Go
95.48.54.106
is a
Hacker
100 %
Poland
Report Abuse
1016attacks reported
820Brute-ForceSSH
63SSH
62Brute-Force
22HackingBrute-ForceSSH
14Port ScanBrute-ForceSSH
8uncategorized
6DDoS Attack
5Hacking
4Port ScanHackingBrute-ForceWeb App AttackSSH
3Port ScanSSH
...
from 155 distinct reporters
and 7 distinct sources : BadIPs.com, Blocklist.de, darklist.de, FireHOL, Charles Haley, NormShield.com, AbuseIPDB
95.48.54.106 was first signaled at 2019-01-06 02:38 and last record was at 2019-09-04 02:58.
IP

95.48.54.106

Organization
Orange Polska Spolka Akcyjna
Localisation
Poland
NetRange : First & Last IP
95.48.0.0 - 95.51.255.255
Network CIDR
95.48.0.0/14

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-04-04 06:01 attacks SSH AbuseIPDB Apr 4 14:59:55 sshgateway sshd\[31218\]: Invalid user data from 95.48.54.106 Apr 4 14:59:55 sshgateway sshd\[31218\]: pam_unix\(sshd:auth\): authentic
2019-04-04 04:36 attacks Brute-ForceSSH AbuseIPDB Apr 4 15:36:15 * sshd[29066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Apr 4 15:36:17 * ss
2019-04-04 03:21 attacks Brute-ForceSSH AbuseIPDB Apr 4 14:21:17 ArkNodeAT sshd\[10824\]: Invalid user info from 95.48.54.106 Apr 4 14:21:17 ArkNodeAT sshd\[10824\]: pam_unix\(sshd:auth\): authenticat
2019-04-04 03:14 attacks SSH AbuseIPDB 2019-04-04T19:14:21.976888enmeeting.mahidol.ac.th sshd\[1845\]: Invalid user support from 95.48.54.106 port 51890 2019-04-04T19:14:21.991072enmeeting.
2019-04-03 23:21 attacks Brute-ForceSSH AbuseIPDB Multiple failed SSH logins
2019-04-03 21:16 attacks Brute-ForceSSH AbuseIPDB Apr 4 13:16:41 itv-usvr-01 sshd[10890]: Invalid user gopher from 95.48.54.106
2019-04-03 20:14 attacks Brute-ForceSSH AbuseIPDB Apr 4 07:14:04 srv206 sshd[16460]: Invalid user gpadmin from 95.48.54.106 Apr 4 07:14:04 srv206 sshd[16460]: pam_unix(sshd:auth): authentication failu
2019-04-03 17:52 attacks Brute-ForceSSH AbuseIPDB Apr 4 04:52:34 MK-Soft-Root2 sshd\[6798\]: Invalid user tmp from 95.48.54.106 port 55828 Apr 4 04:52:34 MK-Soft-Root2 sshd\[6798\]: pam_unix\(sshd:aut
2019-04-03 17:11 attacks Brute-Force AbuseIPDB Apr 4 02:11:30 unicornsoft sshd\[8551\]: Invalid user guest from 95.48.54.106 Apr 4 02:11:30 unicornsoft sshd\[8551\]: pam_unix\(sshd:auth\): authenti
2019-04-03 15:28 attacks Brute-ForceSSH AbuseIPDB Apr 4 03:27:59 srv-4 sshd\[5527\]: Invalid user user from 95.48.54.106 Apr 4 03:27:59 srv-4 sshd\[5527\]: pam_unix\(sshd:auth\): authentication failur
2019-04-03 13:24 attacks Brute-ForceSSH AbuseIPDB Apr 4 00:24:50 ncomp sshd[21114]: Invalid user avis from 95.48.54.106 Apr 4 00:24:50 ncomp sshd[21114]: pam_unix(sshd:auth): authentication failure; l
2019-04-03 13:03 attacks Brute-ForceSSH AbuseIPDB Apr 3 22:00:38 localhost sshd\[56600\]: Invalid user christian from 95.48.54.106 port 53018 Apr 3 22:00:38 localhost sshd\[56600\]: pam_unix\(sshd:aut
2019-04-03 12:43 attacks Port ScanBrute-ForceSSH AbuseIPDB $f2bV_matches
2019-04-03 12:24 attacks Brute-ForceSSH AbuseIPDB Apr 3 23:24:22 ubuntu-2gb-nbg1-dc3-1 sshd[4155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106
2019-04-03 04:17 attacks Brute-ForceSSH AbuseIPDB Apr 3 09:10:15 vps200512 sshd\[15082\]: Invalid user benjamin from 95.48.54.106 Apr 3 09:10:15 vps200512 sshd\[15082\]: pam_unix\(sshd:auth\): authent
2019-04-02 21:07 attacks Brute-ForceSSH AbuseIPDB Apr 3 08:07:56 vps647732 sshd[24794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Apr 3 08:07
2019-04-02 17:56 attacks Brute-ForceSSH AbuseIPDB Apr 3 04:56:10 vpn01 sshd\[16413\]: Invalid user peter from 95.48.54.106 Apr 3 04:56:10 vpn01 sshd\[16413\]: pam_unix\(sshd:auth\): authentication fai
2019-04-02 17:18 attacks Brute-ForceSSH AbuseIPDB 2019-04-03T04:18:38.403356centos sshd\[7171\]: Invalid user dc from 95.48.54.106 port 55030 2019-04-03T04:18:38.407578centos sshd\[7171\]: pam_unix\(s
2019-04-02 16:48 attacks SSH AbuseIPDB ssh-bruteforce
2019-04-02 16:04 attacks Brute-ForceSSH AbuseIPDB Apr 3 02:58:28 lnxded64 sshd[19090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Apr 3 02:58:
2019-04-02 15:18 attacks SSH AbuseIPDB 2019-04-03T07:18:40.118520enmeeting.mahidol.ac.th sshd\[5676\]: Invalid user lab from 95.48.54.106 port 40096 2019-04-03T07:18:40.132634enmeeting.mahi
2019-04-02 09:42 attacks Brute-ForceSSH AbuseIPDB  
2019-04-02 08:21 attacks Brute-ForceSSH AbuseIPDB Tried sshing with brute force.
2019-04-02 06:04 attacks Brute-ForceSSH AbuseIPDB Apr 2 08:26:14 v22018086721571380 sshd[32398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Ap
2019-04-02 04:18 attacks Brute-ForceSSH AbuseIPDB Apr 2 15:18:48 vmd17057 sshd\[17409\]: Invalid user xb from 95.48.54.106 port 57792 Apr 2 15:18:48 vmd17057 sshd\[17409\]: pam_unix\(sshd:auth\): auth
2019-04-02 03:28 attacks Brute-ForceSSH AbuseIPDB Apr 2 14:22:37 vserver sshd\[10192\]: Invalid user friend from 95.48.54.106Apr 2 14:22:39 vserver sshd\[10192\]: Failed password for invalid user frie
2019-04-02 02:21 attacks Brute-ForceSSH AbuseIPDB Apr 2 13:21:55 pornomens sshd\[10342\]: Invalid user ui from 95.48.54.106 port 46908 Apr 2 13:21:55 pornomens sshd\[10342\]: pam_unix\(sshd:auth\): au
2019-04-02 01:28 attacks Brute-ForceSSH AbuseIPDB Apr 2 19:18:29 martinbaileyphotography sshd\[11425\]: Invalid user corinna from 95.48.54.106 port 41594 Apr 2 19:18:32 martinbaileyphotography sshd\[1
2019-04-02 00:49 attacks Brute-ForceSSH AbuseIPDB Apr 2 11:42:14 mail sshd\[93948\]: Invalid user ec from 95.48.54.106 Apr 2 11:42:16 mail sshd\[93948\]: Failed password for invalid user ec from 95.48
2019-04-01 21:16 attacks Brute-ForceSSH AbuseIPDB Apr 2 08:13:01 v22018086721571380 sshd[31391]: Invalid user cu from 95.48.54.106 Apr 2 08:13:01 v22018086721571380 sshd[31391]: pam_unix(sshd:auth): a
2019-04-01 20:56 attacks Brute-ForceSSH AbuseIPDB Apr 2 07:50:26 apollo sshd\[14491\]: Invalid user vz from 95.48.54.106Apr 2 07:50:28 apollo sshd\[14491\]: Failed password for invalid user vz from 95
2019-04-01 20:28 attacks Brute-ForceSSH AbuseIPDB SSH Brute Force
2019-04-01 19:37 attacks Brute-ForceSSH AbuseIPDB Apr 2 04:32:18 dev0-dcfr-rnet sshd\[20570\]: Invalid user accounting from 95.48.54.106 Apr 2 04:32:18 dev0-dcfr-rnet sshd\[20570\]: pam_unix\(sshd:aut
2019-04-01 17:53 attacks Brute-ForceSSH AbuseIPDB Apr 2 04:53:28 [host] sshd[24558]: Invalid user virl from 95.48.54.106 Apr 2 04:53:28 [host] sshd[24558]: pam_unix(sshd:auth): authentication failure;
2019-04-01 17:15 attacks Port ScanSSH AbuseIPDB 02.04.2019 02:15:34 SSH access blocked by firewall
2019-04-01 15:41 attacks Brute-ForceSSH AbuseIPDB Apr 2 02:41:54 ArkNodeAT sshd\[5773\]: Invalid user tomcat from 95.48.54.106 Apr 2 02:41:54 ArkNodeAT sshd\[5773\]: pam_unix\(sshd:auth\): authenticat
2019-04-01 14:51 attacks Brute-ForceSSHPort ScanHacking AbuseIPDB Apr 2 01:50:57 ubuntu-2gb-nbg1-dc3-1 sshd[6852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106
2019-04-01 13:30 attacks Brute-ForceSSH AbuseIPDB 2019-04-02T00:29:01.088067centos sshd\[26328\]: Invalid user ff from 95.48.54.106 port 34120 2019-04-02T00:29:01.092244centos sshd\[26328\]: pam_unix\
2019-04-01 10:02 attacks Brute-ForceSSH AbuseIPDB Apr 1 21:01:16 host sshd\[20463\]: Invalid user usuario from 95.48.54.106 port 46194 Apr 1 21:01:18 host sshd\[20463\]: Failed password for invalid us
2019-04-01 08:07 attacks Brute-ForceSSH AbuseIPDB Apr 1 19:03:23 lnxweb62 sshd[23558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Apr 1 19:03:
2019-04-01 00:54 attacks Brute-ForceSSH AbuseIPDB 2019-04-01T05:47:31.901119cse sshd[8439]: Invalid user ps from 95.48.54.106 port 36448 2019-04-01T05:47:31.904767cse sshd[8439]: pam_unix(sshd:auth):
2019-03-31 20:21 attacks Brute-ForceSSH AbuseIPDB Apr 1 07:21:02 [host] sshd[2350]: Invalid user vagrant from 95.48.54.106 Apr 1 07:21:02 [host] sshd[2350]: pam_unix(sshd:auth): authentication failure
2019-03-31 18:52 attacks Brute-ForceSSH AbuseIPDB Apr 1 05:47:18 lnxmail61 sshd[17044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Apr 1 05:47
2019-03-31 18:47 attacks Brute-ForceSSH AbuseIPDB Apr 1 03:47:33 *** sshd[13029]: Invalid user I2b2workdata2 from 95.48.54.106
2019-03-31 17:47 attacks Brute-ForceSSH AbuseIPDB Apr 1 04:47:00 tuxlinux sshd[58654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Apr 1 04:47
2019-03-31 17:05 attacks SSH AbuseIPDB Apr 1 02:05:51 thevastnessof sshd[32763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106
2019-03-31 15:12 attacks Brute-ForceSSH AbuseIPDB Apr 1 02:05:24 s64-1 sshd[1864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Apr 1 02:05:26 s
2019-03-31 15:07 attacks Brute-ForceSSH AbuseIPDB Mar 31 17:07:01 cac1d2 sshd\[28056\]: Invalid user upload from 95.48.54.106 port 50982 Mar 31 17:07:01 cac1d2 sshd\[28056\]: pam_unix\(sshd:auth\): au
2019-03-31 15:06 attacks Brute-ForceSSH AbuseIPDB  
2019-03-31 11:13 attacks Brute-ForceSSH AbuseIPDB Mar 31 22:13:03 * sshd[18440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Mar 31 22:13:05 *
2019-01-06 02:38 attacks Brute-ForceSSH AbuseIPDB Jan 6 07:38:05 debian sshd\[3029\]: Invalid user jaime from 95.48.54.106 port 36622 Jan 6 07:38:05 debian sshd\[3029\]: pam_unix\(sshd:auth\): authent
2019-01-06 04:04 attacks Brute-ForceSSH AbuseIPDB Jan 6 14:48:25 Ubuntu-1404-trusty-64-minimal sshd\[9590\]: Invalid user brett from 95.48.54.106 Jan 6 14:48:25 Ubuntu-1404-trusty-64-minimal sshd\[959
2019-01-06 06:51 attacks Brute-ForceSSH AbuseIPDB Jan 6 17:43:51 km20725 sshd\[21592\]: Invalid user omn from 95.48.54.106Jan 6 17:43:53 km20725 sshd\[21592\]: Failed password for invalid user omn fro
2019-01-06 07:46 attacks Brute-Force AbuseIPDB Jan 6 18:33:58 mail sshd\[1002\]: Invalid user testuser from 95.48.54.106 port 50812 Jan 6 18:33:58 mail sshd\[1002\]: pam_unix\(sshd:auth\): authenti
2019-01-06 10:17 attacks Brute-ForceSSH AbuseIPDB Jan 6 21:12:02 wh1 sshd\[9712\]: Invalid user anish from 95.48.54.106 Jan 6 21:12:02 wh1 sshd\[9712\]: pam_unix\(sshd:auth\): authentication failure\;
2019-01-06 12:08 attacks Brute-ForceSSH AbuseIPDB ssh failed login
2019-01-06 12:49 attacks FTP Brute-ForceHacking AbuseIPDB Jan 6 14:59:40 h2022099 sshd[13620]: Invalid user brett from 95.48.54.106 Jan 6 14:59:42 h2022099 sshd[13620]: Failed password for invalid user brett
2019-01-06 12:50 attacks Brute-ForceSSH AbuseIPDB  
2019-01-06 18:42 attacks Brute-ForceSSH AbuseIPDB Jan 7 04:42:47 **** sshd[12329]: User proxy from 95.48.54.106 not allowed because not listed in AllowUsers
2019-01-06 20:30 attacks Brute-ForceSSH AbuseIPDB  
2019-03-29 18:18 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:19 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-03-29 18:19 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-03-29 18:21 attacks blocklist_de Blocklist.de  
2019-03-29 18:21 attacks SSH blocklist_de_ssh Blocklist.de  
2019-03-29 18:23 attacks darklist_de darklist.de  
2019-03-29 18:27 attacks firehol_level2 FireHOL  
2019-03-29 18:27 attacks firehol_level4 FireHOL  
2019-03-29 18:34 attacks SSH haley_ssh Charles Haley  
2019-03-29 18:41 attacks Brute-Force normshield_all_bruteforce NormShield.com  
2019-03-29 18:41 attacks Brute-Force normshield_high_bruteforce NormShield.com  
2019-06-23 02:55 attacks bi_default_0_1d BadIPs.com  
2019-06-23 02:55 attacks bi_unknown_0_1d BadIPs.com  
2019-09-04 02:58 attacks blocklist_de_strongips Blocklist.de  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 95.48.0.0 - 95.51.255.255
netname: PL-TPSA-20080926
country: PL
org: ORG-PT1-RIPE
admin-c: OPHT
tech-c: OPHT
status: ALLOCATED PA
remarks: In case of abuse contact: cert.opl@orange.com
mnt-by: RIPE-NCC-HM-MNT
mnt-by: TPNET
mnt-lower: TPNET
mnt-domains: DNS
mnt-routes: AS5617-MNT
created: 2008-09-26T09:17:40Z
last-modified: 2016-07-07T13:24:21Z
source: RIPE # Filtered

organisation: ORG-PT1-RIPE
org-name: Orange Polska Spolka Akcyjna
org-type: LIR
address: Al. Jerozolimskie 160
address: 02-326
address: Warszawa
address: POLAND
phone: +48225230173
fax-no: +48225230178
admin-c: EHD2-RIPE
admin-c: KP21-RIPE
admin-c: AD13130-RIPE
abuse-c: OPHT
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: TPNET
mnt-by: RIPE-NCC-HM-MNT
mnt-by: TPNET
created: 2004-04-17T11:48:22Z
last-modified: 2017-10-30T14:50:54Z
source: RIPE # Filtered

role: OPL - Hostmaster
address: Orange Polska S.A.
address: Al. Jerozolimskie 160
address: 02-326 Warszawa
address: Poland
phone: +48 800 120810
phone: +48 801 600006
phone: +48 22 5039000
fax-no: +48 22 6225182
org: ORG-PT1-RIPE
admin-c: AD13130-RIPE
admin-c: EHD2-RIPE
tech-c: KP21-RIPE
abuse-mailbox: cert.opl@orange.com
nic-hdl: OPHT
mnt-by: TPNET
created: 2014-03-26T08:23:42Z
last-modified: 2016-10-04T12:22:55Z
source: RIPE # Filtered

route: 95.48.0.0/14
descr: TPNET
descr: for abuse: abuse@tpnet.pl
origin: AS5617
mnt-by: AS5617-MNT
created: 2008-09-26T10:11:14Z
last-modified: 2008-09-26T10:11:14Z
source: RIPE
most specific ip range is highlighted
Updated : 2019-07-14