This IP address has been reported a total of 33 times from 27 distinct sources.
138.64.149.119 was first reported on , and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
138.64.149.119 (JP/Japan/ai149119.dynamic.ppp.asahi-net.or.jp), 5 distributed sshd attacks on accoun ... show more138.64.149.119 (JP/Japan/ai149119.dynamic.ppp.asahi-net.or.jp), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_DISTATTACK; Logs: Jan 28 18:23:12 12971 sshd[20604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.141.140 user=root
Jan 28 18:18:56 12971 sshd[20238]: Failed password for root from 157.90.74.58 port 45444 ssh2
Jan 28 18:22:44 12971 sshd[20544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 18:22:47 12971 sshd[20544]: Failed password for root from 138.64.149.119 port 37760 ssh2
Jan 28 18:23:15 12971 sshd[20604]: Failed password for root from 68.168.141.140 port 45726 ssh2
IP Addresses Blocked:
68.168.141.140 (US/United States/localhost.localdomain)
157.90.74.58 (DE/Germany/hosted-by.bitcommand.com) show less
Brute-ForceSSH
Anonymous
2023-01-28T23:10:47.156315front1.int sshd[225937]: Failed password for root from 138.64.149.119 port ... show more2023-01-28T23:10:47.156315front1.int sshd[225937]: Failed password for root from 138.64.149.119 port 39494 ssh2
2023-01-28T23:13:03.565278front1.int sshd[227020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ai149119.dynamic.ppp.asahi-net.or.jp user=root
2023-01-28T23:13:05.733346front1.int sshd[227020]: Failed password for root from 138.64.149.119 port 40594 ssh2
2023-01-28T23:14:49.002861front1.int sshd[227944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ai149119.dynamic.ppp.asahi-net.or.jp user=root
2023-01-28T23:14:50.887167front1.int sshd[227944]: Failed password for root from 138.64.149.119 port 35570 ssh2
... show less
Jan 29 00:09:10 secure sshd[195796]: User root from 138.64.149.119 not allowed because not listed in ... show moreJan 29 00:09:10 secure sshd[195796]: User root from 138.64.149.119 not allowed because not listed in AllowUsers
Jan 29 00:12:31 secure sshd[195815]: User root from 138.64.149.119 not allowed because not listed in AllowUsers
Jan 29 00:14:17 secure sshd[195821]: User root from 138.64.149.119 not allowed because not listed in AllowUsers
... show less
Jan 28 23:16:19 monitoring sshd[2004843]: User root from 138.64.149.119 not allowed because none of ... show moreJan 28 23:16:19 monitoring sshd[2004843]: User root from 138.64.149.119 not allowed because none of user's groups are listed in AllowGroups
Jan 28 23:16:19 monitoring sshd[2004843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 23:16:20 monitoring sshd[2004843]: Failed password for invalid user root from 138.64.149.119 port 60234 ssh2
Jan 28 23:17:49 monitoring sshd[2005045]: Connection from 138.64.149.119 port 35512 on 5.9.54.139 port 22 rdomain ""
Jan 28 23:17:51 monitoring sshd[2005045]: User root from 138.64.149.119 not allowed because none of user's groups are listed in AllowGroups
... show less
Report 62788 with IP 1106427 for SSH brute-force attack by source 1105011 via ssh-honeypot/0.2.0+htt ... show moreReport 62788 with IP 1106427 for SSH brute-force attack by source 1105011 via ssh-honeypot/0.2.0+http show less
(sshd) Failed SSH login from 138.64.149.119 (JP/Japan/Aichi/Nagoya/ai149119.dynamic.ppp.asahi-net.or ... show more(sshd) Failed SSH login from 138.64.149.119 (JP/Japan/Aichi/Nagoya/ai149119.dynamic.ppp.asahi-net.or.jp/[AS4685 Asahi Net]): 2 in the last 3600 secs show less
Jan 28 20:53:28 vps-714b20ba sshd[5594]: Failed password for root from 138.64.149.119 port 33980 ssh ... show moreJan 28 20:53:28 vps-714b20ba sshd[5594]: Failed password for root from 138.64.149.119 port 33980 ssh2
Jan 28 20:55:08 vps-714b20ba sshd[5623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 20:55:10 vps-714b20ba sshd[5623]: Failed password for root from 138.64.149.119 port 39458 ssh2
... show less
Jan 28 21:47:23 amk sshd\[26244\]: Failed password for root from 138.64.149.119 port 45788 ssh2Jan 2 ... show moreJan 28 21:47:23 amk sshd\[26244\]: Failed password for root from 138.64.149.119 port 45788 ssh2Jan 28 21:52:07 amk sshd\[26368\]: Failed password for root from 138.64.149.119 port 57890 ssh2
... show less
Jan 28 21:35:21 javastart sshd[1618465]: Failed password for root from 138.64.149.119 port 44558 ssh ... show moreJan 28 21:35:21 javastart sshd[1618465]: Failed password for root from 138.64.149.119 port 44558 ssh2
Jan 28 21:36:56 javastart sshd[1618738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 21:36:58 javastart sshd[1618738]: Failed password for root from 138.64.149.119 port 50432 ssh2
Jan 28 21:38:37 javastart sshd[1619004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 21:38:38 javastart sshd[1619004]: Failed password for root from 138.64.149.119 port 46588 ssh2
... show less
Jan 28 21:17:04 javastart sshd[1615279]: Failed password for root from 138.64.149.119 port 49736 ssh ... show moreJan 28 21:17:04 javastart sshd[1615279]: Failed password for root from 138.64.149.119 port 49736 ssh2
Jan 28 21:18:45 javastart sshd[1615569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 21:18:47 javastart sshd[1615569]: Failed password for root from 138.64.149.119 port 36294 ssh2
Jan 28 21:20:26 javastart sshd[1615860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 21:20:28 javastart sshd[1615860]: Failed password for root from 138.64.149.119 port 34590 ssh2
... show less
Jan 28 20:58:50 javastart sshd[1612108]: Failed password for root from 138.64.149.119 port 48004 ssh ... show moreJan 28 20:58:50 javastart sshd[1612108]: Failed password for root from 138.64.149.119 port 48004 ssh2
Jan 28 21:00:33 javastart sshd[1612423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 21:00:35 javastart sshd[1612423]: Failed password for root from 138.64.149.119 port 51458 ssh2
Jan 28 21:02:11 javastart sshd[1612669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.149.119 user=root
Jan 28 21:02:13 javastart sshd[1612669]: Failed password for root from 138.64.149.119 port 35082 ssh2
... show less