This IP address has been reported a total of 838
times from 257 distinct
sources.
134.122.62.220 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
[rede-164-29] 11/14/2024-08:26:37.861084, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromi ... show more[rede-164-29] 11/14/2024-08:26:37.861084, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromised or Hostile Host Traffic group 5 show less
2024-11-14T11:06:41.444074+00:00 prod-2 sshd[2006450]: Connection closed by invalid user nutanix 134 ... show more2024-11-14T11:06:41.444074+00:00 prod-2 sshd[2006450]: Connection closed by invalid user nutanix 134.122.62.220 port 57560 [preauth]
2024-11-14T11:13:26.761191+00:00 prod-2 sshd[2011576]: Invalid user nutanix from 134.122.62.220 port 51294
2024-11-14T11:13:26.845984+00:00 prod-2 sshd[2011576]: Connection closed by invalid user nutanix 134.122.62.220 port 51294 [preauth]
2024-11-14T11:20:19.841981+00:00 prod-2 sshd[2016691]: Invalid user Nutanix from 134.122.62.220 port 45028
2024-11-14T11:20:19.941411+00:00 prod-2 sshd[2016691]: Connection closed by invalid user Nutanix 134.122.62.220 port 45028 [preauth]
... show less
Nov 14 11:06:27 vps-9 sshd[797003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 11:06:27 vps-9 sshd[797003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 11:06:30 vps-9 sshd[797003]: Failed password for invalid user nutanix from 134.122.62.220 port 55552 ssh2
Nov 14 11:13:13 vps-9 sshd[797858]: Invalid user nutanix from 134.122.62.220 port 49286
... show less
2024-11-14T10:39:05.549730+00:00 prod-2 sshd[1985112]: Connection closed by invalid user loginuser 1 ... show more2024-11-14T10:39:05.549730+00:00 prod-2 sshd[1985112]: Connection closed by invalid user loginuser 134.122.62.220 port 54392 [preauth]
2024-11-14T10:46:00.773560+00:00 prod-2 sshd[1990373]: Invalid user hms from 134.122.62.220 port 48126
2024-11-14T10:46:00.884306+00:00 prod-2 sshd[1990373]: Connection closed by invalid user hms 134.122.62.220 port 48126 [preauth]
2024-11-14T10:53:02.905357+00:00 prod-2 sshd[1995555]: Invalid user loginuser from 134.122.62.220 port 41860
2024-11-14T10:53:03.016563+00:00 prod-2 sshd[1995555]: Connection closed by invalid user loginuser 134.122.62.220 port 41860 [preauth]
... show less
Nov 14 10:38:49 nervous-edison8 sshd[1000548]: Failed password for invalid user loginuser from 134.1 ... show moreNov 14 10:38:49 nervous-edison8 sshd[1000548]: Failed password for invalid user loginuser from 134.122.62.220 port 46510 ssh2
Nov 14 10:45:43 nervous-edison8 sshd[1003495]: Invalid user hms from 134.122.62.220 port 40244
Nov 14 10:45:43 nervous-edison8 sshd[1003495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 10:45:45 nervous-edison8 sshd[1003495]: Failed password for invalid user hms from 134.122.62.220 port 40244 ssh2
Nov 14 10:52:45 nervous-edison8 sshd[1006353]: Invalid user loginuser from 134.122.62.220 port 33978
... show less
2024-11-14T10:45:28.306820jump1.sailx.co sshd[17211]: pam_unix(sshd:auth): authentication failure; l ... show more2024-11-14T10:45:28.306820jump1.sailx.co sshd[17211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
2024-11-14T10:45:30.802400jump1.sailx.co sshd[17211]: Failed password for invalid user hms from 134.122.62.220 port 50532 ssh2
2024-11-14T10:52:29.412974jump1.sailx.co sshd[17548]: Invalid user loginuser from 134.122.62.220 port 44266
2024-11-14T10:52:29.566082jump1.sailx.co sshd[17548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
2024-11-14T10:52:31.856160jump1.sailx.co sshd[17548]: Failed password for invalid user loginuser from 134.122.62.220 port 44266 ssh2
... show less
Nov 14 11:43:15 webcore sshd[1818855]: Invalid user loginuser from 134.122.62.220 port 47678
N ... show moreNov 14 11:43:15 webcore sshd[1818855]: Invalid user loginuser from 134.122.62.220 port 47678
Nov 14 11:43:15 webcore sshd[1818855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 11:43:17 webcore sshd[1818855]: Failed password for invalid user loginuser from 134.122.62.220 port 47678 ssh2
Nov 14 11:50:14 webcore sshd[1820233]: Invalid user hms from 134.122.62.220 port 41412
... show less
Brute-ForceSSH
Anonymous
Nov 14 10:41:22 vps-3cf7b8c3 sshd[3317322]: pam_unix(sshd:auth): authentication failure; logname= ui ... show moreNov 14 10:41:22 vps-3cf7b8c3 sshd[3317322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 10:41:24 vps-3cf7b8c3 sshd[3317322]: Failed password for invalid user loginuser from 134.122.62.220 port 48592 ssh2
Nov 14 10:48:21 vps-3cf7b8c3 sshd[3322988]: Invalid user hms from 134.122.62.220 port 42326
... show less
Nov 14 10:38:51 vps-9 sshd[793174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 14 10:38:51 vps-9 sshd[793174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.220
Nov 14 10:38:53 vps-9 sshd[793174]: Failed password for invalid user loginuser from 134.122.62.220 port 52384 ssh2
Nov 14 10:45:46 vps-9 sshd[794320]: Invalid user hms from 134.122.62.220 port 46118
... show less
[rede-164-29] 11/14/2024-07:41:52.529085, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromi ... show more[rede-164-29] 11/14/2024-07:41:52.529085, 134.122.62.220, Protocol: 6, ET COMPROMISED Known Compromised or Hostile Host Traffic group 5 show less