This IP address has been reported a total of 9,461
times from 1,157 distinct
sources.
134.209.145.73 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 21 18:44:15 localhost sshd[1713478]: Invalid user panisa from 134.209.145.73 port 44380
Oc ... show moreOct 21 18:44:15 localhost sshd[1713478]: Invalid user panisa from 134.209.145.73 port 44380
Oct 21 18:49:45 localhost sshd[1713512]: Invalid user soudabeh from 134.209.145.73 port 48078
Oct 21 18:51:21 localhost sshd[1713524]: Invalid user girum from 134.209.145.73 port 47640
Oct 21 18:52:51 localhost sshd[1713535]: Invalid user keira from 134.209.145.73 port 47182
Oct 21 18:54:15 localhost sshd[1713560]: Invalid user c1buser from 134.209.145.73 port 46778
... show less
Oct 21 20:50:02 host1 sshd[656368]: Invalid user soudabeh from 134.209.145.73 port 41126
Oct 2 ... show moreOct 21 20:50:02 host1 sshd[656368]: Invalid user soudabeh from 134.209.145.73 port 41126
Oct 21 20:50:02 host1 sshd[656368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.145.73
Oct 21 20:50:02 host1 sshd[656368]: Invalid user soudabeh from 134.209.145.73 port 41126
Oct 21 20:50:04 host1 sshd[656368]: Failed password for invalid user soudabeh from 134.209.145.73 port 41126 ssh2
Oct 21 20:51:36 host1 sshd[656506]: Invalid user girum from 134.209.145.73 port 40684
... show less
sshd[18525]: Invalid user panisa from 134.209.145.73 port 46672
sshd[18525]: pam_unix(sshd:aut ... show moresshd[18525]: Invalid user panisa from 134.209.145.73 port 46672
sshd[18525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.145.73
sshd[18525]: Failed password for invalid user panisa from 134.209.145.73 port 46672 ssh2
sshd[18749]: Invalid user soudabeh from 134.209.145.73 port 51198 show less
2024-10-22T01:21:05.011999+07:00 BAW-C03 sshd[26110]: Failed password for invalid user opside from 1 ... show more2024-10-22T01:21:05.011999+07:00 BAW-C03 sshd[26110]: Failed password for invalid user opside from 134.209.145.73 port 48158 ssh2
2024-10-22T01:23:20.162832+07:00 BAW-C03 sshd[26143]: Invalid user uttam from 134.209.145.73 port 53052
2024-10-22T01:23:20.165586+07:00 BAW-C03 sshd[26143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.145.73
2024-10-22T01:23:22.254657+07:00 BAW-C03 sshd[26143]: Failed password for invalid user uttam from 134.209.145.73 port 53052 ssh2
2024-10-22T01:26:24.743764+07:00 BAW-C03 sshd[26221]: Invalid user banghua from 134.209.145.73 port 51002
... show less
Brute-ForceSSH
Anonymous
Oct 21 15:21:36 ica-cluster sshd[3622130]: Failed password for invalid user opside from 134.209.145. ... show moreOct 21 15:21:36 ica-cluster sshd[3622130]: Failed password for invalid user opside from 134.209.145.73 port 33802 ssh2
Oct 21 15:23:30 ica-cluster sshd[3622183]: Invalid user uttam from 134.209.145.73 port 35646
Oct 21 15:23:30 ica-cluster sshd[3622183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.145.73
Oct 21 15:23:32 ica-cluster sshd[3622183]: Failed password for invalid user uttam from 134.209.145.73 port 35646 ssh2
Oct 21 15:25:06 ica-cluster sshd[3622269]: Invalid user hessssam from 134.209.145.73 port 34626
... show less