This IP address has been reported a total of 391
times from 260 distinct
sources.
45.90.96.134 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
(sshd) Failed SSH login from 45.90.96.134 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Directi ... show more(sshd) Failed SSH login from 45.90.96.134 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 14:40:09 instance-20200224-1146 sshd[27095]: Invalid user test from 45.90.96.134 port 51264
Sep 23 14:47:01 instance-20200224-1146 sshd[27511]: Invalid user ubuntu from 45.90.96.134 port 54142
Sep 23 14:47:39 instance-20200224-1146 sshd[27557]: Invalid user ubuntu from 45.90.96.134 port 47470
Sep 23 14:48:17 instance-20200224-1146 sshd[27605]: Invalid user support from 45.90.96.134 port 49620
Sep 23 14:48:53 instance-20200224-1146 sshd[27639]: Invalid user test from 45.90.96.134 port 49184 show less
Port Scan
Anonymous
Brute-ForceSSH
Anonymous
Sep 23 14:26:28 web8 sshd\[14599\]: Invalid user support from 45.90.96.134
Sep 23 14:26:28 web ... show moreSep 23 14:26:28 web8 sshd\[14599\]: Invalid user support from 45.90.96.134
Sep 23 14:26:28 web8 sshd\[14599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.96.134
Sep 23 14:26:30 web8 sshd\[14599\]: Failed password for invalid user support from 45.90.96.134 port 44106 ssh2
Sep 23 14:27:08 web8 sshd\[14900\]: Invalid user test from 45.90.96.134
Sep 23 14:27:08 web8 sshd\[14900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.96.134 show less
Brute-ForceSSH
Anonymous
Sep 23 14:02:54 web8 sshd\[6396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 eu ... show moreSep 23 14:02:54 web8 sshd\[6396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.96.134 user=root
Sep 23 14:02:56 web8 sshd\[6396\]: Failed password for root from 45.90.96.134 port 35950 ssh2
Sep 23 14:05:21 web8 sshd\[7326\]: Invalid user git from 45.90.96.134
Sep 23 14:05:21 web8 sshd\[7326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.96.134
Sep 23 14:05:23 web8 sshd\[7326\]: Failed password for invalid user git from 45.90.96.134 port 52874 ssh2 show less
Brute-ForceSSH
Anonymous
IP banned by Fail2Ban
Brute-ForceSSH
Anonymous
Sep 23 13:28:46 ns5024002 sshd[987501]: Failed password for invalid user ionguest from 45.90.96.134 ... show moreSep 23 13:28:46 ns5024002 sshd[987501]: Failed password for invalid user ionguest from 45.90.96.134 port 39160 ssh2
Sep 23 13:34:02 ns5024002 sshd[995697]: Invalid user jenkins from 45.90.96.134 port 57986
Sep 23 13:34:02 ns5024002 sshd[995697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.96.134
Sep 23 13:34:03 ns5024002 sshd[995697]: Failed password for invalid user jenkins from 45.90.96.134 port 57986 ssh2
Sep 23 13:34:37 ns5024002 sshd[996601]: Invalid user reza from 45.90.96.134 port 45284
... show less
Invalid user ionguest from 45.90.96.134 port 41006
Brute-ForceSSH
Anonymous
Sep 23 11:19:15 vps-0c1a5a98 sshd[1132097]: Invalid user tuan from 45.90.96.134 port 40026
Sep ... show moreSep 23 11:19:15 vps-0c1a5a98 sshd[1132097]: Invalid user tuan from 45.90.96.134 port 40026
Sep 23 11:22:39 vps-0c1a5a98 sshd[1132145]: Invalid user test from 45.90.96.134 port 53572
Sep 23 11:23:17 vps-0c1a5a98 sshd[1132154]: Invalid user test from 45.90.96.134 port 41090
... show less
Sep 23 11:30:24 node106710-www2-cepv-ch sshd[17015]: Failed password for invalid user postgres from ... show moreSep 23 11:30:24 node106710-www2-cepv-ch sshd[17015]: Failed password for invalid user postgres from 45.90.96.134 port 58528 ssh2
Sep 23 11:35:34 node106710-www2-cepv-ch sshd[17147]: Invalid user postgres from 45.90.96.134 port 34580
Sep 23 11:35:34 node106710-www2-cepv-ch sshd[17147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.96.134
Sep 23 11:35:36 node106710-www2-cepv-ch sshd[17147]: Failed password for invalid user postgres from 45.90.96.134 port 34580 ssh2
Sep 23 11:36:17 node106710-www2-cepv-ch sshd[17192]: Invalid user smart from 45.90.96.134 port 37534
... show less
2024-09-23T11:29:44.099141cms1-b sshd[18696]: Invalid user postgres from 45.90.96.134 port 55038<br ... show more2024-09-23T11:29:44.099141cms1-b sshd[18696]: Invalid user postgres from 45.90.96.134 port 55038
2024-09-23T11:35:30.994814cms1-b sshd[20844]: Invalid user postgres from 45.90.96.134 port 44178
2024-09-23T11:36:13.016090cms1-b sshd[21182]: Invalid user smart from 45.90.96.134 port 57544
... show less
Sep 23 06:34:35 vidsell sshd[1112430]: Invalid user postgres from 45.90.96.134 port 58486
Sep ... show moreSep 23 06:34:35 vidsell sshd[1112430]: Invalid user postgres from 45.90.96.134 port 58486
Sep 23 06:34:35 vidsell sshd[1112430]: Disconnected from invalid user postgres 45.90.96.134 port 58486 [preauth]
... show less