This IP address has been reported a total of 1,346
times from 254 distinct
sources.
134.122.45.95 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Feb 4 19:40:35 lnxmail62 sshd[14524]: Invalid user samsung from 134.122.45.95 port 33274
Feb ... show moreFeb 4 19:40:35 lnxmail62 sshd[14524]: Invalid user samsung from 134.122.45.95 port 33274
Feb 4 19:40:35 lnxmail62 sshd[14524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.45.95
... show less
Feb 4 19:06:57 arayat sshd[13616]: Invalid user samsung from 134.122.45.95 port 34846
Feb 4 ... show moreFeb 4 19:06:57 arayat sshd[13616]: Invalid user samsung from 134.122.45.95 port 34846
Feb 4 19:06:58 arayat sshd[13616]: Failed password for invalid user samsung from 134.122.45.95 port 34846 ssh2
Feb 4 19:32:22 arayat sshd[18020]: Invalid user samsung from 134.122.45.95 port 49924
Feb 4 19:32:22 arayat sshd[18020]: Failed password for invalid user samsung from 134.122.45.95 port 49924 ssh2
... show less
Brute-ForceSSH
Anonymous
2025-02-04T19:21:32.672002+01:00 hosting13 sshd[138732]: Failed password for invalid user samsung fr ... show more2025-02-04T19:21:32.672002+01:00 hosting13 sshd[138732]: Failed password for invalid user samsung from 134.122.45.95 port 45528 ssh2
2025-02-04T19:26:10.910695+01:00 hosting13 sshd[140877]: Invalid user samsung from 134.122.45.95 port 34998
2025-02-04T19:26:11.012185+01:00 hosting13 sshd[140877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.45.95
2025-02-04T19:26:12.720925+01:00 hosting13 sshd[140877]: Failed password for invalid user samsung from 134.122.45.95 port 34998 ssh2
2025-02-04T19:27:27.720469+01:00 hosting13 sshd[141438]: Invalid user samsung from 134.122.45.95 port 36858
... show less
Feb 4 10:10:19 ismay sshd[3665773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreFeb 4 10:10:19 ismay sshd[3665773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.45.95
Feb 4 10:10:21 ismay sshd[3665773]: Failed password for invalid user samsung from 134.122.45.95 port 50758 ssh2
Feb 4 10:13:44 ismay sshd[3665944]: Invalid user samsung from 134.122.45.95 port 44424
Feb 4 10:13:44 ismay sshd[3665944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.45.95
Feb 4 10:13:47 ismay sshd[3665944]: Failed password for invalid user samsung from 134.122.45.95 port 44424 ssh2
... show less
2025-02-04T18:06:23.534500+00:00 bluefire sshd[1428718]: pam_unix(sshd:auth): authentication failure ... show more2025-02-04T18:06:23.534500+00:00 bluefire sshd[1428718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.45.95
2025-02-04T18:06:26.151826+00:00 bluefire sshd[1428718]: Failed password for invalid user samsung from 134.122.45.95 port 51746 ssh2
2025-02-04T18:06:47.954524+00:00 bluefire sshd[1428742]: Invalid user samsung from 134.122.45.95 port 54912
... show less
Feb 4 18:39:39 lnxmail62 sshd[29654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreFeb 4 18:39:39 lnxmail62 sshd[29654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.45.95 user=root
Feb 4 18:39:42 lnxmail62 sshd[29654]: Failed password for root from 134.122.45.95 port 36310 ssh2
Feb 4 18:39:42 lnxmail62 sshd[29654]: Failed password for root from 134.122.45.95 port 36310 ssh2
... show less