This IP address has been reported a total of 1,491
times from 590 distinct
sources.
119.45.198.169 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-11-24T22:06:02.512821-08:00 goldcrest sshd[237095]: Failed password for invalid user admin from ... show more2024-11-24T22:06:02.512821-08:00 goldcrest sshd[237095]: Failed password for invalid user admin from 119.45.198.169 port 60590 ssh2
2024-11-24T22:10:18.331465-08:00 goldcrest sshd[237226]: Invalid user hadoop-user from 119.45.198.169 port 42426
2024-11-24T22:10:18.333455-08:00 goldcrest sshd[237226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169
2024-11-24T22:10:19.992424-08:00 goldcrest sshd[237226]: Failed password for invalid user hadoop-user from 119.45.198.169 port 42426 ssh2
... show less
Nov 25 05:59:00 roki2 sshd\[8247\]: Invalid user sftpuser from 119.45.198.169
Nov 25 05:59:00 ... show moreNov 25 05:59:00 roki2 sshd\[8247\]: Invalid user sftpuser from 119.45.198.169
Nov 25 05:59:00 roki2 sshd\[8247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169
Nov 25 05:59:01 roki2 sshd\[8247\]: Failed password for invalid user sftpuser from 119.45.198.169 port 60770 ssh2
Nov 25 06:06:15 roki2 sshd\[13090\]: Invalid user testyl from 119.45.198.169
Nov 25 06:06:15 roki2 sshd\[13090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169
... show less
Brute-ForceSSH
Anonymous
Nov 25 03:50:12 con01 sshd[4120663]: Failed password for root from 119.45.198.169 port 52732 ssh2<br ... show moreNov 25 03:50:12 con01 sshd[4120663]: Failed password for root from 119.45.198.169 port 52732 ssh2
Nov 25 03:51:47 con01 sshd[4123791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169 user=root
Nov 25 03:51:50 con01 sshd[4123791]: Failed password for root from 119.45.198.169 port 45542 ssh2
Nov 25 03:53:23 con01 sshd[4126720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169 user=root
Nov 25 03:53:25 con01 sshd[4126720]: Failed password for root from 119.45.198.169 port 38396 ssh2
... show less
Nov 25 02:48:11 Ubuntu-2204-jammy-amd64-base sshd[251478]: Failed password for root from 119.45.198. ... show moreNov 25 02:48:11 Ubuntu-2204-jammy-amd64-base sshd[251478]: Failed password for root from 119.45.198.169 port 57978 ssh2
Nov 25 02:49:35 Ubuntu-2204-jammy-amd64-base sshd[251528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169 user=root
Nov 25 02:49:37 Ubuntu-2204-jammy-amd64-base sshd[251528]: Failed password for root from 119.45.198.169 port 50804 ssh2
... show less
Nov 25 02:35:27 xproot sshd[3624565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreNov 25 02:35:27 xproot sshd[3624565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169
Nov 25 02:35:29 xproot sshd[3624565]: Failed password for invalid user nagios from 119.45.198.169 port 60098 ssh2
Nov 25 02:37:16 xproot sshd[3624589]: Invalid user factorioserver from 119.45.198.169 port 54356
Nov 25 02:37:16 xproot sshd[3624589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169
Nov 25 02:37:18 xproot sshd[3624589]: Failed password for invalid user factorioserver from 119.45.198.169 port 54356 ssh2
... show less
2024-11-25T02:05:15.512693+00:00 gamevps sshd[769686]: Invalid user test from 119.45.198.169 port 39 ... show more2024-11-25T02:05:15.512693+00:00 gamevps sshd[769686]: Invalid user test from 119.45.198.169 port 39742
2024-11-25T02:13:08.639862+00:00 gamevps sshd[769916]: Invalid user develop from 119.45.198.169 port 54388
2024-11-25T02:14:52.036446+00:00 gamevps sshd[769970]: Invalid user testtlq from 119.45.198.169 port 48910
2024-11-25T02:15:41.314575+00:00 gamevps sshd[769991]: Invalid user ubuntuserver from 119.45.198.169 port 59856
2024-11-25T02:16:33.946255+00:00 gamevps sshd[770010]: Invalid user user2 from 119.45.198.169 port 42956
... show less
[rede-176-124] (sshd) Failed SSH login from 119.45.198.169 (CN/China/-): 5 in the last 3600 secs; Po ... show more[rede-176-124] (sshd) Failed SSH login from 119.45.198.169 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 24 23:06:30 sshd[19804]: Invalid user [USERNAME] from 119.45.198.169 port 59996
Nov 24 23:06:32 sshd[19804]: Failed password for invalid user [USERNAME] from 119.45.198.169 port 59996 ssh2
Nov 24 23:15:03 sshd[19977]: Invalid user [USERNAME] from 119.45.198.169 port 60590
Nov 24 23:15:05 sshd[19977]: Failed password for invalid user [USERNAME] from 119.45.198.169 port 60590 ssh2
Nov 24 23:15:56 sshd[19990]: Invalid user [USERNAME] from 119.45.198.169 port 43608 show less
Nov 24 20:55:58 ny01 sshd[4078074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 24 20:55:58 ny01 sshd[4078074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169 user=root
Nov 24 20:55:59 ny01 sshd[4078074]: Failed password for root from 119.45.198.169 port 33032 ssh2
Nov 24 20:58:34 ny01 sshd[4078230]: Invalid user max from 119.45.198.169 port 37254
Nov 24 20:58:34 ny01 sshd[4078230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169
Nov 24 20:58:37 ny01 sshd[4078230]: Failed password for invalid user max from 119.45.198.169 port 37254 ssh2 show less
Nov 25 02:10:45 BGReality sshd[1250952]: Invalid user git_user from 119.45.198.169 port 39348
... show moreNov 25 02:10:45 BGReality sshd[1250952]: Invalid user git_user from 119.45.198.169 port 39348
Nov 25 02:10:47 BGReality sshd[1250952]: Failed password for invalid user git_user from 119.45.198.169 port 39348 ssh2
Nov 25 02:11:49 BGReality sshd[1251004]: Invalid user testuser from 119.45.198.169 port 53414
Nov 25 02:11:49 BGReality sshd[1251004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169
Nov 25 02:11:49 BGReality sshd[1251004]: Invalid user testuser from 119.45.198.169 port 53414
Nov 25 02:11:51 BGReality sshd[1251004]: Failed password for invalid user testuser from 119.45.198.169 port 53414 ssh2
Nov 25 02:13:56 BGReality sshd[1251092]: Invalid user weblogic from 119.45.198.169 port 53298
... show less
Nov 25 01:57:30 plesk sshd[2128062]: Invalid user user02 from 119.45.198.169 port 52356
Nov 25 ... show moreNov 25 01:57:30 plesk sshd[2128062]: Invalid user user02 from 119.45.198.169 port 52356
Nov 25 01:57:30 plesk sshd[2128062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.169
Nov 25 01:57:32 plesk sshd[2128062]: Failed password for invalid user user02 from 119.45.198.169 port 52356 ssh2
Nov 25 01:59:53 plesk sshd[2128143]: Invalid user test from 119.45.198.169 port 48934
... show less
Nov 24 19:09:48 us-mfl-01 sshd[1069968]: Invalid user deploy from 119.45.198.169 port 50106
.. ... show moreNov 24 19:09:48 us-mfl-01 sshd[1069968]: Invalid user deploy from 119.45.198.169 port 50106
... show less