This IP address has been reported a total of 838
times from 257 distinct
sources.
134.122.62.220 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
Drop from IP address 134.122.62.220 to tcp-port 22
2024-11-14T14:17:50.767355+00:00 prod-2 sshd[2175776]: Connection closed by invalid user backupuser ... show more2024-11-14T14:17:50.767355+00:00 prod-2 sshd[2175776]: Connection closed by invalid user backupuser 134.122.62.220 port 51510 [preauth]
2024-11-14T14:24:37.847840+00:00 prod-2 sshd[2181072]: Invalid user nutanix from 134.122.62.220 port 45246
2024-11-14T14:24:37.930783+00:00 prod-2 sshd[2181072]: Connection closed by invalid user nutanix 134.122.62.220 port 45246 [preauth]
2024-11-14T14:31:25.905741+00:00 prod-2 sshd[2186056]: Invalid user dbuser from 134.122.62.220 port 38980
2024-11-14T14:31:25.990582+00:00 prod-2 sshd[2186056]: Connection closed by invalid user dbuser 134.122.62.220 port 38980 [preauth]
... show less
[rede-166-249] (sshd) Failed SSH login from 134.122.62.220 (NL/The Netherlands/-): 5 in the last 360 ... show more[rede-166-249] (sshd) Failed SSH login from 134.122.62.220 (NL/The Netherlands/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 14 11:17:12 sshd[20238]: Invalid user [USERNAME] from 134.122.62.220 port 46942
Nov 14 11:17:15 sshd[20238]: Failed password for invalid user [USERNAME] from 134.122.62.220 port 46942 ssh2
Nov 14 11:24:01 sshd[20856]: Invalid user [USERNAME] from 134.122.62.220 port 40678
Nov 14 11:24:03 sshd[20856]: Failed password for invalid user [USERNAME] from 134.122.62.220 port 40678 ssh2
Nov 14 11:30:49 sshd[21537]: Invalid user [USERNAME] from 134.122.62.220 port 34412 show less
Nov 14 14:17:37 vps-9 sshd[823786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 14:17:37 vps-9 sshd[823786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 14:17:38 vps-9 sshd[823786]: Failed password for invalid user backupuser from 134.122.62.220 port 49502 ssh2
Nov 14 14:24:24 vps-9 sshd[824554]: Invalid user nutanix from 134.122.62.220 port 43238
... show less
2024-11-14T13:50:25.041420+00:00 prod-2 sshd[2139892]: Connection closed by invalid user drupal 134. ... show more2024-11-14T13:50:25.041420+00:00 prod-2 sshd[2139892]: Connection closed by invalid user drupal 134.122.62.220 port 48342 [preauth]
2024-11-14T13:57:13.690448+00:00 prod-2 sshd[2145404]: Invalid user drupal from 134.122.62.220 port 42076
2024-11-14T13:57:13.773415+00:00 prod-2 sshd[2145404]: Connection closed by invalid user drupal 134.122.62.220 port 42076 [preauth]
2024-11-14T14:04:06.579551+00:00 prod-2 sshd[2151291]: Invalid user elk from 134.122.62.220 port 35810
2024-11-14T14:04:06.665255+00:00 prod-2 sshd[2151291]: Connection closed by invalid user elk 134.122.62.220 port 35810 [preauth]
... show less
Nov 14 13:50:11 vps-9 sshd[820026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 13:50:11 vps-9 sshd[820026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 13:50:13 vps-9 sshd[820026]: Failed password for invalid user drupal from 134.122.62.220 port 46334 ssh2
Nov 14 13:56:59 vps-9 sshd[821022]: Invalid user drupal from 134.122.62.220 port 40068
... show less
[rede-164-29] 11/14/2024-10:53:08.828748, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromi ... show more[rede-164-29] 11/14/2024-10:53:08.828748, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromised or Hostile Host Traffic group 5 show less
2024-11-14T13:23:19.599778+00:00 prod-2 sshd[2119718]: Connection closed by invalid user frmi80 134. ... show more2024-11-14T13:23:19.599778+00:00 prod-2 sshd[2119718]: Connection closed by invalid user frmi80 134.122.62.220 port 45174 [preauth]
2024-11-14T13:30:06.045184+00:00 prod-2 sshd[2124954]: Invalid user brun from 134.122.62.220 port 38908
2024-11-14T13:30:06.130447+00:00 prod-2 sshd[2124954]: Connection closed by invalid user brun 134.122.62.220 port 38908 [preauth]
2024-11-14T13:36:51.987012+00:00 prod-2 sshd[2129819]: Invalid user avahi from 134.122.62.220 port 60874
2024-11-14T13:36:52.070043+00:00 prod-2 sshd[2129819]: Connection closed by invalid user avahi 134.122.62.220 port 60874 [preauth]
... show less
[rede-164-29] 11/14/2024-10:36:15.177027, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromi ... show more[rede-164-29] 11/14/2024-10:36:15.177027, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromised or Hostile Host Traffic group 5 show less
Nov 14 13:23:06 vps-9 sshd[816154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 13:23:06 vps-9 sshd[816154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 13:23:07 vps-9 sshd[816154]: Failed password for invalid user frmi80 from 134.122.62.220 port 43166 ssh2
Nov 14 13:29:52 vps-9 sshd[816893]: Invalid user brun from 134.122.62.220 port 36900
... show less