This IP address has been reported a total of 147
times from 101 distinct
sources.
1.220.57.213 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Aug 12 03:10:38 petr-testing sshd[28557]: Failed password for invalid user suser from 1.220.57.213 p ... show moreAug 12 03:10:38 petr-testing sshd[28557]: Failed password for invalid user suser from 1.220.57.213 port 37646 ssh2
Aug 12 03:21:13 petr-testing sshd[6680]: Failed password for root from 1.220.57.213 port 50906 ssh2
Aug 12 03:22:02 petr-testing sshd[10397]: Failed password for root from 1.220.57.213 port 36720 ssh2
... show less
Report 1291143 with IP 2336079 for SSH brute-force attack by source 2333368 via ssh-honeypot/0.2.0+h ... show moreReport 1291143 with IP 2336079 for SSH brute-force attack by source 2333368 via ssh-honeypot/0.2.0+http show less
Brute-ForceSSH
Anonymous
Aug 12 00:17:59 vps-3cf7b8c3 sshd[2343865]: Invalid user user0 from 1.220.57.213 port 57586
Au ... show moreAug 12 00:17:59 vps-3cf7b8c3 sshd[2343865]: Invalid user user0 from 1.220.57.213 port 57586
Aug 12 00:17:59 vps-3cf7b8c3 sshd[2343865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.220.57.213
Aug 12 00:18:01 vps-3cf7b8c3 sshd[2343865]: Failed password for invalid user user0 from 1.220.57.213 port 57586 ssh2
... show less
Aug 12 01:43:39 vmi263387 sshd[676519]: Invalid user imran from 1.220.57.213 port 47984
Aug 12 ... show moreAug 12 01:43:39 vmi263387 sshd[676519]: Invalid user imran from 1.220.57.213 port 47984
Aug 12 01:43:39 vmi263387 sshd[676519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.220.57.213
Aug 12 01:43:41 vmi263387 sshd[676519]: Failed password for invalid user imran from 1.220.57.213 port 47984 ssh2
Aug 12 01:44:59 vmi263387 sshd[676667]: Invalid user admin from 1.220.57.213 port 36402
... show less
Aug 12 00:00:07 Invalid user eliane from 1.220.57.213 port 36712
Brute-ForceSSH
Anonymous
Aug 11 21:29:54 waw1 sshd[1928471]: Invalid user runner from 1.220.57.213 port 43636
Aug 11 21 ... show moreAug 11 21:29:54 waw1 sshd[1928471]: Invalid user runner from 1.220.57.213 port 43636
Aug 11 21:32:10 waw1 sshd[1929181]: Invalid user coop from 1.220.57.213 port 43588
... show less
Aug 11 15:04:02 b146-09 sshd[2871168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreAug 11 15:04:02 b146-09 sshd[2871168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.220.57.213
Aug 11 15:04:04 b146-09 sshd[2871168]: Failed password for invalid user eliane from 1.220.57.213 port 37268 ssh2
Aug 11 15:12:37 b146-09 sshd[2871390]: Invalid user milad from 1.220.57.213 port 60866
... show less
Brute-ForceSSH
Anonymous
Aug 11 21:00:46 waw1 sshd[1918986]: Invalid user eliane from 1.220.57.213 port 44232
Aug 11 21 ... show moreAug 11 21:00:46 waw1 sshd[1918986]: Invalid user eliane from 1.220.57.213 port 44232
Aug 11 21:09:44 waw1 sshd[1921889]: Invalid user ansible from 1.220.57.213 port 58086
Aug 11 21:12:13 waw1 sshd[1922666]: Invalid user milad from 1.220.57.213 port 58056
... show less
Aug 11 20:23:55 antti-vps2 sshd[110561]: Invalid user adminrig from 1.220.57.213 port 42190
Au ... show moreAug 11 20:23:55 antti-vps2 sshd[110561]: Invalid user adminrig from 1.220.57.213 port 42190
Aug 11 20:26:40 antti-vps2 sshd[110950]: Connection from 1.220.57.213 port 45626 on 10.0.0.124 port 22 rdomain ""
Aug 11 20:26:42 antti-vps2 sshd[110950]: Invalid user csgoserver from 1.220.57.213 port 45626
Aug 11 20:28:04 antti-vps2 sshd[111125]: Connection from 1.220.57.213 port 33236 on 10.0.0.124 port 22 rdomain ""
Aug 11 20:28:05 antti-vps2 sshd[111125]: User ubuntu not allowed because account is locked
... show less
2024-08-11T20:12:52.948537+00:00 nest sshd[1959368]: Invalid user tobias from 1.220.57.213 port 3379 ... show more2024-08-11T20:12:52.948537+00:00 nest sshd[1959368]: Invalid user tobias from 1.220.57.213 port 33798
2024-08-11T20:21:05.033756+00:00 nest sshd[1998759]: Invalid user sa from 1.220.57.213 port 51590
2024-08-11T20:23:46.318345+00:00 nest sshd[2010307]: Invalid user adminrig from 1.220.57.213 port 55040
2024-08-11T20:25:10.642737+00:00 nest sshd[2015427]: Invalid user tanghongyang from 1.220.57.213 port 42648
2024-08-11T20:26:32.904885+00:00 nest sshd[2020941]: Invalid user csgoserver from 1.220.57.213 port 58480
... show less
Aug 11 21:59:31 vps-07b0f6cf sshd[1604918]: Invalid user armen from 1.220.57.213 port 55704
Au ... show moreAug 11 21:59:31 vps-07b0f6cf sshd[1604918]: Invalid user armen from 1.220.57.213 port 55704
Aug 11 22:00:03 vps-07b0f6cf sshd[1605058]: User root from 1.220.57.213 not allowed because not listed in AllowUsers
... show less
Aug 11 21:18:43 h2691902 sshd[19427]: Failed password for invalid user user from 1.220.57.213 port 5 ... show moreAug 11 21:18:43 h2691902 sshd[19427]: Failed password for invalid user user from 1.220.57.213 port 56534 ssh2
Aug 11 21:21:04 h2691902 sshd[19570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.220.57.213 user=root
Aug 11 21:21:06 h2691902 sshd[19570]: Failed password for root from 1.220.57.213 port 56778 ssh2
Aug 11 21:22:13 h2691902 sshd[19576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.220.57.213 user=root
Aug 11 21:22:19 h2691902 sshd[19576]: Failed password for root from 1.220.57.213 port 42872 ssh2
... show less