This IP address has been reported a total of 1,783
times from 618 distinct
sources.
122.49.220.99 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-02-15T02:36:16.862675+00:00 xxx sshd[809955]: Invalid user payroll from 122.49.220.99 port 4462 ... show more2025-02-15T02:36:16.862675+00:00 xxx sshd[809955]: Invalid user payroll from 122.49.220.99 port 44628
2025-02-15T02:41:35.823559+00:00 xxx sshd[823701]: Invalid user kodi from 122.49.220.99 port 48388
2025-02-15T02:43:01.982177+00:00 xxx sshd[827395]: Invalid user tmp from 122.49.220.99 port 58716
... show less
Feb 15 03:42:54 CyberGecko sshd[713137]: Invalid user kodi from 122.49.220.99 port 40612
Feb 1 ... show moreFeb 15 03:42:54 CyberGecko sshd[713137]: Invalid user kodi from 122.49.220.99 port 40612
Feb 15 03:42:54 CyberGecko sshd[713137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.49.220.99
Feb 15 03:42:54 CyberGecko sshd[713137]: Invalid user kodi from 122.49.220.99 port 40612
Feb 15 03:42:56 CyberGecko sshd[713137]: Failed password for invalid user kodi from 122.49.220.99 port 40612 ssh2
... show less
2025-02-15T02:37:22.702453+00:00 debian-s-2vcpu-2gb-sfo3-01 sshd[2485602]: pam_unix(sshd:auth): auth ... show more2025-02-15T02:37:22.702453+00:00 debian-s-2vcpu-2gb-sfo3-01 sshd[2485602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.49.220.99
2025-02-15T02:37:25.085259+00:00 debian-s-2vcpu-2gb-sfo3-01 sshd[2485602]: Failed password for invalid user payroll from 122.49.220.99 port 34204 ssh2
2025-02-15T02:41:53.217466+00:00 debian-s-2vcpu-2gb-sfo3-01 sshd[2485664]: Invalid user kodi from 122.49.220.99 port 48348
... show less
2025-02-15T02:36:50.635196+00:00 edge-con-nyc01.int.pdx.net.uk sshd[2024137]: pam_unix(sshd:auth): a ... show more2025-02-15T02:36:50.635196+00:00 edge-con-nyc01.int.pdx.net.uk sshd[2024137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.49.220.99
2025-02-15T02:36:52.625298+00:00 edge-con-nyc01.int.pdx.net.uk sshd[2024137]: Failed password for invalid user payroll from 122.49.220.99 port 56706 ssh2
2025-02-15T02:41:45.392684+00:00 edge-con-nyc01.int.pdx.net.uk sshd[2025242]: Invalid user kodi from 122.49.220.99 port 46568
... show less
2025-02-15T02:51:35.161429+01:00 eu01 sshd[1829036]: Failed password for invalid user test12 from 12 ... show more2025-02-15T02:51:35.161429+01:00 eu01 sshd[1829036]: Failed password for invalid user test12 from 122.49.220.99 port 48956 ssh2
2025-02-15T02:55:53.369568+01:00 eu01 sshd[1829050]: Invalid user abhi from 122.49.220.99 port 55734
2025-02-15T02:55:53.371426+01:00 eu01 sshd[1829050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.49.220.99
2025-02-15T02:55:55.393169+01:00 eu01 sshd[1829050]: Failed password for invalid user abhi from 122.49.220.99 port 55734 ssh2
2025-02-15T02:57:20.057480+01:00 eu01 sshd[1829080]: Invalid user redmine from 122.49.220.99 port 47152
... show less
Brute-ForceSSH
Anonymous
Feb 14 18:50:49 instance-20210901-2146 sshd[482019]: Invalid user test12 from 122.49.220.99 port 437 ... show moreFeb 14 18:50:49 instance-20210901-2146 sshd[482019]: Invalid user test12 from 122.49.220.99 port 43704
Feb 14 18:55:42 instance-20210901-2146 sshd[482080]: Invalid user abhi from 122.49.220.99 port 34266
Feb 14 18:57:09 instance-20210901-2146 sshd[482113]: Invalid user redmine from 122.49.220.99 port 54486
... show less
2025-02-15T01:51:31.834566 mybox.markdonnellyonline.com sshd[165475]: pam_unix(sshd:auth): authentic ... show more2025-02-15T01:51:31.834566 mybox.markdonnellyonline.com sshd[165475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.49.220.99
2025-02-15T01:51:34.222400 mybox.markdonnellyonline.com sshd[165475]: Failed password for invalid user test12 from 122.49.220.99 port 44144 ssh2
2025-02-15T01:51:36.303998 mybox.markdonnellyonline.com sshd[165475]: Disconnected from invalid user test12 122.49.220.99 port 44144 [preauth]
... show less
Feb 14 22:12:10 orion sshd[641657]: Invalid user www from 122.49.220.99 port 42958
Feb 14 22:1 ... show moreFeb 14 22:12:10 orion sshd[641657]: Invalid user www from 122.49.220.99 port 42958
Feb 14 22:13:31 orion sshd[642156]: Connection from 122.49.220.99 port 45882 on 144.217.76.145 port 22 rdomain ""
Feb 14 22:13:33 orion sshd[642156]: Invalid user smb from 122.49.220.99 port 45882
Feb 14 22:14:50 orion sshd[642637]: Connection from 122.49.220.99 port 44058 on 144.217.76.145 port 22 rdomain ""
Feb 14 22:14:51 orion sshd[642637]: Invalid user arkserver from 122.49.220.99 port 44058
... show less
2025-02-14T23:35:42.127656cb1 sshd[19860]: Invalid user zhangsan from 122.49.220.99 port 36884 ... show more2025-02-14T23:35:42.127656cb1 sshd[19860]: Invalid user zhangsan from 122.49.220.99 port 36884
2025-02-14T23:38:58.437946cb1 sshd[20158]: Invalid user pongsiri from 122.49.220.99 port 47364
2025-02-14T23:40:25.935799cb1 sshd[20328]: Invalid user ambari from 122.49.220.99 port 53108
... show less
2025-02-14T14:29:26.637081-08:00 bluejay sshd[1459275]: Failed password for invalid user ftp_client ... show more2025-02-14T14:29:26.637081-08:00 bluejay sshd[1459275]: Failed password for invalid user ftp_client from 122.49.220.99 port 49558 ssh2
2025-02-14T14:34:12.247281-08:00 bluejay sshd[1460214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.49.220.99 user=ansible
2025-02-14T14:34:14.346154-08:00 bluejay sshd[1460214]: Failed password for ansible from 122.49.220.99 port 58620 ssh2
2025-02-14T14:35:35.299490-08:00 bluejay sshd[1460569]: Invalid user dima from 122.49.220.99 port 48566
... show less