This IP address has been reported a total of 106
times from 70 distinct
sources.
134.209.66.161 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
2024-10-21T09:00:15.578361 SPARTAN sshd[31575]: Invalid user plane from 134.209.66.161 port 57008<br ... show more2024-10-21T09:00:15.578361 SPARTAN sshd[31575]: Invalid user plane from 134.209.66.161 port 57008
2024-10-21T09:00:15.583681 SPARTAN sshd[31575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.66.161
2024-10-21T09:00:17.788282 SPARTAN sshd[31575]: Failed password for invalid user plane from 134.209.66.161 port 57008 ssh2
2024-10-21T09:02:25.841285 SPARTAN sshd[32439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.66.161 user=root
2024-10-21T09:02:27.556344 SPARTAN sshd[32439]: Failed password for root from 134.209.66.161 port 35236 ssh2
... show less
Oct 21 14:57:34 OPSO sshd\[8821\]: Invalid user plane from 134.209.66.161 port 50408
Oct 21 14 ... show moreOct 21 14:57:34 OPSO sshd\[8821\]: Invalid user plane from 134.209.66.161 port 50408
Oct 21 14:57:34 OPSO sshd\[8821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.66.161
Oct 21 14:57:36 OPSO sshd\[8821\]: Failed password for invalid user plane from 134.209.66.161 port 50408 ssh2
Oct 21 15:01:46 OPSO sshd\[9266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.66.161 user=root
Oct 21 15:01:48 OPSO sshd\[9266\]: Failed password for root from 134.209.66.161 port 35162 ssh2 show less
Oct 21 14:27:06 botzung sshd[405919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreOct 21 14:27:06 botzung sshd[405919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.66.161
Oct 21 14:27:08 botzung sshd[405919]: Failed password for invalid user msv from 134.209.66.161 port 43334 ssh2
Oct 21 14:31:12 botzung sshd[405969]: Invalid user tnoll from 134.209.66.161 port 46930
... show less
2024-10-21T13:33:41.018999+02:00 pokevador sshd[2445330]: pam_unix(sshd:auth): authentication failur ... show more2024-10-21T13:33:41.018999+02:00 pokevador sshd[2445330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.66.161
2024-10-21T13:33:43.176358+02:00 pokevador sshd[2445330]: Failed password for invalid user nbi from 134.209.66.161 port 33548 ssh2
2024-10-21T13:36:45.936533+02:00 pokevador sshd[2446989]: Invalid user itc from 134.209.66.161 port 33846
... show less
FL Oct 21 12:27:57 server01 sshd[1164838]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreFL Oct 21 12:27:57 server01 sshd[1164838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.66.161
Oct 21 12:27:59 server01 sshd[1164838]: Failed password for invalid user tomcat from 134.209.66.161 port 35886 ssh2
Oct 21 12:28:34 server01 sshd[1164866]: Invalid user u1 from 134.209.66.161 port 60424
Oct 21 12:28:34 server01 sshd[1164866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.66.161
Oct 21 12:28:37 server01 sshd[1164866]: Failed password for invalid user u1 from 134.209.66.161 port 60424 ssh2 show less
Oct 21 10:02:58 de-fra2-stream2 sshd[1516446]: Invalid user srvadmin from 134.209.66.161 port 35550< ... show moreOct 21 10:02:58 de-fra2-stream2 sshd[1516446]: Invalid user srvadmin from 134.209.66.161 port 35550
Oct 21 10:04:45 de-fra2-stream2 sshd[1516515]: Invalid user chenzilong from 134.209.66.161 port 52222
Oct 21 10:05:52 de-fra2-stream2 sshd[1516555]: Invalid user admin from 134.209.66.161 port 50672
... show less
Oct 21 17:26:54 bacztwo sshd-session[10685]: Invalid user usr17 from 134.209.66.161 port 34378 ... show moreOct 21 17:26:54 bacztwo sshd-session[10685]: Invalid user usr17 from 134.209.66.161 port 34378
Oct 21 17:29:10 bacztwo sshd-session[13727]: Invalid user flowman from 134.209.66.161 port 58252
Oct 21 17:29:55 bacztwo sshd-session[14219]: Invalid user c3buser from 134.209.66.161 port 32846
Oct 21 17:30:39 bacztwo sshd-session[16861]: Invalid user taoneswa from 134.209.66.161 port 37692
Oct 21 17:31:21 bacztwo sshd-session[19833]: Invalid user luowh from 134.209.66.161 port 33672
Oct 21 17:32:04 bacztwo sshd-session[20789]: Invalid user pghosh from 134.209.66.161 port 42862
Oct 21 17:32:45 bacztwo sshd-session[21289]: Invalid user delshad from 134.209.66.161 port 60230
Oct 21 17:33:26 bacztwo sshd-session[22132]: Invalid user alii from 134.209.66.161 port 46580
Oct 21 17:34:06 bacztwo sshd-session[22971]: Invalid user nadiam from 134.209.66.161 port 40728
Oct 21 17:34:48 bacztwo sshd-session[23389]: Invalid user luke from 134.209.66.161 port 43462
Oct 21 17:35:30 bacztwo sshd-session[2584
... show less
2024-10-21T19:55:44.826984+10:30 ms2 sshd[2269264]: Invalid user usr17 from 134.209.66.161 port 3993 ... show more2024-10-21T19:55:44.826984+10:30 ms2 sshd[2269264]: Invalid user usr17 from 134.209.66.161 port 39934
2024-10-21T19:59:03.554712+10:30 ms2 sshd[2270431]: Invalid user flowman from 134.209.66.161 port 56160
... show less