This IP address has been reported a total of 38,738
times from 1,837 distinct
sources.
128.199.214.193 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-06-15T05:16:28.110958+02:00 fusco sshd[3809276]: Invalid user etherpad from 128.199.214.193 por ... show more2025-06-15T05:16:28.110958+02:00 fusco sshd[3809276]: Invalid user etherpad from 128.199.214.193 port 35018
... show less
Jun 14 19:01:05 b146-39 sshd[3218512]: Invalid user wangcx from 128.199.214.193 port 54122
Jun ... show moreJun 14 19:01:05 b146-39 sshd[3218512]: Invalid user wangcx from 128.199.214.193 port 54122
Jun 14 19:01:05 b146-39 sshd[3218512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
Jun 14 19:01:08 b146-39 sshd[3218512]: Failed password for invalid user wangcx from 128.199.214.193 port 54122 ssh2
... show less
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2025-06-15T03:48:06Z and 2025-06-1 ... show moreCowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2025-06-15T03:48:06Z and 2025-06-15T03:48:10Z show less
2025-06-15T00:04:06.717876+02:00 ubuntu sshd-session[65874]: Failed password for invalid user oracle ... show more2025-06-15T00:04:06.717876+02:00 ubuntu sshd-session[65874]: Failed password for invalid user oracle from 128.199.214.193 port 45862 ssh2
2025-06-15T00:08:25.063525+02:00 ubuntu sshd-session[65944]: Invalid user gpadmin from 128.199.214.193 port 48242
2025-06-15T00:08:25.068162+02:00 ubuntu sshd-session[65944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
2025-06-15T00:08:27.279958+02:00 ubuntu sshd-session[65944]: Failed password for invalid user gpadmin from 128.199.214.193 port 48242 ssh2
2025-06-15T00:12:36.096273+02:00 ubuntu sshd-session[66028]: Invalid user tony from 128.199.214.193 port 50612
... show less
Brute-Force
Anonymous
2025-06-14T23:46:54.224758+02:00 ubuntu sshd-session[65657]: pam_unix(sshd:auth): authentication fai ... show more2025-06-14T23:46:54.224758+02:00 ubuntu sshd-session[65657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
2025-06-14T23:46:55.870841+02:00 ubuntu sshd-session[65657]: Failed password for invalid user idf from 128.199.214.193 port 36146 ssh2
2025-06-14T23:51:11.631062+02:00 ubuntu sshd-session[65734]: Invalid user alumno from 128.199.214.193 port 38556
2025-06-14T23:51:11.634934+02:00 ubuntu sshd-session[65734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
2025-06-14T23:51:14.227639+02:00 ubuntu sshd-session[65734]: Failed password for invalid user alumno from 128.199.214.193 port 38556 ssh2
... show less
Brute-Force
Anonymous
2025-06-14T23:20:20.854103+02:00 ubuntu sshd-session[65286]: Failed password for invalid user ubuntu ... show more2025-06-14T23:20:20.854103+02:00 ubuntu sshd-session[65286]: Failed password for invalid user ubuntu from 128.199.214.193 port 49854 ssh2
2025-06-14T23:24:49.245609+02:00 ubuntu sshd-session[65336]: Invalid user roott from 128.199.214.193 port 52302
2025-06-14T23:24:49.248591+02:00 ubuntu sshd-session[65336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
2025-06-14T23:24:51.662357+02:00 ubuntu sshd-session[65336]: Failed password for invalid user roott from 128.199.214.193 port 52302 ssh2
2025-06-14T23:29:15.898425+02:00 ubuntu sshd-session[65425]: Invalid user postgres from 128.199.214.193 port 54734
... show less
Brute-Force
Anonymous
2025-06-14T23:02:30.046978+02:00 ubuntu sshd-session[65044]: pam_unix(sshd:auth): authentication fai ... show more2025-06-14T23:02:30.046978+02:00 ubuntu sshd-session[65044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193 user=root
2025-06-14T23:02:31.974216+02:00 ubuntu sshd-session[65044]: Failed password for root from 128.199.214.193 port 40106 ssh2
2025-06-14T23:06:59.293252+02:00 ubuntu sshd-session[65092]: Invalid user server1 from 128.199.214.193 port 42584
2025-06-14T23:06:59.296790+02:00 ubuntu sshd-session[65092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
2025-06-14T23:07:01.485815+02:00 ubuntu sshd-session[65092]: Failed password for invalid user server1 from 128.199.214.193 port 42584 ssh2
... show less
Brute-Force
Anonymous
2025-06-14T22:35:38.980802+02:00 ubuntu sshd-session[64760]: pam_unix(sshd:auth): authentication fai ... show more2025-06-14T22:35:38.980802+02:00 ubuntu sshd-session[64760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193 user=root
2025-06-14T22:35:40.607164+02:00 ubuntu sshd-session[64760]: Failed password for root from 128.199.214.193 port 53986 ssh2
2025-06-14T22:40:14.959878+02:00 ubuntu sshd-session[64846]: Invalid user student from 128.199.214.193 port 56390
2025-06-14T22:40:14.963934+02:00 ubuntu sshd-session[64846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
2025-06-14T22:40:17.147303+02:00 ubuntu sshd-session[64846]: Failed password for invalid user student from 128.199.214.193 port 56390 ssh2
... show less
Brute-Force
Anonymous
2025-06-14T22:09:06.311886+02:00 ubuntu sshd-session[64503]: Failed password for invalid user deamon ... show more2025-06-14T22:09:06.311886+02:00 ubuntu sshd-session[64503]: Failed password for invalid user deamon_root from 128.199.214.193 port 39596 ssh2
2025-06-14T22:13:37.120808+02:00 ubuntu sshd-session[64540]: Invalid user lfs from 128.199.214.193 port 41990
2025-06-14T22:13:37.124575+02:00 ubuntu sshd-session[64540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
2025-06-14T22:13:39.067236+02:00 ubuntu sshd-session[64540]: Failed password for invalid user lfs from 128.199.214.193 port 41990 ssh2
2025-06-14T22:18:02.405275+02:00 ubuntu sshd-session[64587]: Invalid user bot from 128.199.214.193 port 44382
... show less
2025-06-14T22:09:17.071549+02:00 hades sshd[3884046]: pam_unix(sshd:auth): authentication failure; l ... show more2025-06-14T22:09:17.071549+02:00 hades sshd[3884046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.214.193
2025-06-14T22:09:18.654142+02:00 hades sshd[3884046]: Failed password for invalid user deamon_root from 128.199.214.193 port 58638 ssh2
2025-06-14T22:13:50.380483+02:00 hades sshd[3884970]: Invalid user lfs from 128.199.214.193 port 32804
... show less