This IP address has been reported a total of 841
times from 424 distinct
sources.
129.213.164.210 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
This IP address carried out 22 SSH credential attack (attempts) on 17-12-2024. For more information ... show moreThis IP address carried out 22 SSH credential attack (attempts) on 17-12-2024. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
2024-12-17T22:47:06.506444online2.bobelweb.eu sshd[16002]: User root from 129.213.164.210 not allowe ... show more2024-12-17T22:47:06.506444online2.bobelweb.eu sshd[16002]: User root from 129.213.164.210 not allowed because not listed in AllowUsers
2024-12-17T22:48:30.548201online2.bobelweb.eu sshd[16068]: User root from 129.213.164.210 not allowed because not listed in AllowUsers
2024-12-17T22:49:50.680177online2.bobelweb.eu sshd[16105]: User root from 129.213.164.210 not allowed because not listed in AllowUsers
2024-12-17T22:51:08.567119online2.bobelweb.eu sshd[16186]: User root from 129.213.164.210 not allowed because not listed in AllowUsers
2024-12-17T22:52:28.974121online2.bobelweb.eu sshd[16506]: User root from 129.213.164.210 not allowed because not listed in AllowUsers show less
Dec 17 21:34:31 antti-vps2 sshd[2660337]: User root from 129.213.164.210 not allowed because none of ... show moreDec 17 21:34:31 antti-vps2 sshd[2660337]: User root from 129.213.164.210 not allowed because none of user's groups are listed in AllowGroups
Dec 17 21:35:53 antti-vps2 sshd[2660561]: Connection from 129.213.164.210 port 41202 on 10.0.0.124 port 22 rdomain ""
Dec 17 21:35:54 antti-vps2 sshd[2660561]: User root from 129.213.164.210 not allowed because none of user's groups are listed in AllowGroups
Dec 17 21:37:16 antti-vps2 sshd[2660752]: Connection from 129.213.164.210 port 48094 on 10.0.0.124 port 22 rdomain ""
Dec 17 21:37:16 antti-vps2 sshd[2660752]: User root from 129.213.164.210 not allowed because none of user's groups are listed in AllowGroups
... show less
Brute-ForceSSH
Anonymous
2024-12-17T22:28:44.163539online2.bobelweb.eu sshd[14487]: User root from 129.213.164.210 not allowe ... show more2024-12-17T22:28:44.163539online2.bobelweb.eu sshd[14487]: User root from 129.213.164.210 not allowed because not listed in AllowUsers
2024-12-17T22:32:47.065027online2.bobelweb.eu sshd[14810]: User root from 129.213.164.210 not allowed because not listed in AllowUsers
2024-12-17T22:34:10.689083online2.bobelweb.eu sshd[14888]: User root from 129.213.164.210 not allowed because not listed in AllowUsers
2024-12-17T22:35:35.874707online2.bobelweb.eu sshd[15092]: User root from 129.213.164.210 not allowed because not listed in AllowUsers
2024-12-17T22:36:58.126385online2.bobelweb.eu sshd[15268]: User root from 129.213.164.210 not allowed because not listed in AllowUsers show less
Attempts to access SSH server with wrong credentials
SSH
Anonymous
Dec 17 23:01:49 ubuntu-s-1vcpu-1gb-lon1-01 sshd[1242933]: Invalid user hoster from 129.213.164.210 p ... show moreDec 17 23:01:49 ubuntu-s-1vcpu-1gb-lon1-01 sshd[1242933]: Invalid user hoster from 129.213.164.210 port 49314
Dec 17 23:03:13 ubuntu-s-1vcpu-1gb-lon1-01 sshd[1243387]: Invalid user zt from 129.213.164.210 port 43410
Dec 17 23:04:32 ubuntu-s-1vcpu-1gb-lon1-01 sshd[1243953]: Invalid user terraria from 129.213.164.210 port 48726
... show less
Dec 17 22:00:21 arayat sshd[26902]: Failed password for root from 129.213.164.210 port 56258 ssh2<br ... show moreDec 17 22:00:21 arayat sshd[26902]: Failed password for root from 129.213.164.210 port 56258 ssh2
Dec 17 22:02:23 arayat sshd[27252]: Invalid user hoster from 129.213.164.210 port 33114
Dec 17 22:02:23 arayat sshd[27252]: Failed password for invalid user hoster from 129.213.164.210 port 33114 ssh2
Dec 17 22:03:46 arayat sshd[27590]: Invalid user zt from 129.213.164.210 port 33478
... show less
2024-12-17T20:31:04.837664+00:00 robotstxt-karol sshd[2347660]: Invalid user elaine from 129.213.164 ... show more2024-12-17T20:31:04.837664+00:00 robotstxt-karol sshd[2347660]: Invalid user elaine from 129.213.164.210 port 55020
2024-12-17T20:32:31.273131+00:00 robotstxt-karol sshd[2347737]: Invalid user diana from 129.213.164.210 port 37528
2024-12-17T20:33:46.954413+00:00 robotstxt-karol sshd[2347801]: Invalid user odoo from 129.213.164.210 port 37418
... show less
2024-12-17T19:57:09.388160+00:00 robotstxt-wppodcast sshd[2955346]: Invalid user travis from 129.213 ... show more2024-12-17T19:57:09.388160+00:00 robotstxt-wppodcast sshd[2955346]: Invalid user travis from 129.213.164.210 port 42926
2024-12-17T19:59:35.884107+00:00 robotstxt-wppodcast sshd[2987915]: Invalid user avg from 129.213.164.210 port 59152
2024-12-17T20:00:57.633083+00:00 robotstxt-wppodcast sshd[3076140]: Invalid user user from 129.213.164.210 port 39112
... show less
2024-12-17T18:27:59.537783+00:00 wpespana-webs sshd[534699]: Invalid user dyrektor from 129.213.164. ... show more2024-12-17T18:27:59.537783+00:00 wpespana-webs sshd[534699]: Invalid user dyrektor from 129.213.164.210 port 58164
2024-12-17T18:29:19.920373+00:00 wpespana-webs sshd[534889]: Invalid user jekins from 129.213.164.210 port 52280
2024-12-17T18:30:39.645281+00:00 wpespana-webs sshd[535053]: Invalid user diego from 129.213.164.210 port 52832
... show less
2024-12-17T12:28:18.606744 mail001 sshd[415121]: Invalid user dyrektor from 129.213.164.210 port 491 ... show more2024-12-17T12:28:18.606744 mail001 sshd[415121]: Invalid user dyrektor from 129.213.164.210 port 49120
2024-12-17T12:28:18.609881 mail001 sshd[415121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.164.210
2024-12-17T12:28:20.541978 mail001 sshd[415121]: Failed password for invalid user dyrektor from 129.213.164.210 port 49120 ssh2
... show less