This IP address has been reported a total of 3,545
times from 881 distinct
sources.
119.91.148.194 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Feb 19 14:48:56 mail010 sshd[136429]: Invalid user vernon from 119.91.148.194 port 42738
Feb 1 ... show moreFeb 19 14:48:56 mail010 sshd[136429]: Invalid user vernon from 119.91.148.194 port 42738
Feb 19 14:49:23 mail010 sshd[136441]: Invalid user guest-jyrBKL from 119.91.148.194 port 49804
Feb 19 14:50:29 mail010 sshd[136471]: Invalid user swai from 119.91.148.194 port 35696
Feb 19 14:51:01 mail010 sshd[136484]: Invalid user ruimin from 119.91.148.194 port 42764
... show less
Feb 19 14:48:56 mail010 sshd[136429]: Invalid user vernon from 119.91.148.194 port 42738
Feb 1 ... show moreFeb 19 14:48:56 mail010 sshd[136429]: Invalid user vernon from 119.91.148.194 port 42738
Feb 19 14:49:23 mail010 sshd[136441]: Invalid user guest-jyrBKL from 119.91.148.194 port 49804
Feb 19 14:50:29 mail010 sshd[136471]: Invalid user swai from 119.91.148.194 port 35696
Feb 19 14:51:01 mail010 sshd[136484]: Invalid user ruimin from 119.91.148.194 port 42764
... show less
119.91.148.194 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Por ... show more119.91.148.194 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_DISTATTACK; Logs: Jul 7 19:14:16 11038 sshd[12916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.6.122.181 user=root
Jul 7 19:14:19 11038 sshd[12916]: Failed password for root from 112.6.122.181 port 49336 ssh2
Jul 7 19:19:42 11038 sshd[13409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.139.223 user=root
Jul 7 19:13:26 11038 sshd[12839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.148.194 user=root
Jul 7 19:13:27 11038 sshd[12839]: Failed password for root from 119.91.148.194 port 47802 ssh2
IP Addresses Blocked:
112.6.122.181 (CN/China/-)
170.64.139.223 (AU/Australia/-) show less
Brute-ForceSSH
Anonymous
Jul 8 01:50:08 server2 sshd[4191323]: Invalid user dev from 119.91.148.194 port 55436
Jul 8 ... show moreJul 8 01:50:08 server2 sshd[4191323]: Invalid user dev from 119.91.148.194 port 55436
Jul 8 01:50:10 server2 sshd[4191323]: Failed password for invalid user dev from 119.91.148.194 port 55436 ssh2
Jul 8 01:50:55 server2 sshd[4191545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.148.194 user=root
Jul 8 01:50:57 server2 sshd[4191545]: Failed password for root from 119.91.148.194 port 38560 ssh2
Jul 8 01:51:36 server2 sshd[4191636]: Invalid user ubuntu from 119.91.148.194 port 49914
... show less
Jul 7 22:36:35 vmi1008219 sshd[2843380]: Invalid user postgres from 119.91.148.194 port 40618 ... show moreJul 7 22:36:35 vmi1008219 sshd[2843380]: Invalid user postgres from 119.91.148.194 port 40618
... show less
Brute-ForceSSH
Anonymous
Jul 8 04:14:14 172-16-10-1 sshd[2080849]: Failed password for root from 119.91.148.194 port 57898 s ... show moreJul 8 04:14:14 172-16-10-1 sshd[2080849]: Failed password for root from 119.91.148.194 port 57898 ssh2
Jul 8 04:16:10 172-16-10-1 sshd[2080875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.148.194 user=root
Jul 8 04:16:13 172-16-10-1 sshd[2080875]: Failed password for root from 119.91.148.194 port 39494 ssh2
... show less
Jul 7 20:40:40 racetecweb sshd[54780]: Invalid user david from 119.91.148.194 port 47146
Jul ... show moreJul 7 20:40:40 racetecweb sshd[54780]: Invalid user david from 119.91.148.194 port 47146
Jul 7 20:43:28 racetecweb sshd[54830]: Invalid user sftp from 119.91.148.194 port 40390
Jul 7 20:48:52 racetecweb sshd[54887]: User root from 119.91.148.194 not allowed because not listed in AllowUsers
... show less