This IP address has been reported a total of 3,625
times from 814 distinct
sources.
123.59.50.202 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 10 11:07:36 mail sshd[244603]: Failed password for root from 123.59.50.202 port 25551 ssh2 ... show moreDec 10 11:07:36 mail sshd[244603]: Failed password for root from 123.59.50.202 port 25551 ssh2
Dec 10 11:12:56 mail sshd[244923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.50.202 user=root
Dec 10 11:12:57 mail sshd[244923]: Failed password for root from 123.59.50.202 port 46839 ssh2
Dec 10 11:15:59 mail sshd[245167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.50.202 user=root
Dec 10 11:16:02 mail sshd[245167]: Failed password for root from 123.59.50.202 port 59579 ssh2
... show less
Brute-ForceSSH
Anonymous
Dec 10 08:37:10 f2b auth.info sshd[129825]: Invalid user ljs from 123.59.50.202 port 47613
Dec ... show moreDec 10 08:37:10 f2b auth.info sshd[129825]: Invalid user ljs from 123.59.50.202 port 47613
Dec 10 08:37:10 f2b auth.info sshd[129825]: Failed password for invalid user ljs from 123.59.50.202 port 47613 ssh2
Dec 10 08:37:10 f2b auth.info sshd[129825]: Disconnected from invalid user ljs 123.59.50.202 port 47613 [preauth]
... show less
Dec 10 10:20:01 www sshd\[22713\]: Invalid user ubuntu from 123.59.50.202Dec 10 10:20:02 www sshd\[2 ... show moreDec 10 10:20:01 www sshd\[22713\]: Invalid user ubuntu from 123.59.50.202Dec 10 10:20:02 www sshd\[22713\]: Failed password for invalid user ubuntu from 123.59.50.202 port 52144 ssh2Dec 10 10:21:23 www sshd\[22732\]: Invalid user ubuntu from 123.59.50.202
... show less
Dec 10 10:01:44 www sshd\[22503\]: Failed password for root from 123.59.50.202 port 21635 ssh2Dec 10 ... show moreDec 10 10:01:44 www sshd\[22503\]: Failed password for root from 123.59.50.202 port 21635 ssh2Dec 10 10:03:04 www sshd\[22536\]: Invalid user luigi from 123.59.50.202Dec 10 10:03:06 www sshd\[22536\]: Failed password for invalid user luigi from 123.59.50.202 port 30246 ssh2
... show less
Dec 10 09:37:24 www sshd\[22156\]: Invalid user project from 123.59.50.202Dec 10 09:37:25 www sshd\[ ... show moreDec 10 09:37:24 www sshd\[22156\]: Invalid user project from 123.59.50.202Dec 10 09:37:25 www sshd\[22156\]: Failed password for invalid user project from 123.59.50.202 port 27539 ssh2Dec 10 09:44:50 www sshd\[22262\]: Failed password for root from 123.59.50.202 port 55878 ssh2
... show less
Dec 10 02:13:49 proliant-dl360-g7-1 sshd[272651]: Invalid user xavier from 123.59.50.202 port 3702<b ... show moreDec 10 02:13:49 proliant-dl360-g7-1 sshd[272651]: Invalid user xavier from 123.59.50.202 port 3702
Dec 10 02:13:49 proliant-dl360-g7-1 sshd[272651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.50.202
Dec 10 02:13:51 proliant-dl360-g7-1 sshd[272651]: Failed password for invalid user xavier from 123.59.50.202 port 3702 ssh2
Dec 10 02:14:34 proliant-dl360-g7-1 sshd[272656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.50.202 user=root
Dec 10 02:14:36 proliant-dl360-g7-1 sshd[272656]: Failed password for root from 123.59.50.202 port 8732 ssh2
... show less
2023-12-10T12:34:52.326467us14.node.yandx.win sshd[1227]: Invalid user lsn from 123.59.50.202 port 4 ... show more2023-12-10T12:34:52.326467us14.node.yandx.win sshd[1227]: Invalid user lsn from 123.59.50.202 port 43580
2023-12-10T12:44:14.332174us14.node.yandx.win sshd[3635]: Invalid user duser from 123.59.50.202 port 12327
2023-12-10T12:45:04.871468us14.node.yandx.win sshd[3885]: Invalid user postgres from 123.59.50.202 port 17258
2023-12-10T12:46:13.249095us14.node.yandx.win sshd[4168]: Invalid user robin from 123.59.50.202 port 22203
2023-12-10T12:48:03.858836us14.node.yandx.win sshd[4659]: Invalid user testserver from 123.59.50.202 port 32061
... show less
Brute-ForceSSH
Anonymous
Dec 10 04:44:29 C1D543E sshd[339932]: Invalid user ole from 123.59.50.202 port 43483
Dec 10 04 ... show moreDec 10 04:44:29 C1D543E sshd[339932]: Invalid user ole from 123.59.50.202 port 43483
Dec 10 04:44:29 C1D543E sshd[339932]: Failed password for invalid user ole from 123.59.50.202 port 43483 ssh2
Dec 10 04:45:37 C1D543E sshd[339984]: Invalid user admin from 123.59.50.202 port 51830
Dec 10 04:45:37 C1D543E sshd[339984]: Failed password for invalid user admin from 123.59.50.202 port 51830 ssh2
Dec 10 04:46:47 C1D543E sshd[340005]: Invalid user newftpuser from 123.59.50.202 port 60170
... show less
Brute-ForceSSH
Anonymous
Dec 10 04:17:05 C1D543E sshd[338901]: Invalid user sagar from 123.59.50.202 port 44044
Dec 10 ... show moreDec 10 04:17:05 C1D543E sshd[338901]: Invalid user sagar from 123.59.50.202 port 44044
Dec 10 04:17:05 C1D543E sshd[338901]: Failed password for invalid user sagar from 123.59.50.202 port 44044 ssh2
Dec 10 04:19:15 C1D543E sshd[339028]: Invalid user phe from 123.59.50.202 port 53621
Dec 10 04:19:15 C1D543E sshd[339028]: Failed password for invalid user phe from 123.59.50.202 port 53621 ssh2
Dec 10 04:22:38 C1D543E sshd[339207]: User root from 123.59.50.202 not allowed because not listed in AllowUsers
... show less
2023-12-10T04:09:58.249310mail0.dwmp.it sshd[24838]: pam_unix(sshd:auth): authentication failure; lo ... show more2023-12-10T04:09:58.249310mail0.dwmp.it sshd[24838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.50.202
2023-12-10T04:09:59.977525mail0.dwmp.it sshd[24838]: Failed password for invalid user sagar from 123.59.50.202 port 28417 ssh2
2023-12-10T04:17:53.319640mail0.dwmp.it sshd[25115]: Invalid user phe from 123.59.50.202 port 58477
... show less