This IP address has been reported a total of 447
times from 159 distinct
sources.
129.222.144.104 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-05-25T08:33:53.102672+03:00 mummo sshd[2084319]: Invalid user centos from 129.222.144.104 port ... show more2024-05-25T08:33:53.102672+03:00 mummo sshd[2084319]: Invalid user centos from 129.222.144.104 port 59445
... show less
May 25 01:30:35 gen sshd[350973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreMay 25 01:30:35 gen sshd[350973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.222.144.104
May 25 01:30:36 gen sshd[350973]: Failed password for invalid user centos from 129.222.144.104 port 56542 ssh2
May 25 01:30:40 gen sshd[350973]: error: PAM: Authentication failure for illegal user centos from 129.222.144.104
... show less
05/24/2024-23:42:28.694989 129.222.144.104 Protocol: 6 ET POLICY SSH session in progress on Expected ... show more05/24/2024-23:42:28.694989 129.222.144.104 Protocol: 6 ET POLICY SSH session in progress on Expected Port show less
May 25 02:05:31 Digitalogic sshd[3447353]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreMay 25 02:05:31 Digitalogic sshd[3447353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.222.144.104
May 25 02:05:33 Digitalogic sshd[3447353]: Failed password for invalid user centos from 129.222.144.104 port 55320 ssh2
May 25 02:05:35 Digitalogic sshd[3447353]: Connection closed by invalid user centos 129.222.144.104 port 55320 [preauth]
... show less
2024-05-25T00:37:22.484530+03:00 mummo sshd[2018651]: Invalid user guest from 129.222.144.104 port 5 ... show more2024-05-25T00:37:22.484530+03:00 mummo sshd[2018651]: Invalid user guest from 129.222.144.104 port 52952
... show less
May 24 17:12:55 vmi1858823 sshd[20808]: Invalid user guest from 129.222.144.104 port 50086
May ... show moreMay 24 17:12:55 vmi1858823 sshd[20808]: Invalid user guest from 129.222.144.104 port 50086
May 24 17:12:57 vmi1858823 sshd[20808]: Failed password for invalid user guest from 129.222.144.104 port 50086 ssh2
... show less
May 22 18:26:12 server8 sshd[6053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreMay 22 18:26:12 server8 sshd[6053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.222.144.104
May 22 18:26:14 server8 sshd[6053]: Failed password for invalid user config from 129.222.144.104 port 54998 ssh2
May 24 02:49:37 server8 sshd[22657]: Invalid user unknown from 129.222.144.104 port 52294
... show less
2024-05-24T04:32:16.221247+01:00 r2d2 sshd[2733863]: Invalid user unknown from 129.222.144.104 port ... show more2024-05-24T04:32:16.221247+01:00 r2d2 sshd[2733863]: Invalid user unknown from 129.222.144.104 port 52014
... show less