This IP address has been reported a total of 838
times from 257 distinct
sources.
134.122.62.220 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 12 11:34:21 proxmox-ve sshd[2766695]: Failed password for invalid user loginuser from 134.122.62 ... show moreNov 12 11:34:21 proxmox-ve sshd[2766695]: Failed password for invalid user loginuser from 134.122.62.220 port 53528 ssh2
Nov 12 11:41:45 proxmox-ve sshd[2769343]: Connection from 134.122.62.220 port 43396 on 49.12.130.31 port 22 rdomain ""
Nov 12 11:41:45 proxmox-ve sshd[2769343]: Invalid user hms from 134.122.62.220 port 43396
... show less
2024-11-12T17:34:08.986806+01:00 mailserver sshd[529996]: pam_unix(sshd:auth): authentication failur ... show more2024-11-12T17:34:08.986806+01:00 mailserver sshd[529996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
2024-11-12T17:34:11.336130+01:00 mailserver sshd[529996]: Failed password for invalid user loginuser from 134.122.62.220 port 55340 ssh2
2024-11-12T17:41:35.464729+01:00 mailserver sshd[533702]: Invalid user hms from 134.122.62.220 port 45208
... show less
2024-11-12T16:33:14.077678+00:00 eu-central-vie1 sshd[939701]: pam_unix(sshd:auth): authentication f ... show more2024-11-12T16:33:14.077678+00:00 eu-central-vie1 sshd[939701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
2024-11-12T16:33:16.345176+00:00 eu-central-vie1 sshd[939701]: Failed password for invalid user loginuser from 134.122.62.220 port 56674 ssh2
2024-11-12T16:40:40.672759+00:00 eu-central-vie1 sshd[967154]: Invalid user hms from 134.122.62.220 port 46550
... show less
2024-11-12T18:31:54.986162nfs01 sshd[1258646]: pam_unix(sshd:auth): authentication failure; logname= ... show more2024-11-12T18:31:54.986162nfs01 sshd[1258646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
2024-11-12T18:31:57.274634nfs01 sshd[1258646]: Failed password for invalid user loginuser from 134.122.62.220 port 44282 ssh2
2024-11-12T18:39:21.171092nfs01 sshd[1258677]: Invalid user hms from 134.122.62.220 port 34166
... show less
Brute-ForceSSH
Anonymous
Nov 12 16:31:31 f2b auth.info sshd[191977]: Invalid user loginuser from 134.122.62.220 port 43008<br ... show moreNov 12 16:31:31 f2b auth.info sshd[191977]: Invalid user loginuser from 134.122.62.220 port 43008
Nov 12 16:31:31 f2b auth.info sshd[191977]: Failed password for invalid user loginuser from 134.122.62.220 port 43008 ssh2
Nov 12 16:38:57 f2b auth.info sshd[192018]: Invalid user hms from 134.122.62.220 port 32908
... show less
Brute-ForceSSH
Anonymous
Nov 12 17:31:06 fi7 sshd[597002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreNov 12 17:31:06 fi7 sshd[597002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 12 17:31:08 fi7 sshd[597002]: Failed password for invalid user loginuser from 134.122.62.220 port 60534 ssh2
Nov 12 17:38:31 fi7 sshd[597110]: Invalid user hms from 134.122.62.220 port 50434
... show less
(sshd) Failed SSH login from 134.122.62.220 (US/United States/-): 5 in the last 3600 secs; Ports: *; ... show more(sshd) Failed SSH login from 134.122.62.220 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 12 17:25:46 da057 sshd[2723445]: Did not receive identification string from 134.122.62.220 port 60376
Nov 12 17:26:28 da057 sshd[2723837]: Did not receive identification string from 134.122.62.220 port 58914
Nov 12 17:30:42 da057 sshd[2726849]: Invalid user loginuser from 134.122.62.220 port 57234
Nov 12 17:31:48 da057 sshd[2727301]: Invalid user loginuser from 134.122.62.220 port 37764
Nov 12 17:38:07 da057 sshd[2730805]: Invalid user hms from 134.122.62.220 port 47134 show less
Nov 12 16:37:24 fail2ban sshd[1129325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreNov 12 16:37:24 fail2ban sshd[1129325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 12 16:37:26 fail2ban sshd[1129325]: Failed password for invalid user loginuser from 134.122.62.220 port 33662 ssh2
... show less
Nov 12 17:35:56 ourumov-web sshd\[19617\]: Invalid user loginuser from 134.122.62.220 port 52472<br ... show moreNov 12 17:35:56 ourumov-web sshd\[19617\]: Invalid user loginuser from 134.122.62.220 port 52472
Nov 12 17:35:56 ourumov-web sshd\[19617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 12 17:35:58 ourumov-web sshd\[19617\]: Failed password for invalid user loginuser from 134.122.62.220 port 52472 ssh2
... show less
2024-11-12T17:35:17.525208nc1 sshd[1268560]: Invalid user loginuser from 134.122.62.220 port 40672<b ... show more2024-11-12T17:35:17.525208nc1 sshd[1268560]: Invalid user loginuser from 134.122.62.220 port 40672
... show less