This IP address has been reported a total of 673
times from 338 distinct
sources.
138.2.128.199 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
[rede-164-29] (sshd) Failed SSH login from 138.2.128.199 (DE/Germany/-): 5 in the last 3600 secs; Po ... show more[rede-164-29] (sshd) Failed SSH login from 138.2.128.199 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jan 20 07:40:43 sshd[8466]: Did not receive identification string from 138.2.128.199 port 36072
Jan 20 07:40:59 sshd[8470]: Invalid user [USERNAME] from 138.2.128.199 port 36078
Jan 20 07:41:02 sshd[8470]: Failed password for invalid user [USERNAME] from 138.2.128.199 port 36078 ssh2
Jan 20 07:41:38 sshd[8481]: Invalid user [USERNAME] from 138.2.128.199 port 43230
Jan 20 07:41:40 sshd[8481]: Failed password for invalid user [USERNAME] from 138.2.128.199 port 43230 ssh2 show less
2025-01-20T05:05:45.590216+00:00 s11574 sshd[20027]: Invalid user admin from 138.2.128.199 port 5723 ... show more2025-01-20T05:05:45.590216+00:00 s11574 sshd[20027]: Invalid user admin from 138.2.128.199 port 57238
2025-01-20T05:06:37.294241+00:00 s11574 sshd[20148]: Invalid user gpadmin from 138.2.128.199 port 57660
2025-01-20T05:06:38.783878+00:00 s11574 sshd[20150]: Invalid user minit from 138.2.128.199 port 56554
... show less
2025-01-20T04:17:04.060427+00:00 mapir-proxmox sshd[2725264]: Invalid user router from 138.2.128.199 ... show more2025-01-20T04:17:04.060427+00:00 mapir-proxmox sshd[2725264]: Invalid user router from 138.2.128.199 port 40466
2025-01-20T04:17:04.073764+00:00 mapir-proxmox sshd[2725264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.128.199
2025-01-20T04:17:06.088025+00:00 mapir-proxmox sshd[2725264]: Failed password for invalid user router from 138.2.128.199 port 40466 ssh2
... show less
2025-01-20T09:18:19.726913 vps1.chirorist.org sshd[1167447]: Failed password for invalid user system ... show more2025-01-20T09:18:19.726913 vps1.chirorist.org sshd[1167447]: Failed password for invalid user systemv from 138.2.128.199 port 56976 ssh2
2025-01-20T09:18:21.645979 vps1.chirorist.org sshd[1167449]: Invalid user client001 from 138.2.128.199 port 56992
2025-01-20T09:18:21.892342 vps1.chirorist.org sshd[1167449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.128.199
2025-01-20T09:18:24.274989 vps1.chirorist.org sshd[1167449]: Failed password for invalid user client001 from 138.2.128.199 port 56992 ssh2
2025-01-20T09:18:26.589355 vps1.chirorist.org sshd[1167458]: Invalid user gpadmin from 138.2.128.199 port 37152
... show less
Jan 19 23:41:21 Debian-1010-buster-64-minimal sshd[3600961]: Invalid user sysadm from 138.2.128.199 ... show moreJan 19 23:41:21 Debian-1010-buster-64-minimal sshd[3600961]: Invalid user sysadm from 138.2.128.199 port 35828
Jan 19 23:41:21 Debian-1010-buster-64-minimal sshd[3601026]: Invalid user admin from 138.2.128.199 port 35834
Jan 19 23:41:21 Debian-1010-buster-64-minimal sshd[3601179]: Invalid user ubuntu from 138.2.128.199 port 35852
Jan 19 23:41:21 Debian-1010-buster-64-minimal sshd[3601318]: Invalid user admin from 138.2.128.199 port 35868
Jan 19 23:41:21 Debian-1010-buster-64-minimal sshd[3601386]: Invalid user admin from 138.2.128.199 port 35884
... show less
Jan 19 23:08:20 plesk sshd[3912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreJan 19 23:08:20 plesk sshd[3912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.128.199
Jan 19 23:08:22 plesk sshd[3912]: Failed password for invalid user systemv from 138.2.128.199 port 51138 ssh2
Jan 19 23:08:22 plesk sshd[3920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.128.199 user=root
Jan 19 23:08:23 plesk sshd[3920]: Failed password for root from 138.2.128.199 port 51144 ssh2
Jan 19 23:08:23 plesk sshd[3928]: Invalid user sysadm from 138.2.128.199 port 49320 show less
Jan 19 23:28:48 AB_2024 sshd[10527]: Failed password for root from 138.2.128.199 port 33692 ssh2<br ... show moreJan 19 23:28:48 AB_2024 sshd[10527]: Failed password for root from 138.2.128.199 port 33692 ssh2
Jan 19 23:28:48 AB_2024 sshd[10529]: Invalid user t128 from 138.2.128.199 port 33706
Jan 19 23:28:48 AB_2024 sshd[10529]: Failed password for invalid user t128 from 138.2.128.199 port 33706 ssh2
... show less
Report 1569248 with IP 2558367 for SSH brute-force attack by source 2611473 via ssh-honeypot/0.2.0+h ... show moreReport 1569248 with IP 2558367 for SSH brute-force attack by source 2611473 via ssh-honeypot/0.2.0+http show less
Jan 19 16:17:12 web sshd[217738]: Invalid user cisco from 138.2.128.199 port 41626
Jan 19 16:1 ... show moreJan 19 16:17:12 web sshd[217738]: Invalid user cisco from 138.2.128.199 port 41626
Jan 19 16:17:12 web sshd[217740]: Invalid user ubnt from 138.2.128.199 port 41642
Jan 19 16:17:28 web sshd[217748]: Invalid user admin from 138.2.128.199 port 40444
Jan 19 16:17:28 web sshd[217750]: Invalid user gpadmin from 138.2.128.199 port 40452
Jan 19 16:17:28 web sshd[217752]: Invalid user vpn from 138.2.128.199 port 40462
... show less
2025-01-19T16:04:16.710246+00:00 ubuntu2204 sshd[1731710]: Invalid user cisco from 138.2.128.199 por ... show more2025-01-19T16:04:16.710246+00:00 ubuntu2204 sshd[1731710]: Invalid user cisco from 138.2.128.199 port 55778 show less