Go
164.132.54.215
is a
Hacker
100 %
France
Report Abuse
1025attacks reported
807Brute-ForceSSH
89Brute-Force
57SSH
14HackingBrute-ForceSSH
12Port ScanBrute-ForceSSH
12uncategorized
6Hacking
5Port ScanHackingBrute-ForceWeb App AttackSSH
3Port Scan
3Brute-ForceSSHPort ScanHacking
...
from 171 distinct reporters
and 12 distinct sources : BadIPs.com, Blocklist.de, FireHOL, NormShield.com, NoThink.org, darklist.de, danger.rulez.sk, Emerging Threats, GreenSnow.co, Charles Haley, VoIPBL.org, AbuseIPDB
164.132.54.215 was first signaled at 2019-02-19 03:07 and last record was at 2020-08-04 12:23.
IP

164.132.54.215

Organization
Internet Assigned Numbers Authority
Localisation
France
NetRange : First & Last IP
0.0.0.0 - 255.255.255.255
Network CIDR
0.0.0.0/0

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-07-08 06:40 attacks Brute-Force AbuseIPDB Brute force SMTP login attempted.
2019-07-06 21:40 attacks Brute-Force AbuseIPDB $f2bV_matches
2019-07-06 21:39 attacks Brute-Force AbuseIPDB $f2bV_matches
2019-07-06 21:13 attacks Brute-ForceSSH AbuseIPDB leo_www
2019-07-06 14:31 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2019-07-06 14:28 attacks Brute-ForceSSH AbuseIPDB Jul 7 01:25:24 lnxded63 sshd[22898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.215 Jul 7 01:2
2019-07-06 13:38 attacks Brute-ForceSSH AbuseIPDB ssh failed login
2019-06-30 03:23 attacks Brute-ForceSSH AbuseIPDB Jun 30 12:23:25 MK-Soft-VM3 sshd\[25041\]: Invalid user vm from 164.132.54.215 port 46922 Jun 30 12:23:25 MK-Soft-VM3 sshd\[25041\]: pam_unix\(sshd:au
2019-06-30 01:52 attacks Brute-ForceSSH AbuseIPDB (sshd) Failed SSH login from 164.132.54.215 (215.ip-164-132-54.eu): 5 in the last 3600 secs
2019-06-30 01:03 attacks Brute-ForceSSH AbuseIPDB  
2019-06-29 21:55 attacks Brute-ForceSSH AbuseIPDB 2019-06-30T08:55:38.509341centos sshd\[30303\]: Invalid user gilles from 164.132.54.215 port 41752 2019-06-30T08:55:38.513881centos sshd\[30303\]: pam
2019-06-28 23:27 attacks Brute-ForceSSH AbuseIPDB  
2019-06-28 18:39 attacks Brute-ForceSSH AbuseIPDB Reported by AbuseIPDB proxy server.
2019-06-28 14:48 attacks Brute-ForceSSH AbuseIPDB Jun 29 01:45:42 mail sshd\[9688\]: Invalid user admin1 from 164.132.54.215 port 39670 Jun 29 01:45:42 mail sshd\[9688\]: pam_unix\(sshd:auth\): authen
2019-06-21 10:35 attacks Port ScanBrute-ForceSSH AbuseIPDB Jun 21 21:31:58 MainVPS sshd[28160]: Invalid user deploy from 164.132.54.215 port 47268 Jun 21 21:31:58 MainVPS sshd[28160]: pam_unix(sshd:auth): auth
2019-06-21 09:09 attacks Brute-ForceSSH AbuseIPDB Jun 21 14:08:29 vps200512 sshd\[18680\]: Invalid user qhsupport from 164.132.54.215 Jun 21 14:08:29 vps200512 sshd\[18680\]: pam_unix\(sshd:auth\): au
2019-06-21 08:46 attacks Brute-ForceSSH AbuseIPDB Jun 21 13:45:01 vps200512 sshd\[18464\]: Invalid user store from 164.132.54.215 Jun 21 13:45:01 vps200512 sshd\[18464\]: pam_unix\(sshd:auth\): authen
2019-06-18 10:40 attacks Brute-ForceSSH AbuseIPDB Mar 13 21:42:53 yesfletchmain sshd\[15880\]: User root from 164.132.54.215 not allowed because not listed in AllowUsers Mar 13 21:42:54 yesfletchmain
2019-06-17 23:35 attacks Web App Attack AbuseIPDB Automatic report - Web App Attack
2019-06-17 23:24 attacks SSH AbuseIPDB $f2bV_matches
2019-06-17 20:36 attacks Brute-ForceSSH AbuseIPDB Jun 17 23:28:31 home sshd[17729]: Invalid user kaija from 164.132.54.215 port 40250 Jun 17 23:28:31 home sshd[17729]: pam_unix(sshd:auth): authenticat
2019-06-16 11:04 attacks Brute-ForceSSH AbuseIPDB Jun 16 20:58:20 *** sshd[2439]: Failed password for invalid user alumni from 164.132.54.215 port 51996 ssh2 Jun 16 21:00:51 *** sshd[2473]: Failed pas
2019-06-16 07:03 attacks Brute-ForceSSH AbuseIPDB (sshd) Failed SSH login from 164.132.54.215 (215.ip-164-132-54.eu): 5 in the last 3600 secs
2019-06-16 06:57 attacks DDoS AttackPort ScanBrute-ForceSSH AbuseIPDB Jun 16 11:57:39 tx sshd[26286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.215 Jun 16 11:57:41
2019-06-16 02:44 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban at Ares web server
2019-06-16 00:17 attacks Brute-ForceSSH AbuseIPDB  
2019-06-15 15:35 attacks SSH AbuseIPDB  
2019-06-15 12:44 attacks Brute-ForceSSH AbuseIPDB SSH Brute Force, server-1 sshd[32195]: Failed password for invalid user webalizer from 164.132.54.215 port 57808 ssh2
2019-06-14 11:00 attacks SSH AbuseIPDB ssh-bruteforce
2019-06-14 04:36 attacks Brute-ForceSSH AbuseIPDB Jun 14 15:34:40 Ubuntu-1404-trusty-64-minimal sshd\[7483\]: Invalid user goryus from 164.132.54.215 Jun 14 15:34:40 Ubuntu-1404-trusty-64-minimal sshd
2019-06-13 12:54 attacks Brute-ForceSSH AbuseIPDB Jun 13 23:37:28 ns341937 sshd[24905]: Failed password for root from 164.132.54.215 port 59710 ssh2 Jun 13 23:53:56 ns341937 sshd[27739]: pam_unix(sshd
2019-06-10 17:25 attacks Brute-Force AbuseIPDB $f2bV_matches
2019-06-10 10:19 attacks Brute-ForceSSH AbuseIPDB 2019-06-10T21:15:54.002358 sshd[25306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.215 user=ro
2019-06-10 09:15 attacks Brute-ForceSSH AbuseIPDB 2019-06-10T20:13:26.053493 sshd[24696]: Invalid user mei from 164.132.54.215 port 52592 2019-06-10T20:13:26.070701 sshd[24696]: pam_unix(sshd:auth): a
2019-06-10 08:11 attacks Brute-ForceSSH AbuseIPDB 2019-06-10T19:09:10.577327 sshd[24125]: Invalid user nz from 164.132.54.215 port 57148 2019-06-10T19:09:10.593053 sshd[24125]: pam_unix(sshd:auth): au
2019-06-09 19:04 attacks Brute-ForceSSH AbuseIPDB Brute force attempt
2019-06-09 18:12 attacks Brute-ForceSSH AbuseIPDB Brute force attempt
2019-06-09 03:17 attacks Brute-Force AbuseIPDB Jun 9 14:17:46 www sshd\[11927\]: Invalid user newadmin from 164.132.54.215 port 35508
2019-06-09 03:14 attacks SSH AbuseIPDB Jun 9 12:14:36 thevastnessof sshd[5557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.215
2019-06-08 08:16 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban at Vostok web server
2019-06-06 01:50 attacks HackingBrute-ForceSSH AbuseIPDB SSH/22 MH Probe, BF, Hack -
2019-06-05 23:34 attacks SSH AbuseIPDB Jun 6 08:34:27 sshgateway sshd\[5427\]: Invalid user beowulf from 164.132.54.215 Jun 6 08:34:27 sshgateway sshd\[5427\]: pam_unix\(sshd:auth\): authen
2019-06-05 11:36 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban
2019-06-05 08:28 attacks Brute-ForceSSH AbuseIPDB 2019-05-31 10:59:55 server sshd[73883]: Failed password for invalid user comfortechassist from 164.132.54.215 port 54022 ssh2
2019-06-04 20:18 attacks Brute-ForceSSH AbuseIPDB Feb 23 06:57:28 vpn sshd[24824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.215 Feb 23 06:57:2
2019-06-03 18:41 attacks Brute-ForceSSH AbuseIPDB Jun 4 05:41:18 ubuntu-2gb-nbg1-dc3-1 sshd[21417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.2
2019-06-03 17:40 attacks Brute-ForceSSH AbuseIPDB Jun 4 04:40:14 ubuntu-2gb-nbg1-dc3-1 sshd[17444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.2
2019-06-03 16:37 attacks Brute-ForceSSH AbuseIPDB Jun 4 03:37:54 ubuntu-2gb-nbg1-dc3-1 sshd[13258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.2
2019-06-03 15:37 attacks Brute-ForceSSH AbuseIPDB Jun 4 02:37:41 ubuntu-2gb-nbg1-dc3-1 sshd[8572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.21
2019-06-03 14:37 attacks Brute-ForceSSH AbuseIPDB Jun 4 01:36:58 ubuntu-2gb-nbg1-dc3-1 sshd[4564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.21
2019-02-19 03:07 attacks IoT Targeted AbuseIPDB  
2019-02-19 04:42 attacks Brute-ForceSSH AbuseIPDB Feb 19 09:36:25 plusreed sshd[22616]: Invalid user html from 164.132.54.215 Feb 19 09:36:25 plusreed sshd[22616]: pam_unix(sshd:auth): authentication
2019-02-19 05:01 attacks Brute-ForceSSH AbuseIPDB Feb 19 15:52:40 mail sshd\[106578\]: Invalid user user from 164.132.54.215 Feb 19 15:52:42 mail sshd\[106578\]: Failed password for invalid user user
2019-02-19 07:34 attacks Brute-Force AbuseIPDB Feb 19 12:29:20 localhost sshd[11849]: Invalid user bot from 164.132.54.215 port 34956 Feb 19 12:29:20 localhost sshd[11849]: pam_unix(sshd:auth): aut
2019-02-19 08:02 attacks Brute-ForceSSH AbuseIPDB Feb 19 18:59:00 mail sshd\[31809\]: Invalid user english from 164.132.54.215 port 60644 Feb 19 18:59:00 mail sshd\[31809\]: pam_unix\(sshd:auth\): aut
2019-02-19 08:22 attacks Brute-ForceSSH AbuseIPDB ssh failed login
2019-02-19 08:24 attacks Brute-ForceSSH AbuseIPDB Tried sshing with brute force.
2019-02-19 08:54 attacks Brute-ForceSSH AbuseIPDB Feb 19 19:51:20 ip-172-31-13-230 sshd\[20840\]: Invalid user guest from 164.132.54.215 Feb 19 19:51:20 ip-172-31-13-230 sshd\[20840\]: pam_unix\(sshd:
2019-02-19 09:45 attacks Brute-ForceSSH AbuseIPDB Feb 19 14:42:01 vps200512 sshd\[15093\]: Invalid user mobaxterm from 164.132.54.215 Feb 19 14:42:01 vps200512 sshd\[15093\]: pam_unix\(sshd:auth\): au
2019-02-19 10:16 attacks Brute-ForceSSH AbuseIPDB Feb 19 15:10:00 DELL6230 sshd\[18778\]: Invalid user test1 from 164.132.54.215Feb 19 15:10:02 DELL6230 sshd\[18778\]: Failed password for invalid user
2019-03-29 18:18 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-03-29 18:21 attacks blocklist_de Blocklist.de  
2019-03-29 18:21 attacks SSH blocklist_de_ssh Blocklist.de  
2019-03-29 18:27 attacks firehol_level2 FireHOL  
2019-03-29 18:41 attacks Brute-Force normshield_all_bruteforce NormShield.com  
2019-03-29 18:41 attacks Brute-Force normshield_high_bruteforce NormShield.com  
2019-05-30 09:29 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-05-30 09:29 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-06-03 23:00 attacks SSH nt_ssh_7d NoThink.org  
2019-06-04 22:22 attacks darklist_de darklist.de  
2019-06-12 12:56 attacks Brute-Force bruteforceblocker danger.rulez.sk  
2019-06-12 13:00 attacks firehol_level3 FireHOL  
2019-06-13 13:40 attacks et_compromised Emerging Threats  
2019-09-01 05:58 attacks Web App AttackApache Attack blocklist_de_apache Blocklist.de  
2019-09-01 05:58 attacks Brute-Force blocklist_de_bruteforce Blocklist.de  
2019-09-07 22:33 attacks bi_default_0_1d BadIPs.com  
2019-09-07 22:33 attacks bi_unknown_0_1d BadIPs.com  
2019-09-25 04:42 attacks bi_username-notfound_0_1d BadIPs.com  
2020-07-31 15:57 attacks blocklist_de_strongips Blocklist.de  
2020-07-31 16:02 attacks firehol_level4 FireHOL  
2020-07-31 16:10 attacks greensnow GreenSnow.co  
2020-07-31 16:10 attacks SSH haley_ssh Charles Haley  
2020-08-04 12:23 attacks Fraud VoIP voipbl VoIPBL.org  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 0.0.0.0 - 255.255.255.255
netname: IANA-BLK
descr: The whole IPv4 address space
country: EU # Country field is actually all countries in the world and not just EU countries
org: ORG-IANA1-RIPE
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
status: ALLOCATED UNSPECIFIED
remarks: This object represents all IPv4 addresses.
remarks: If you see this object as a result of a single IP query, it
remarks: means that the IP address you are querying is currently not
remarks: assigned to any organisation.
mnt-by: RIPE-NCC-HM-MNT
mnt-lower: RIPE-NCC-HM-MNT
created: 2002-06-25T14:19:09Z
last-modified: 2018-11-23T10:30:34Z
source: RIPE

organisation: ORG-IANA1-RIPE
org-name: Internet Assigned Numbers Authority
org-type: IANA
address: see http://www.iana.org
remarks: The IANA allocates IP addresses and AS number blocks to RIRs
remarks: see http://www.iana.org/numbers
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2004-04-17T09:57:29Z
last-modified: 2013-07-22T12:03:42Z
source: RIPE # Filtered

role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
nic-hdl: IANA1-RIPE
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
mnt-by: RIPE-NCC-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2001-09-22T09:31:27Z
source: RIPE # Filtered
most specific ip range is highlighted
Updated : 2020-09-07