This IP address has been reported a total of 2,753
times from 359 distinct
sources.
45.66.230.191 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2023-05-08T15:01:01.340917-05:00 nio.local.lan sshd[120839]: error: kex_exchange_identification: Con ... show more2023-05-08T15:01:01.340917-05:00 nio.local.lan sshd[120839]: error: kex_exchange_identification: Connection closed by remote host
2023-05-08T15:01:01.340990-05:00 nio.local.lan sshd[120839]: Connection closed by 45.66.230.191 port 56368
... show less
May 8 20:27:53 dlcentre3 sshd[27031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreMay 8 20:27:53 dlcentre3 sshd[27031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.191
May 8 20:27:55 dlcentre3 sshd[27031]: Failed password for invalid user user from 45.66.230.191 port 35326 ssh2 show less
May 8 11:17:13 mailstore sshd[2069514]: Unable to negotiate with 45.66.230.191 port 57648: no match ... show moreMay 8 11:17:13 mailstore sshd[2069514]: Unable to negotiate with 45.66.230.191 port 57648: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
May 8 15:01:04 mailstore sshd[2107188]: error: kex_exchange_identification: Connection closed by remote host
May 8 15:01:04 mailstore sshd[2107188]: Connection closed by 45.66.230.191 port 50334
May 8 15:03:10 mailstore sshd[2107198]: Unable to negotiate with 45.66.230.191 port 44048: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
... show less
May 8 19:58:07 DVSwitch-GM0WUR sshd[11830]: pam_unix(sshd:auth): authentication failure; logname= u ... show moreMay 8 19:58:07 DVSwitch-GM0WUR sshd[11830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.191
May 8 19:58:09 DVSwitch-GM0WUR sshd[11830]: Failed password for invalid user user from 45.66.230.191 port 44696 ssh2
... show less
May 8 19:57:59 l02a sshd[29429]: Invalid user user from 45.66.230.191
May 8 19:57:59 l02a ss ... show moreMay 8 19:57:59 l02a sshd[29429]: Invalid user user from 45.66.230.191
May 8 19:57:59 l02a sshd[29429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.191
May 8 19:57:59 l02a sshd[29429]: Invalid user user from 45.66.230.191
May 8 19:58:01 l02a sshd[29429]: Failed password for invalid user user from 45.66.230.191 port 35374 ssh2 show less
May 8 17:45:24 pesterchum sshd[779028]: Unable to negotiate with 45.66.230.191 port 54306: no match ... show moreMay 8 17:45:24 pesterchum sshd[779028]: Unable to negotiate with 45.66.230.191 port 54306: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
May 8 18:07:56 pesterchum sshd[779163]: Unable to negotiate with 45.66.230.191 port 43098: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
... show less