This IP address has been reported a total of 447
times from 159 distinct
sources.
129.222.144.104 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
May 29 09:04:49 us-mfl-02 sshd[286887]: Invalid user teamspeak from 129.222.144.104 port 57734 ... show moreMay 29 09:04:49 us-mfl-02 sshd[286887]: Invalid user teamspeak from 129.222.144.104 port 57734
... show less
May 29 06:24:14 VPS sshd[3303207]: Invalid user test from 129.222.144.104 port 61767
May 29 06 ... show moreMay 29 06:24:14 VPS sshd[3303207]: Invalid user test from 129.222.144.104 port 61767
May 29 06:24:16 VPS sshd[3303207]: Failed password for invalid user test from 129.222.144.104 port 61767 ssh2
May 29 06:24:20 VPS sshd[3303207]: error: PAM: Authentication failure for illegal user test from 129.222.144.104
May 29 06:24:20 VPS sshd[3303207]: Failed keyboard-interactive/pam for invalid user test from 129.222.144.104 port 61767 ssh2
May 29 06:24:21 VPS sshd[3303207]: Connection closed by invalid user test 129.222.144.104 port 61767 [preauth]
... show less
May 29 05:42:45 sg-mirror sshd[3210215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMay 29 05:42:45 sg-mirror sshd[3210215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.222.144.104
May 29 05:42:47 sg-mirror sshd[3210215]: Failed password for invalid user test from 129.222.144.104 port 56086 ssh2
... show less