This IP address has been reported a total of 90
times from 68 distinct
sources.
134.209.152.153 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
2024-08-07 20:20:08,489 fail2ban.actions [1736]: NOTICE [sshd] Ban 134.209.152.153
202 ... show more2024-08-07 20:20:08,489 fail2ban.actions [1736]: NOTICE [sshd] Ban 134.209.152.153
2024-08-07 20:20:08,507 fail2ban.actions [1736]: NOTICE [ssh] Ban 134.209.152.153
2024-08-07 20:30:18,040 fail2ban.actions [1736]: NOTICE [sshd] Ban 134.209.152.153
2024-08-07 20:30:18,173 fail2ban.actions [1736]: NOTICE [ssh] Ban 134.209.152.153
2024-08-07 20:40:24,235 fail2ban.actions [1736]: NOTICE [sshd] Ban 134.209.152.153
2024-08-07 20:40:24,734 fail2ban.actions [1736]: NOTICE [ssh] Ban 134.209.152.153
2024-08-07 20:50:34,786 fail2ban.actions [1736]: NOTICE [sshd] Ban 134.209.152.153
2024-08-07 20:50:34,885 fail2ban.actions [1736]: NOTICE [ssh] Ban 134.209.152.153
2024-08-07 21:00:48,413 fail2ban.actions [1736]: NOTICE [sshd] Ban 134.209.152.153
2024-08-07 21:00:48,738 fail2ban.actions [1736]: NOTICE [ssh] Ban 134.209.152.153
2024-08-07 20:20:08,489 fail2ban.actions [1736]: NOTICE [sshd] Ban 134.209.152.153
2024-08-07 20:20:08,507 fail show less
2024-08-08T07:29:41.179196+00:00 edge-jnb-con01.int.pdx.net.uk sshd[1891672]: Failed password for ro ... show more2024-08-08T07:29:41.179196+00:00 edge-jnb-con01.int.pdx.net.uk sshd[1891672]: Failed password for root from 134.209.152.153 port 43986 ssh2
2024-08-08T07:29:45.211596+00:00 edge-jnb-con01.int.pdx.net.uk sshd[1891693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153 user=root
2024-08-08T07:29:46.840254+00:00 edge-jnb-con01.int.pdx.net.uk sshd[1891693]: Failed password for root from 134.209.152.153 port 35650 ssh2
... show less
Aug 8 09:21:48 AbuseCatcher sshd[321809]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreAug 8 09:21:48 AbuseCatcher sshd[321809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153
Aug 8 09:21:36 AbuseCatcher sshd[321809]: Invalid user omsagent from 134.209.152.153 port 55772
Aug 8 09:21:50 AbuseCatcher sshd[321809]: Failed password for invalid user omsagent from 134.209.152.153 port 55772 ssh2
... show less
Aug 8 09:19:21 ts-24 sshd[2209796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 8 09:19:21 ts-24 sshd[2209796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153
Aug 8 09:19:23 ts-24 sshd[2209796]: Failed password for invalid user admin from 134.209.152.153 port 36506 ssh2
Aug 8 09:19:27 ts-24 sshd[2209798]: Invalid user centos from 134.209.152.153 port 56766
Aug 8 09:19:27 ts-24 sshd[2209798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153
Aug 8 09:19:29 ts-24 sshd[2209798]: Failed password for invalid user centos from 134.209.152.153 port 56766 ssh2
... show less
Aug 8 09:06:50 AbuseCatcher sshd[317994]: Invalid user ubuntu from 134.209.152.153 port 52888 ... show moreAug 8 09:06:50 AbuseCatcher sshd[317994]: Invalid user ubuntu from 134.209.152.153 port 52888
... show less
Aug 8 08:58:53 ts-24 sshd[2209125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 8 08:58:53 ts-24 sshd[2209125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153 user=bin
Aug 8 08:58:55 ts-24 sshd[2209125]: Failed password for bin from 134.209.152.153 port 56566 ssh2
Aug 8 08:59:01 ts-24 sshd[2209134]: Invalid user ftpuser from 134.209.152.153 port 48594
Aug 8 08:59:01 ts-24 sshd[2209134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153
Aug 8 08:59:03 ts-24 sshd[2209134]: Failed password for invalid user ftpuser from 134.209.152.153 port 48594 ssh2
... show less
Aug 8 08:51:34 AbuseCatcher sshd[311109]: Invalid user wang from 134.209.152.153 port 35362
. ... show moreAug 8 08:51:34 AbuseCatcher sshd[311109]: Invalid user wang from 134.209.152.153 port 35362
... show less
Aug 8 08:38:13 ts-24 sshd[2208499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 8 08:38:13 ts-24 sshd[2208499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153 user=root
Aug 8 08:38:15 ts-24 sshd[2208499]: Failed password for root from 134.209.152.153 port 51028 ssh2
Aug 8 08:38:19 ts-24 sshd[2208502]: Invalid user uftp from 134.209.152.153 port 43056
Aug 8 08:38:19 ts-24 sshd[2208502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153
Aug 8 08:38:21 ts-24 sshd[2208502]: Failed password for invalid user uftp from 134.209.152.153 port 43056 ssh2
... show less
2024-08-08T08:38:05.549784+02:00 kvm7958 sshd[88620]: Failed password for root from 134.209.152.153 ... show more2024-08-08T08:38:05.549784+02:00 kvm7958 sshd[88620]: Failed password for root from 134.209.152.153 port 57384 ssh2
2024-08-08T08:38:09.143282+02:00 kvm7958 sshd[88625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153 user=root
2024-08-08T08:38:11.413496+02:00 kvm7958 sshd[88625]: Failed password for root from 134.209.152.153 port 49414 ssh2
... show less
2024-08-08T07:52:11.137537+02:00 api sshd[3155714]: Failed password for root from 134.209.152.153 po ... show more2024-08-08T07:52:11.137537+02:00 api sshd[3155714]: Failed password for root from 134.209.152.153 port 37824 ssh2
2024-08-08T07:52:14.987274+02:00 api sshd[3155768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.153 user=root
2024-08-08T07:52:17.042588+02:00 api sshd[3155768]: Failed password for root from 134.209.152.153 port 57086 ssh2
... show less