This IP address has been reported a total of 4,523 times from 605 distinct sources.
118.69.225.138 was first reported on , and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Aug 13 14:04:34 server sshd[17894]: Disconnected from authenticating user root 118.69.225.138 port 4 ... show moreAug 13 14:04:34 server sshd[17894]: Disconnected from authenticating user root 118.69.225.138 port 46232 [preauth] show less
Aug 13 12:43:46 lnxmail62 sshd[5083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreAug 13 12:43:46 lnxmail62 sshd[5083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138 user=root
Aug 13 12:43:48 lnxmail62 sshd[5083]: Failed password for root from 118.69.225.138 port 42866 ssh2
Aug 13 12:49:46 lnxmail62 sshd[9693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138 user=root
Aug 13 12:49:48 lnxmail62 sshd[9693]: Failed password for root from 118.69.225.138 port 49644 ssh2
Aug 13 12:51:16 lnxmail62 sshd[19164]: Invalid user lucky from 118.69.225.138 port 42404
... show less
Aug 13 12:14:26 srv01 sshd[3294219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 13 12:14:26 srv01 sshd[3294219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
Aug 13 12:14:28 srv01 sshd[3294219]: Failed password for invalid user alfresco from 118.69.225.138 port 38448 ssh2
Aug 13 12:15:27 srv01 sshd[3299838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138 user=root
Aug 13 12:15:29 srv01 sshd[3299838]: Failed password for root from 118.69.225.138 port 52248 ssh2
Aug 13 12:16:26 srv01 sshd[3303886]: Invalid user lost from 118.69.225.138 port 37818
... show less
Aug 13 11:10:46 host1 sshd[2621775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 13 11:10:46 host1 sshd[2621775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
Aug 13 11:10:48 host1 sshd[2621775]: Failed password for invalid user ludo from 118.69.225.138 port 36528 ssh2
Aug 13 11:12:13 host1 sshd[2622128]: Invalid user y from 118.69.225.138 port 57644
Aug 13 11:12:13 host1 sshd[2622128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
Aug 13 11:12:15 host1 sshd[2622128]: Failed password for invalid user y from 118.69.225.138 port 57644 ssh2
Aug 13 11:13:40 host1 sshd[2622603]: Invalid user cy from 118.69.225.138 port 50512
Aug 13 11:13:40 host1 sshd[2622603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
Aug 13 11:13:42 host1 sshd[2622603]: Failed password for invalid user cy from 118.69.225.138 port 50512 ssh2
... show less
Brute-ForceSSH
Anonymous
6 failed SSH login attempts between Sat, 13 Aug 2022 09:45:48 +0200 and Sat, 13 Aug 2022 09:49:25 +0 ... show more6 failed SSH login attempts between Sat, 13 Aug 2022 09:45:48 +0200 and Sat, 13 Aug 2022 09:49:25 +0200, port 22. show less
Brute-ForceSSH
Anonymous
5 failed SSH login attempts between Thu, 07 Apr 2022 12:09:16 +0200 and Sat, 13 Aug 2022 09:34:27 +0 ... show more5 failed SSH login attempts between Thu, 07 Apr 2022 12:09:16 +0200 and Sat, 13 Aug 2022 09:34:27 +0200, port 22. show less
Brute-ForceSSH
Anonymous
Aug 13 09:00:59 Ubuntu-Main sshd[55640]: Failed password for root from 118.69.225.138 port 56228 ssh ... show moreAug 13 09:00:59 Ubuntu-Main sshd[55640]: Failed password for root from 118.69.225.138 port 56228 ssh2
Aug 13 09:02:25 Ubuntu-Main sshd[55672]: Invalid user posto from 118.69.225.138 port 48994
Aug 13 09:02:25 Ubuntu-Main sshd[55672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
Aug 13 09:02:25 Ubuntu-Main sshd[55672]: Invalid user posto from 118.69.225.138 port 48994
Aug 13 09:02:27 Ubuntu-Main sshd[55672]: Failed password for invalid user posto from 118.69.225.138 port 48994 ssh2
... show less
Aug 13 09:00:53 m2369 sshd[778824]: Failed password for root from 118.69.225.138 port 53346 ssh2<br ... show moreAug 13 09:00:53 m2369 sshd[778824]: Failed password for root from 118.69.225.138 port 53346 ssh2
Aug 13 09:02:19 m2369 sshd[779117]: Invalid user posto from 118.69.225.138 port 46114
Aug 13 09:02:19 m2369 sshd[779117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
Aug 13 09:02:19 m2369 sshd[779117]: Invalid user posto from 118.69.225.138 port 46114
Aug 13 09:02:20 m2369 sshd[779117]: Failed password for invalid user posto from 118.69.225.138 port 46114 ssh2
... show less
Aug 13 07:39:40 debian-jj15 sshd[332801]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreAug 13 07:39:40 debian-jj15 sshd[332801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
Aug 13 07:39:42 debian-jj15 sshd[332801]: Failed password for invalid user lqy from 118.69.225.138 port 59108 ssh2
Aug 13 07:41:09 debian-jj15 sshd[332807]: Invalid user pob from 118.69.225.138 port 51856
Aug 13 07:41:09 debian-jj15 sshd[332807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
Aug 13 07:41:11 debian-jj15 sshd[332807]: Failed password for invalid user pob from 118.69.225.138 port 51856 ssh2
... show less
Aug 13 04:48:15 host-134-119-215-243 sshd[26767]: Failed password for root from 118.69.225.138 port ... show moreAug 13 04:48:15 host-134-119-215-243 sshd[26767]: Failed password for root from 118.69.225.138 port 36756 ssh2 show less
Aug 13 03:47:11 web sshd[1724267]: Failed password for root from 118.69.225.138 port 47296 ssh2<br / ... show moreAug 13 03:47:11 web sshd[1724267]: Failed password for root from 118.69.225.138 port 47296 ssh2
Aug 13 03:47:44 web sshd[1724275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138 user=root
Aug 13 03:47:46 web sshd[1724275]: Failed password for root from 118.69.225.138 port 54626 ssh2
Aug 13 03:48:19 web sshd[1724307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138 user=root
Aug 13 03:48:21 web sshd[1724307]: Failed password for root from 118.69.225.138 port 33724 ssh2
... show less
2022-08-13T00:37:32.258400shield sshd\[29161\]: Invalid user che from 118.69.225.138 port 47992<br / ... show more2022-08-13T00:37:32.258400shield sshd\[29161\]: Invalid user che from 118.69.225.138 port 47992
2022-08-13T00:37:32.270319shield sshd\[29161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
2022-08-13T00:37:34.257189shield sshd\[29161\]: Failed password for invalid user che from 118.69.225.138 port 47992 ssh2
2022-08-13T00:38:59.416253shield sshd\[29398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138 user=root
2022-08-13T00:39:01.679776shield sshd\[29398\]: Failed password for root from 118.69.225.138 port 40892 ssh2 show less
2022-08-13T00:24:44.538423shield sshd\[27195\]: pam_unix\(sshd:auth\): authentication failure\; logn ... show more2022-08-13T00:24:44.538423shield sshd\[27195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138 user=root
2022-08-13T00:24:47.098799shield sshd\[27195\]: Failed password for root from 118.69.225.138 port 55436 ssh2
2022-08-13T00:26:12.404803shield sshd\[27444\]: Invalid user director from 118.69.225.138 port 48332
2022-08-13T00:26:12.417802shield sshd\[27444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.225.138
2022-08-13T00:26:14.384878shield sshd\[27444\]: Failed password for invalid user director from 118.69.225.138 port 48332 ssh2 show less