This IP address has been reported a total of 1,356
times from 539 distinct
sources.
13.67.213.45 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Jan 1 11:09:58 racetecweb sshd[669155]: User root from 13.67.213.45 not allowed because not listed ... show moreJan 1 11:09:58 racetecweb sshd[669155]: User root from 13.67.213.45 not allowed because not listed in AllowUsers
Jan 1 11:11:37 racetecweb sshd[669174]: User root from 13.67.213.45 not allowed because not listed in AllowUsers
Jan 1 11:15:35 racetecweb sshd[669413]: User root from 13.67.213.45 not allowed because not listed in AllowUsers
... show less
Brute-ForceSSH
Anonymous
2025-01-01T10:12:14.797096+00:00 ephialtes2 sshd[1664311]: Failed password for root from 13.67.213.4 ... show more2025-01-01T10:12:14.797096+00:00 ephialtes2 sshd[1664311]: Failed password for root from 13.67.213.45 port 37042 ssh2
2025-01-01T10:13:13.898755+00:00 ephialtes2 sshd[1664676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.213.45 user=root
2025-01-01T10:13:15.414476+00:00 ephialtes2 sshd[1664676]: Failed password for root from 13.67.213.45 port 48366 ssh2
2025-01-01T10:14:12.589034+00:00 ephialtes2 sshd[1664957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.213.45 user=root
2025-01-01T10:14:14.872357+00:00 ephialtes2 sshd[1664957]: Failed password for root from 13.67.213.45 port 52158 ssh2
... show less
2025-01-01T09:22:30.190572+00:00 widevents-bizandbiz sshd[1712991]: Invalid user chris from 13.67.21 ... show more2025-01-01T09:22:30.190572+00:00 widevents-bizandbiz sshd[1712991]: Invalid user chris from 13.67.213.45 port 45584
2025-01-01T09:26:36.818992+00:00 widevents-bizandbiz sshd[1713270]: Invalid user syslogs from 13.67.213.45 port 43126
2025-01-01T09:31:57.519769+00:00 widevents-bizandbiz sshd[1713566]: Invalid user biagio from 13.67.213.45 port 54930
... show less
2025-01-01 03:21:13.548637-0600 localhost sshd\[9340\]: Failed password for root from 13.67.213.45 ... show more2025-01-01 03:21:13.548637-0600 localhost sshd\[9340\]: Failed password for root from 13.67.213.45 port 58826 ssh2
2025-01-01 03:23:08.562451-0600 localhost sshd\[9458\]: Invalid user chris from 13.67.213.45 port 46918
2025-01-01 03:23:10.598225-0600 localhost sshd\[9458\]: Failed password for invalid user chris from 13.67.213.45 port 46918 ssh2
... show less
Jan 1 08:47:40 dadelinux sshd[3517935]: Failed password for root from 13.67.213.45 port 59042 ssh2< ... show moreJan 1 08:47:40 dadelinux sshd[3517935]: Failed password for root from 13.67.213.45 port 59042 ssh2
Jan 1 08:48:35 dadelinux sshd[3517971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.213.45 user=root
Jan 1 08:48:37 dadelinux sshd[3517971]: Failed password for root from 13.67.213.45 port 35136 ssh2
Jan 1 08:49:34 dadelinux sshd[3518094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.213.45 user=root
Jan 1 08:49:36 dadelinux sshd[3518094]: Failed password for root from 13.67.213.45 port 41382 ssh2 show less
Jan 1 08:45:10 : pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= r ... show moreJan 1 08:45:10 : pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.213.45 user=root Jan 1 08:45:12 : Failed password for root from 13.67.213.45 port 42354 ssh2 Jan 1 08:46:53 : pam_unix(sshd:auth): authenti show less
Dec 31 23:21:49 ismay sshd[686472]: Failed password for invalid user device from 13.67.213.45 port 5 ... show moreDec 31 23:21:49 ismay sshd[686472]: Failed password for invalid user device from 13.67.213.45 port 51356 ssh2
Dec 31 23:23:12 ismay sshd[686527]: Invalid user nexthink from 13.67.213.45 port 60792
Dec 31 23:23:12 ismay sshd[686527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.213.45
Dec 31 23:23:14 ismay sshd[686527]: Failed password for invalid user nexthink from 13.67.213.45 port 60792 ssh2
Dec 31 23:24:08 ismay sshd[686566]: Invalid user test from 13.67.213.45 port 45232
... show less
Report 1540818 with IP 2545873 for SSH brute-force attack by source 2543230 via ssh-honeypot/0.2.0+h ... show moreReport 1540818 with IP 2545873 for SSH brute-force attack by source 2543230 via ssh-honeypot/0.2.0+http show less
Jan 1 04:59:47 ubuntu sshd[1152835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreJan 1 04:59:47 ubuntu sshd[1152835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.213.45 user=root
Jan 1 04:59:49 ubuntu sshd[1152835]: Failed password for root from 13.67.213.45 port 41350 ssh2
Jan 1 05:00:49 ubuntu sshd[1152850]: Invalid user shen from 13.67.213.45 port 53728
Jan 1 05:00:49 ubuntu sshd[1152850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.213.45
Jan 1 05:00:50 ubuntu sshd[1152850]: Failed password for invalid user shen from 13.67.213.45 port 53728 ssh2
... show less