This IP address has been reported a total of 310
times from 141 distinct
sources.
116.198.230.220 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2025-01-05T17:47:05.311126+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[45847]: pam_unix(sshd:auth): aut ... show more2025-01-05T17:47:05.311126+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[45847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.198.230.220 user=root
2025-01-05T17:47:07.363461+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[45847]: Failed password for root from 116.198.230.220 port 39406 ssh2
2025-01-05T17:47:45.924594+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[45978]: Invalid user pi from 116.198.230.220 port 48084
... show less
Jan 5 15:43:36 rendez-vous sshd[93423]: Failed password for root from 116.198.230.220 port 49716 ss ... show moreJan 5 15:43:36 rendez-vous sshd[93423]: Failed password for root from 116.198.230.220 port 49716 ssh2
Jan 5 15:43:46 rendez-vous sshd[93446]: Invalid user git from 116.198.230.220 port 52170
Jan 5 15:43:48 rendez-vous sshd[93452]: Invalid user oracle from 116.198.230.220 port 52680 show less
2025-01-05T15:27:21.201920+01:00 VPS sshd[1990295]: Failed password for invalid user root from 116.1 ... show more2025-01-05T15:27:21.201920+01:00 VPS sshd[1990295]: Failed password for invalid user root from 116.198.230.220 port 59590 ssh2
2025-01-05T15:27:45.849145+01:00 VPS sshd[1990364]: User root from 116.198.230.220 not allowed because not listed in AllowUsers
2025-01-05T15:27:46.112825+01:00 VPS sshd[1990364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.198.230.220 user=root
2025-01-05T15:27:48.873962+01:00 VPS sshd[1990364]: Failed password for invalid user root from 116.198.230.220 port 36794 ssh2
2025-01-05T15:27:49.521397+01:00 VPS sshd[1990369]: Invalid user pi from 116.198.230.220 port 38290
... show less
2025-01-05T12:12:23.574037+00:00 ssh sshd[3088370]: Failed password for root from 116.198.230.220 po ... show more2025-01-05T12:12:23.574037+00:00 ssh sshd[3088370]: Failed password for root from 116.198.230.220 port 33388 ssh2
2025-01-05T12:12:46.662201+00:00 ssh sshd[3088522]: Invalid user pi from 116.198.230.220 port 37682
2025-01-05T12:12:48.154590+00:00 ssh sshd[3088524]: Invalid user hive from 116.198.230.220 port 38240
2025-01-05T12:12:48.343169+00:00 ssh sshd[3088528]: Invalid user nginx from 116.198.230.220 port 39914
... show less
2025-01-05T12:05:04.778475+01:00 nc4.motyka.pro sshd[601437]: Failed password for root from 116.198. ... show more2025-01-05T12:05:04.778475+01:00 nc4.motyka.pro sshd[601437]: Failed password for root from 116.198.230.220 port 58894 ssh2
2025-01-05T12:05:51.125616+01:00 nc4.motyka.pro sshd[603290]: Invalid user nginx from 116.198.230.220 port 36348
2025-01-05T12:05:52.370615+01:00 nc4.motyka.pro sshd[603203]: Invalid user pi from 116.198.230.220 port 55466
2025-01-05T12:05:52.912171+01:00 nc4.motyka.pro sshd[603205]: Invalid user git from 116.198.230.220 port 59960
2025-01-05T12:05:53.151781+01:00 nc4.motyka.pro sshd[603205]: Failed password for invalid user git from 116.198.230.220 port 59960 ssh2
... show less
Jan 5 10:49:06 host1 sshd[3710209]: Failed password for root from 116.198.230.220 port 35290 ssh2<b ... show moreJan 5 10:49:06 host1 sshd[3710209]: Failed password for root from 116.198.230.220 port 35290 ssh2
Jan 5 10:49:04 host1 sshd[3710209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.198.230.220 user=root
Jan 5 10:49:06 host1 sshd[3710209]: Failed password for root from 116.198.230.220 port 35290 ssh2
Jan 5 10:49:44 host1 sshd[3710274]: Invalid user pi from 116.198.230.220 port 49308
Jan 5 10:49:44 host1 sshd[3710274]: Invalid user pi from 116.198.230.220 port 49308
... show less
Jan 5 10:24:06 host1 sshd[3706290]: Failed password for root from 116.198.230.220 port 59528 ssh2<b ... show moreJan 5 10:24:06 host1 sshd[3706290]: Failed password for root from 116.198.230.220 port 59528 ssh2
Jan 5 10:24:45 host1 sshd[3706349]: Invalid user pi from 116.198.230.220 port 39704
Jan 5 10:24:45 host1 sshd[3706352]: Invalid user hive from 116.198.230.220 port 40202
Jan 5 10:24:46 host1 sshd[3706354]: Invalid user git from 116.198.230.220 port 40700
Jan 5 10:24:46 host1 sshd[3706356]: Invalid user wang from 116.198.230.220 port 41198
... show less
2025-01-05T07:22:05.744628+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[4103148]: pam_unix(sshd:auth): a ... show more2025-01-05T07:22:05.744628+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[4103148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.198.230.220 user=root
2025-01-05T07:22:07.701276+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[4103148]: Failed password for root from 116.198.230.220 port 48562 ssh2
2025-01-05T07:22:47.184836+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[4103321]: Invalid user pi from 116.198.230.220 port 56532
... show less
Report 1548170 with IP 2544675 for SSH brute-force attack by source 2590395 via ssh-honeypot/0.2.0+h ... show moreReport 1548170 with IP 2544675 for SSH brute-force attack by source 2590395 via ssh-honeypot/0.2.0+http show less