This IP address has been reported a total of 521
times from 284 distinct
sources.
45.66.228.120 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-16T04:52:42.734375+00:00 eu-central-vie1 sshd[2855791]: pam_unix(sshd:auth): authentication ... show more2024-11-16T04:52:42.734375+00:00 eu-central-vie1 sshd[2855791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120
2024-11-16T04:52:44.602673+00:00 eu-central-vie1 sshd[2855791]: Failed password for invalid user mit from 45.66.228.120 port 56518 ssh2
2024-11-16T04:52:44.656302+00:00 eu-central-vie1 sshd[2855791]: Connection closed by invalid user mit 45.66.228.120 port 56518 [preauth]
... show less
2024-11-16T04:29:58.344878Z f7b7042da03a New connection: 45.66.228.120:57750 (10.89.0.2:2222) [sessi ... show more2024-11-16T04:29:58.344878Z f7b7042da03a New connection: 45.66.228.120:57750 (10.89.0.2:2222) [session: f7b7042da03a]
2024-11-16T04:30:11.509951Z 52b5d4a8a6f6 New connection: 45.66.228.120:46336 (10.89.0.2:2222) [session: 52b5d4a8a6f6] show less
Nov 15 23:21:05 www4 sshd[2124300]: Failed password for invalid user te from 45.66.228.120 port 3777 ... show moreNov 15 23:21:05 www4 sshd[2124300]: Failed password for invalid user te from 45.66.228.120 port 37778 ssh2
Nov 15 23:21:19 www4 sshd[2124316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=root
Nov 15 23:21:21 www4 sshd[2124316]: Failed password for root from 45.66.228.120 port 50116 ssh2
Nov 15 23:21:36 www4 sshd[2124319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=root
Nov 15 23:21:38 www4 sshd[2124319]: Failed password for root from 45.66.228.120 port 34470 ssh2
... show less
2024-11-16T05:09:42.231076ielecciones-pro sshd[10518]: Invalid user oracle from 45.66.228.120 port 4 ... show more2024-11-16T05:09:42.231076ielecciones-pro sshd[10518]: Invalid user oracle from 45.66.228.120 port 44450
2024-11-16T05:10:08.618230ielecciones-pro sshd[10562]: Invalid user ajay from 45.66.228.120 port 52608
2024-11-16T05:11:09.666617ielecciones-pro sshd[10747]: Invalid user elk from 45.66.228.120 port 59296
... show less
Nov 16 04:54:11 ns37 sshd[9485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreNov 16 04:54:11 ns37 sshd[9485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120
Nov 16 04:54:13 ns37 sshd[9485]: Failed password for invalid user cpt from 45.66.228.120 port 40050 ssh2
Nov 16 04:54:28 ns37 sshd[9493]: Failed password for root from 45.66.228.120 port 48572 ssh2
... show less
2024-11-16T03:25:05.110235+00:00 edge-noc-mci01.int.pdx.net.uk sshd[2326899]: Invalid user nvidia fr ... show more2024-11-16T03:25:05.110235+00:00 edge-noc-mci01.int.pdx.net.uk sshd[2326899]: Invalid user nvidia from 45.66.228.120 port 57782
2024-11-16T03:25:19.095736+00:00 edge-noc-mci01.int.pdx.net.uk sshd[2326933]: Invalid user mas from 45.66.228.120 port 46090
2024-11-16T03:26:17.066634+00:00 edge-noc-mci01.int.pdx.net.uk sshd[2327241]: Invalid user zabbix from 45.66.228.120 port 60690
... show less
Brute-ForceSSH
Anonymous
Invalid user student4 from 45.66.228.120 port 50986
Nov 16 04:06:34 service sshd[808815]: Invalid user test from 45.66.228.120 port 41600
Nov 16 0 ... show moreNov 16 04:06:34 service sshd[808815]: Invalid user test from 45.66.228.120 port 41600
Nov 16 04:06:36 service sshd[808815]: Failed password for invalid user test from 45.66.228.120 port 41600 ssh2
Nov 16 04:06:57 service sshd[808873]: Invalid user user7 from 45.66.228.120 port 54604
... show less
Nov 15 20:03:49 b146-41 sshd[2226441]: Failed password for root from 45.66.228.120 port 33100 ssh2<b ... show moreNov 15 20:03:49 b146-41 sshd[2226441]: Failed password for root from 45.66.228.120 port 33100 ssh2
Nov 15 20:04:03 b146-41 sshd[2226466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=root
Nov 15 20:04:05 b146-41 sshd[2226466]: Failed password for root from 45.66.228.120 port 53282 ssh2
... show less
2024-11-16T02:41:27.571445+00:00 linux sshd[182504]: Invalid user ftpuser from 45.66.228.120 port 35 ... show more2024-11-16T02:41:27.571445+00:00 linux sshd[182504]: Invalid user ftpuser from 45.66.228.120 port 35936
2024-11-16T02:41:42.358511+00:00 linux sshd[182507]: Invalid user yt from 45.66.228.120 port 52072
2024-11-16T02:42:07.859378+00:00 linux sshd[182515]: Invalid user samara from 45.66.228.120 port 38624
2024-11-16T02:42:33.336992+00:00 linux sshd[182519]: Invalid user bitrix24 from 45.66.228.120 port 42682
2024-11-16T02:42:46.118271+00:00 linux sshd[182521]: Invalid user updb from 45.66.228.120 port 43022
... show less
Nov 16 02:15:51 mail sshd[3140687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 16 02:15:51 mail sshd[3140687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120
Nov 16 02:15:52 mail sshd[3140687]: Failed password for invalid user admin from 45.66.228.120 port 54968 ssh2
Nov 16 02:16:05 mail sshd[3140699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.228.120 user=root
Nov 16 02:16:07 mail sshd[3140699]: Failed password for root from 45.66.228.120 port 37410 ssh2
Nov 16 02:16:25 mail sshd[3140710]: Invalid user lucy from 45.66.228.120 port 49042
... show less