Loading IP search...
A type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords (often from a data breach), and then uses the credentials to gain unauthorized access to user accounts on other systems through large-scale automated login requests directed against a web application.
Port / Service: 22
Protocol: TCP
Sensor Count: 1
Hits: 2
Last Seen: 2025-01-26T16:55:32.876Z
Port / Service: 2222
Protocol: TCP
Sensor Count: 1
Hits: 1
Last Seen: 2025-01-26T16:55:32.875Z
Sensor Count: 1
Hits: 36,661
Last Seen:2026-02-19T06:11:41.840Z
Port: 26730
Protocol: TCP
Service: -
Port: 25738
Protocol: TCP
Service: -
Port: 49582
Protocol: TCP
Service: -
Port: 64036
Protocol: TCP
Service: -
Port: 10009
Protocol: TCP
Service: swdtp-sv
Port: 1001
Protocol: TCP
Service: webpush
Port: 10006
Protocol: TCP
Service: netapp-sync
Port: 10015
Protocol: TCP
Service: -
Port: 10008
Protocol: TCP
Service: octopus
Port: 10012
Protocol: TCP
Service: -
| IP Address β² | Hits | First Seen (UTC) | Last Seen (UTC) |
|---|---|---|---|
| 45.142.193.2β | 70,943 | 2025-02-13T09:48:23.663Z | 2025-03-11T06:11:28.589Z |
| 45.142.193.4β | 26,243 | 2026-01-27T11:20:44.033Z | 2026-01-30T06:55:43.851Z |
| 45.142.193.5β | 314,210 | 2025-01-22T20:30:47.986Z | 2026-02-02T09:51:36.047Z |
| 45.142.193.6β | 39,113 | 2026-01-29T11:04:49.573Z | 2026-02-02T09:51:22.564Z |
| 45.142.193.7β | 1,213,289 | 2025-08-28T08:57:25.442Z | 2026-02-02T09:48:12.563Z |
| 45.142.193.9β | 18 | 2026-01-27T07:58:48.499Z | 2026-01-27T08:26:55.021Z |
| 45.142.193.10β | 32 | 2026-01-27T07:28:00.324Z | 2026-01-27T07:29:42.818Z |
| 45.142.193.11β | 71,042 | 2025-02-13T09:51:47.870Z | 2025-03-11T02:14:16.516Z |
| 45.142.193.13β | 48,734 | 2026-01-27T10:43:47.063Z | 2026-02-02T09:51:30.345Z |
| 45.142.193.17β | 93,381 | 2025-06-01T03:51:24.215Z | 2025-09-27T12:50:22.390Z |
Page 1 of 15