09:09:18 crazyapi sshd[1891282]: Failed password for root from 45.66.228.120 port 31320 ssh2
Nov 6 09:09:30 crazyapi sshd[1891286]: Invalid user mojia from 45.66.228.120 port 31622
... show less
Nov 6 08:41:22 mail sshd[789668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreNov 6 08:41:22 mail sshd[789668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120
Nov 6 08:41:24 mail sshd[789668]: Failed password for invalid user neutron from 45.66.228.120 port 30596 ssh2
Nov 6 08:41:38 mail sshd[789670]: Invalid user prometheus from 45.66.228.120 port 20924
... show less
sshd[862808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos ... show moresshd[862808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=root
sshd[862808]: Failed password for root from 45.66.228.120 port 17900 ssh2
sshd[863286]: Invalid user cssserver from 45.66.228.120 port 14362
sshd[863286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120
sshd[863286]: Failed password for invalid user cssserver from 45.66.228.120 port 14362 ssh2 show less
Nov 6 09:15:05 Debian-1010-buster-64-minimal sshd[3066140]: Invalid user crn from 45.66.228.120 por ... show moreNov 6 09:15:05 Debian-1010-buster-64-minimal sshd[3066140]: Invalid user crn from 45.66.228.120 port 52282
Nov 6 09:15:30 Debian-1010-buster-64-minimal sshd[3075515]: Invalid user cyrus from 45.66.228.120 port 50734
Nov 6 09:15:42 Debian-1010-buster-64-minimal sshd[3079582]: Invalid user testing1 from 45.66.228.120 port 57724
Nov 6 09:15:54 Debian-1010-buster-64-minimal sshd[3083782]: Invalid user fsx from 45.66.228.120 port 32736
Nov 6 09:18:07 Debian-1010-buster-64-minimal sshd[3134205]: Invalid user go from 45.66.228.120 port 26892
... show less
Brute-ForceSSH
Anonymous
Nov 6 07:58:15 s158416 sshd[3388631]: Failed password for root from 45.66.228.120 port 29268 ssh2<b ... show moreNov 6 07:58:15 s158416 sshd[3388631]: Failed password for root from 45.66.228.120 port 29268 ssh2
Nov 6 07:58:29 s158416 sshd[3388668]: Invalid user git from 45.66.228.120 port 13404
Nov 6 07:58:29 s158416 sshd[3388668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120
Nov 6 07:58:29 s158416 sshd[3388668]: Invalid user git from 45.66.228.120 port 13404
Nov 6 07:58:30 s158416 sshd[3388668]: Failed password for invalid user git from 45.66.228.120 port 13404 ssh2
... show less
Nov 6 07:50:19 mout sshd[31100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreNov 6 07:50:19 mout sshd[31100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=mysql
Nov 6 07:50:21 mout sshd[31100]: Failed password for mysql from 45.66.228.120 port 20600 ssh2 show less
Nov 5 19:17:37 b146-58 sshd[2433820]: User nagios from 45.66.228.120 not allowed because none of us ... show moreNov 5 19:17:37 b146-58 sshd[2433820]: User nagios from 45.66.228.120 not allowed because none of user's groups are listed in AllowGroups
Nov 5 19:17:37 b146-58 sshd[2433820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=nagios
Nov 5 19:17:39 b146-58 sshd[2433820]: Failed password for invalid user nagios from 45.66.228.120 port 54966 ssh2
... show less
Report 1425306 with IP 2472856 for SSH brute-force attack by source 2467531 via ssh-honeypot/0.2.0+h ... show moreReport 1425306 with IP 2472856 for SSH brute-force attack by source 2467531 via ssh-honeypot/0.2.0+http show less
(sshd) Failed SSH login from 45.66.228.120 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direct ... show more(sshd) Failed SSH login from 45.66.228.120 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Nov 5 23:15:35 vps sshd[499426]: Invalid user hadoop from 45.66.228.120 port 24806
Nov 5 23:15:48 vps sshd[499430]: Invalid user appltest from 45.66.228.120 port 63078
Nov 5 23:16:20 vps sshd[499444]: Invalid user aaron from 45.66.228.120 port 64338
Nov 5 23:16:45 vps sshd[499453]: Invalid user ubuntu from 45.66.228.120 port 18252
Nov 5 23:17:46 vps sshd[499493]: Invalid user yt from 45.66.228.120 port 59402 show less
Nov 5 22:40:04 fw01 sshd[1412288]: Invalid user prueba from 45.66.228.120 port 33970
Nov 5 2 ... show moreNov 5 22:40:04 fw01 sshd[1412288]: Invalid user prueba from 45.66.228.120 port 33970
Nov 5 22:40:29 fw01 sshd[1412353]: Invalid user kafka from 45.66.228.120 port 22524
Nov 5 22:40:45 fw01 sshd[1412388]: Invalid user e from 45.66.228.120 port 13440
Nov 5 22:40:57 fw01 sshd[1412444]: Invalid user ubuntu from 45.66.228.120 port 43706
... show less
Nov 5 22:37:36 monitor sshd[1366119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreNov 5 22:37:36 monitor sshd[1366119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=root
Nov 5 22:37:38 monitor sshd[1366119]: Failed password for root from 45.66.228.120 port 58204 ssh2
Nov 5 22:37:50 monitor sshd[1366124]: Connection from 45.66.228.120 port 55254 on 37.120.172.115 port 22 rdomain ""
Nov 5 22:37:51 monitor sshd[1366124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=root
Nov 5 22:37:53 monitor sshd[1366124]: Failed password for root from 45.66.228.120 port 55254 ssh2
... show less