Go
45.122.221.42
is a
Hacker
100 %
Vietnam
Report Abuse
1029attacks reported
792Brute-ForceSSH
86Brute-Force
59SSH
44HackingBrute-ForceSSH
16uncategorized
8Port ScanBrute-ForceSSH
5DDoS AttackBrute-ForceSSH
4Port ScanHackingExploited Host
4Hacking
3FTP Brute-ForceHacking
...
3abuse reported
2Email Spam
1Web SpamBlog SpamHacking
2reputation reported
1Brute-ForceMailserver Attack
1uncategorized
from 156 distinct reporters
and 10 distinct sources : BadIPs.com, Blocklist.de, darklist.de, FireHOL, Charles Haley, urandom.us.to, NoThink.org, blocklist.net.ua, NormShield.com, AbuseIPDB
45.122.221.42 was first signaled at 2017-12-02 11:53 and last record was at 2019-06-24 02:39.
IP

45.122.221.42

Organization
Viet Solutions Services Trading Company Limited
Localisation
Vietnam
NetRange : First & Last IP
45.122.220.0 - 45.122.223.255
Network CIDR
45.122.220.0/22

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-04-06 09:02 attacks Port ScanHackingExploited Host AbuseIPDB Trying ports that it shouldn't be.
2019-04-06 06:15 attacks Brute-ForceSSH AbuseIPDB Apr 6 15:15:11 ***** sshd[2023]: Invalid user scaner from 45.122.221.42 port 46232
2019-04-06 04:45 attacks Brute-ForceSSH AbuseIPDB 2019-04-06T15:44:56.937657scmdmz1 sshd\[26846\]: Invalid user postgres from 45.122.221.42 port 50998 2019-04-06T15:44:56.940544scmdmz1 sshd\[26846\]:
2019-04-06 00:26 attacks Brute-ForceSSH AbuseIPDB Apr 6 11:26:00 pornomens sshd\[17126\]: Invalid user prueba from 45.122.221.42 port 49282 Apr 6 11:26:00 pornomens sshd\[17126\]: pam_unix\(sshd:auth\
2019-04-05 21:16 attacks Brute-ForceSSH AbuseIPDB Apr 6 06:15:58 *** sshd[28343]: Invalid user ftp from 45.122.221.42
2019-04-05 17:34 attacks SSH AbuseIPDB 2019-04-06T09:34:23.175865enmeeting.mahidol.ac.th sshd\[3038\]: User ftp from 45.122.221.42 not allowed because not listed in AllowUsers 2019-04-06T09
2019-04-05 15:42 attacks HackingBrute-ForceSSH AbuseIPDB Attempts against SSH
2019-04-05 11:47 attacks Brute-ForceSSH AbuseIPDB Apr 5 22:47:20 srv206 sshd[4753]: Invalid user support from 45.122.221.42 Apr 5 22:47:20 srv206 sshd[4753]: pam_unix(sshd:auth): authentication failur
2019-04-05 06:27 attacks Brute-ForceSSH AbuseIPDB Apr 5 17:26:59 mail sshd\[24690\]: Invalid user ftpuser from 45.122.221.42 port 53900 Apr 5 17:26:59 mail sshd\[24690\]: Disconnected from 45.122.221.
2019-04-05 05:23 attacks Brute-ForceSSH AbuseIPDB Brute-Force attack detected (85) and blocked by Fail2Ban.
2019-04-04 16:57 attacks Brute-ForceSSH AbuseIPDB Apr 5 03:57:51 PowerEdge sshd\[29834\]: Invalid user support from 45.122.221.42 Apr 5 03:57:51 PowerEdge sshd\[29834\]: pam_unix\(sshd:auth\): authent
2019-04-04 14:31 attacks Brute-ForceSSH AbuseIPDB  
2019-04-04 12:32 attacks Brute-ForceSSH AbuseIPDB  
2019-04-04 10:07 attacks Brute-ForceSSH AbuseIPDB Apr 4 20:07:29 mail sshd\[24928\]: Invalid user test7 from 45.122.221.42 port 47894 Apr 4 20:07:29 mail sshd\[24928\]: pam_unix\(sshd:auth\): authenti
2019-04-04 06:10 attacks SSH AbuseIPDB Apr 4 15:10:23 thevastnessof sshd[32760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42
2019-04-04 04:37 attacks Brute-ForceSSH AbuseIPDB Apr 4 14:37:26 debian sshd\[20411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 user=roo
2019-04-04 01:30 attacks Brute-ForceSSH AbuseIPDB Apr 4 12:30:07 cvbmail sshd\[30504\]: Invalid user test from 45.122.221.42 Apr 4 12:30:07 cvbmail sshd\[30504\]: pam_unix\(sshd:auth\): authentication
2019-04-03 20:42 attacks Brute-ForceSSH AbuseIPDB SSH Brute Force
2019-04-03 19:34 attacks Brute-ForceSSH AbuseIPDB Apr 4 04:34:29 localhost sshd\[18647\]: Invalid user user from 45.122.221.42 port 60850 Apr 4 04:34:29 localhost sshd\[18647\]: pam_unix\(sshd:auth\):
2019-04-03 19:19 attacks SSH AbuseIPDB Apr 3 23:19:24 vps sshd[4670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 user=root Apr 3 2
2019-04-03 03:47 attacks SSH AbuseIPDB 2019-04-03T19:47:33.783321enmeeting.mahidol.ac.th sshd\[14910\]: User root from 45.122.221.42 not allowed because not listed in AllowUsers 2019-04-03T
2019-04-03 02:52 attacks Brute-ForceSSH AbuseIPDB Apr 3 13:52:38 ns3367391 sshd\[23270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 user=
2019-04-03 00:19 attacks Brute-ForceSSH AbuseIPDB Apr 3 09:19:31 localhost sshd\[55903\]: Invalid user ubuntu from 45.122.221.42 port 33252 Apr 3 09:19:31 localhost sshd\[55903\]: pam_unix\(sshd:auth\
2019-04-02 19:04 attacks Brute-ForceSSH AbuseIPDB Apr 3 06:04:12 cvbmail sshd\[1848\]: Invalid user jboss from 45.122.221.42 Apr 3 06:04:12 cvbmail sshd\[1848\]: pam_unix\(sshd:auth\): authentication
2019-04-02 17:35 attacks Brute-Force AbuseIPDB Apr 3 02:35:03 work-partkepr sshd\[7284\]: User postgres from 45.122.221.42 not allowed because not listed in AllowUsers Apr 3 02:35:03 work-partkepr
2019-04-02 16:53 attacks Brute-ForceSSH AbuseIPDB  
2019-04-02 14:56 attacks Brute-ForceSSH AbuseIPDB Apr 3 01:56:26 * sshd[10372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 Apr 3 01:56:29 * s
2019-04-02 12:56 attacks Brute-ForceSSH AbuseIPDB Apr 2 23:55:44 ArkNodeAT sshd\[8994\]: Invalid user samba from 45.122.221.42 Apr 2 23:55:44 ArkNodeAT sshd\[8994\]: pam_unix\(sshd:auth\): authenticat
2019-04-02 12:18 attacks HackingBrute-ForceSSH AbuseIPDB SSH authentication failure x 7 reported by Fail2Ban
2019-04-02 02:57 attacks Brute-ForceSSH AbuseIPDB ssh_attempt
2019-04-02 00:32 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2019-04-01 21:03 attacks Brute-ForceSSH AbuseIPDB Apr 2 08:03:43 * sshd[9074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 Apr 2 08:03:45 * ss
2019-04-01 19:45 attacks Brute-ForceSSH AbuseIPDB Distributed SSH attack
2019-04-01 07:21 attacks Brute-ForceSSH AbuseIPDB Apr 1 18:21:31 ns3367391 sshd\[22927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 user=
2019-04-01 04:45 attacks Brute-ForceSSH AbuseIPDB 2019-04-01T15:45:42.610572scmdmz1 sshd\[2105\]: Invalid user test from 45.122.221.42 port 34146 2019-04-01T15:45:42.614227scmdmz1 sshd\[2105\]: pam_un
2019-04-01 02:07 attacks Brute-ForceSSH AbuseIPDB Apr 1 13:07:52 cvbmail sshd\[4890\]: Invalid user nginx from 45.122.221.42 Apr 1 13:07:52 cvbmail sshd\[4890\]: pam_unix\(sshd:auth\): authentication
2019-03-31 21:31 attacks Brute-ForceSSH AbuseIPDB ssh failed login
2019-03-31 14:14 attacks Brute-ForceSSH AbuseIPDB Apr 1 01:14:14 vps647732 sshd[13416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 Apr 1 01:1
2019-03-31 09:48 attacks SSH AbuseIPDB Mar 31 13:48:35 vps sshd[21683]: Invalid user usuario from 45.122.221.42 Mar 31 13:48:35 vps sshd[21683]: pam_unix(sshd:auth): authentication failure;
2019-03-31 05:25 attacks Brute-ForceSSH AbuseIPDB Mar 31 16:24:59 HiS01 sshd\[16353\]: Invalid user qhsupport from 45.122.221.42 Mar 31 16:24:59 HiS01 sshd\[16353\]: pam_unix\(sshd:auth\): authenticat
2019-03-30 14:24 attacks SSH AbuseIPDB Mar 30 23:24:35 thevastnessof sshd[12465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42
2019-03-30 10:33 attacks Brute-ForceSSH AbuseIPDB Mar 30 21:33:09 srv-4 sshd\[24688\]: Invalid user zimbra from 45.122.221.42 Mar 30 21:33:09 srv-4 sshd\[24688\]: pam_unix\(sshd:auth\): authentication
2019-03-30 04:46 attacks Brute-ForceSSH AbuseIPDB Mar 30 14:46:45 server sshd[28026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42
2019-03-30 02:35 attacks Brute-ForceSSH AbuseIPDB Mar 30 11:35:24 debian sshd\[32120\]: Invalid user postgres from 45.122.221.42 port 53090 Mar 30 11:35:24 debian sshd\[32120\]: pam_unix\(sshd:auth\):
2019-03-29 23:19 attacks Brute-ForceSSH AbuseIPDB Mar 30 08:19:45 localhost sshd\[28678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 user
2019-03-29 18:36 attacks Brute-ForceSSH AbuseIPDB Mar 30 03:36:20 **** sshd[15509]: Invalid user oracle from 45.122.221.42 port 49888
2019-03-29 12:11 attacks Brute-ForceSSH AbuseIPDB Mar 29 22:11:03 vps65 sshd\[28643\]: Invalid user jboss from 45.122.221.42 port 59596 Mar 29 22:11:03 vps65 sshd\[28643\]: pam_unix\(sshd:auth\): auth
2019-03-29 10:50 attacks Brute-ForceSSH AbuseIPDB SSH invalid-user multiple login try
2019-03-29 00:00 attacks Brute-ForceSSH AbuseIPDB Mar 29 10:00:16 mail sshd\[7078\]: Invalid user oracle from 45.122.221.42 port 33978 Mar 29 10:00:16 mail sshd\[7078\]: Disconnected from 45.122.221.4
2019-03-28 17:39 attacks Brute-ForceSSH AbuseIPDB SSH Bruteforce Attack
2017-12-02 11:53 attacks SSH AbuseIPDB ssh intrusion attempt
2017-12-02 11:58 attacks SSH AbuseIPDB Unauthorized access to SSH at 26/Nov/2017:00:21:22 +0000. Received: (SSH-2.0-libssh2_1.7.0)
2017-12-02 13:43 attacks Brute-ForceSSH AbuseIPDB [Aegis] @ 2017-11-24 04:15:15 0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attac
2017-12-02 13:54 attacks Brute-ForceSSH AbuseIPDB SSH/22 MH Probe, BF -
2017-12-02 13:56 attacks Brute-ForceSSHEmail Spam AbuseIPDB SSH/22 MH Probe, BF -
2017-12-02 13:56 attacks Brute-ForceSSH AbuseIPDB SSH/22 MH Probe, BF -
2017-12-02 13:58 attacks Brute-Force AbuseIPDB Nov 20 08:32:21 aragorn sshd\[29145\]: Invalid user eupa from 45.122.221.42\ Nov 20 08:32:23 aragorn sshd\[29145\]: Failed password for invalid user e
2017-12-02 14:10 attacks Brute-Force AbuseIPDB  
2017-12-02 14:20 attacks Brute-Force AbuseIPDB Nov 15 06:05:36 aragorn sshd\[13226\]: Invalid user phion from 45.122.221.42\ Nov 15 06:05:38 aragorn sshd\[13226\]: Failed password for invalid user
2017-12-02 14:38 attacks FTP Brute-ForceHacking AbuseIPDB Nov 10 16:23:29 web2 sshd[4732]: Invalid user manager from 45.122.221.42 Nov 10 16:23:29 web2 sshd[4732]: pam_unix(sshd:auth): authentication failure;
2019-03-29 18:18 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:19 attacks bi_any_1_7d BadIPs.com  
2019-03-29 18:19 attacks bi_any_2_1d BadIPs.com  
2019-03-29 18:19 attacks bi_any_2_30d BadIPs.com  
2019-03-29 18:19 attacks bi_any_2_7d BadIPs.com  
2019-03-29 18:19 attacks Bad Web Bot bi_badbots_1_7d BadIPs.com  
2019-03-29 18:19 attacks Brute-Force bi_bruteforce_1_7d BadIPs.com  
2019-03-29 18:19 attacks bi_default_1_7d BadIPs.com  
2019-03-29 18:19 attacks bi_default_2_30d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_sshd_1_7d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_sshd_2_30d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_1_7d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_2_30d BadIPs.com  
2019-03-29 18:20 attacks bi_unknown_1_7d BadIPs.com  
2019-03-29 18:20 attacks bi_unknown_2_30d BadIPs.com  
2019-03-29 18:21 attacks blocklist_de Blocklist.de  
2019-03-29 18:21 attacks SSH blocklist_de_ssh Blocklist.de  
2019-03-29 18:23 attacks darklist_de darklist.de  
2019-03-29 18:27 attacks firehol_level2 FireHOL  
2019-03-29 18:27 attacks firehol_level4 FireHOL  
2019-03-29 18:34 attacks SSH haley_ssh Charles Haley  
2019-03-29 18:41 reputation Brute-ForceMailserver Attack packetmail  
2019-03-29 18:53 attacks urandomusto_unspecified urandom.us.to  
2019-05-28 23:18 reputation bds_atif  
2019-05-28 23:19 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-05-30 09:29 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-05-30 09:29 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-05-30 09:30 attacks bi_default_0_1d BadIPs.com  
2019-05-30 09:30 attacks bi_unknown_0_1d BadIPs.com  
2019-06-03 22:59 attacks SSH nt_ssh_7d NoThink.org  
2019-06-17 09:25 abuse Email Spam blocklist_net_ua blocklist.net.ua  
2019-06-24 02:39 attacks Brute-Force normshield_all_bruteforce NormShield.com  
2019-06-24 02:39 attacks Brute-Force normshield_high_bruteforce NormShield.com  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 45.122.220.0 - 45.122.223.255
netname: VHOST-VN
descr: Viet Solutions Services Trading Company Limited
admin-c: TTN4-AP
tech-c: LNT8-AP
country: VN
mnt-by: MAINT-VN-VNNIC
mnt-lower: MAINT-VN-VNNIC
mnt-irt: IRT-VNNIC-AP
status: ALLOCATED PORTABLE
last-modified: 2017-06-14T10:32:38Z
source: APNIC

irt: IRT-VNNIC-AP
address: Ha Noi, VietNam
phone: +84-24-35564944
fax-no: +84-24-37821462
e-mail: hm-changed@vnnic.vn
abuse-mailbox: hm-changed@vnnic.vn
admin-c: NTTT1-AP
tech-c: NTTT1-AP
auth: # Filtered
mnt-by: MAINT-VN-VNNIC
last-modified: 2017-11-08T09:40:06Z
source: APNIC

person: Le Ngoc Truong
address: VHOST-VN
country: VN
phone: +84-19006806
e-mail: truongln@vhost.vn
nic-hdl: LNT8-AP
mnt-by: MAINT-VN-VNNIC
last-modified: 2017-06-14T10:26:33Z
source: APNIC

person: Than Trung Nghia
nic-hdl: TTN4-AP
e-mail: nghiatt@vhost.vn
address: Viet Solutions Services Trading Company Limited
phone: +84-8-39718827
fax-no: +84-8-39718827
country: VN
mnt-by: MAINT-VN-VNNIC
last-modified: 2017-06-14T10:33:59Z
source: APNIC
most specific ip range is highlighted
Updated : 2019-02-01