This IP address has been reported a total of 838
times from 257 distinct
sources.
134.122.62.220 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
[rede-166-249] (sshd) Failed SSH login from 134.122.62.220 (NL/The Netherlands/-): 5 in the last 360 ... show more[rede-166-249] (sshd) Failed SSH login from 134.122.62.220 (NL/The Netherlands/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 14 10:02:05 sshd[13286]: Invalid user [USERNAME] from 134.122.62.220 port 59402
Nov 14 10:02:08 sshd[13286]: Failed password for invalid user [USERNAME] from 134.122.62.220 port 59402 ssh2
Nov 14 10:09:04 sshd[13880]: Invalid user [USERNAME] from 134.122.62.220 port 53136
Nov 14 10:09:07 sshd[13880]: Failed password for invalid user [USERNAME] from 134.122.62.220 port 53136 ssh2
Nov 14 10:15:57 sshd[14442]: Invalid user [USERNAME] from 134.122.62.220 port 46870 show less
2024-11-14T12:55:58.725354+00:00 prod-2 sshd[2092861]: Connection closed by invalid user USERID 134. ... show more2024-11-14T12:55:58.725354+00:00 prod-2 sshd[2092861]: Connection closed by invalid user USERID 134.122.62.220 port 42004 [preauth]
2024-11-14T13:02:41.454080+00:00 prod-2 sshd[2098923]: Invalid user admin from 134.122.62.220 port 35738
2024-11-14T13:02:41.541253+00:00 prod-2 sshd[2098923]: Connection closed by invalid user admin 134.122.62.220 port 35738 [preauth]
2024-11-14T13:09:40.451507+00:00 prod-2 sshd[2109623]: Invalid user ingres from 134.122.62.220 port 57704
2024-11-14T13:09:40.549857+00:00 prod-2 sshd[2109623]: Connection closed by invalid user ingres 134.122.62.220 port 57704 [preauth]
... show less
Nov 14 12:55:45 vps-9 sshd[812708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 12:55:45 vps-9 sshd[812708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 12:55:46 vps-9 sshd[812708]: Failed password for invalid user USERID from 134.122.62.220 port 39996 ssh2
Nov 14 13:02:28 vps-9 sshd[813474]: Invalid user admin from 134.122.62.220 port 33730
... show less
[rede-164-29] 11/14/2024-09:45:06.476330, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromi ... show more[rede-164-29] 11/14/2024-09:45:06.476330, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromised or Hostile Host Traffic group 5 show less
2024-11-14T12:28:44.343538+00:00 prod-2 sshd[2072077]: Connection closed by invalid user asterisk 13 ... show more2024-11-14T12:28:44.343538+00:00 prod-2 sshd[2072077]: Connection closed by invalid user asterisk 134.122.62.220 port 38836 [preauth]
2024-11-14T12:35:31.467123+00:00 prod-2 sshd[2077401]: Invalid user asterisk from 134.122.62.220 port 60802
2024-11-14T12:35:31.565041+00:00 prod-2 sshd[2077401]: Connection closed by invalid user asterisk 134.122.62.220 port 60802 [preauth]
2024-11-14T12:42:23.911876+00:00 prod-2 sshd[2082336]: Invalid user asterisk from 134.122.62.220 port 54536
2024-11-14T12:42:23.997296+00:00 prod-2 sshd[2082336]: Connection closed by invalid user asterisk 134.122.62.220 port 54536 [preauth]
... show less
Nov 14 12:28:30 vps-9 sshd[808063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 12:28:30 vps-9 sshd[808063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 12:28:33 vps-9 sshd[808063]: Failed password for invalid user asterisk from 134.122.62.220 port 36828 ssh2
Nov 14 12:35:17 vps-9 sshd[809605]: Invalid user asterisk from 134.122.62.220 port 58794
... show less
[rede-164-29] 11/14/2024-09:28:07.266427, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromi ... show more[rede-164-29] 11/14/2024-09:28:07.266427, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromised or Hostile Host Traffic group 5 show less
2024-11-14T12:01:18.142670+00:00 prod-2 sshd[2048110]: Connection closed by invalid user frappe 134. ... show more2024-11-14T12:01:18.142670+00:00 prod-2 sshd[2048110]: Connection closed by invalid user frappe 134.122.62.220 port 35666 [preauth]
2024-11-14T12:08:21.002256+00:00 prod-2 sshd[2054851]: Invalid user frappe from 134.122.62.220 port 57632
2024-11-14T12:08:21.088059+00:00 prod-2 sshd[2054851]: Connection closed by invalid user frappe 134.122.62.220 port 57632 [preauth]
2024-11-14T12:15:10.729916+00:00 prod-2 sshd[2061021]: Invalid user frappe from 134.122.62.220 port 51366
2024-11-14T12:15:10.817290+00:00 prod-2 sshd[2061021]: Connection closed by invalid user frappe 134.122.62.220 port 51366 [preauth]
... show less
Nov 14 12:01:04 vps-9 sshd[804499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 12:01:04 vps-9 sshd[804499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 12:01:06 vps-9 sshd[804499]: Failed password for invalid user frappe from 134.122.62.220 port 33658 ssh2
Nov 14 12:08:07 vps-9 sshd[805302]: Invalid user frappe from 134.122.62.220 port 55624
... show less
[rede-166-249] (sshd) Failed SSH login from 134.122.62.220 (NL/The Netherlands/-): 5 in the last 360 ... show more[rede-166-249] (sshd) Failed SSH login from 134.122.62.220 (NL/The Netherlands/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 14 08:46:59 sshd[6720]: Invalid user [USERNAME] from 134.122.62.220 port 43630
Nov 14 08:47:01 sshd[6720]: Failed password for invalid user [USERNAME] from 134.122.62.220 port 43630 ssh2
Nov 14 08:53:48 sshd[7252]: Invalid user [USERNAME] from 134.122.62.220 port 37364
Nov 14 08:53:50 sshd[7252]: Failed password for invalid user [USERNAME] from 134.122.62.220 port 37364 ssh2
Nov 14 09:00:41 sshd[7769]: Invalid user [USERNAME] from 134.122.62.220 port 59330 show less
2024-11-14T11:34:01.913386+00:00 prod-2 sshd[2026963]: Connection closed by invalid user era 134.122 ... show more2024-11-14T11:34:01.913386+00:00 prod-2 sshd[2026963]: Connection closed by invalid user era 134.122.62.220 port 60730 [preauth]
2024-11-14T11:40:49.836064+00:00 prod-2 sshd[2032046]: Invalid user nutanx from 134.122.62.220 port 54464
2024-11-14T11:40:49.921458+00:00 prod-2 sshd[2032046]: Connection closed by invalid user nutanx 134.122.62.220 port 54464 [preauth]
2024-11-14T11:47:35.979658+00:00 prod-2 sshd[2037073]: Invalid user admin from 134.122.62.220 port 48198
2024-11-14T11:47:36.062708+00:00 prod-2 sshd[2037073]: Connection closed by invalid user admin 134.122.62.220 port 48198 [preauth]
... show less
[rede-164-29] 11/14/2024-08:43:33.137143, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromi ... show more[rede-164-29] 11/14/2024-08:43:33.137143, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromised or Hostile Host Traffic group 5 show less
Nov 14 11:33:48 vps-9 sshd[800644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 11:33:48 vps-9 sshd[800644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 11:33:49 vps-9 sshd[800644]: Failed password for invalid user era from 134.122.62.220 port 58722 ssh2
Nov 14 11:40:36 vps-9 sshd[801757]: Invalid user nutanx from 134.122.62.220 port 52456
... show less