This IP address has been reported a total of 13,447
times from 1,295 distinct
sources.
138.97.64.134 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 10 21:16:04 game-panel sshd[24441]: Failed password for root from 138.97.64.134 port 40174 ssh2< ... show moreDec 10 21:16:04 game-panel sshd[24441]: Failed password for root from 138.97.64.134 port 40174 ssh2
Dec 10 21:17:21 game-panel sshd[24591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134
Dec 10 21:17:23 game-panel sshd[24591]: Failed password for invalid user guest from 138.97.64.134 port 38278 ssh2 show less
2023-12-11T04:50:55.167061 jp3.cdn.420422709.xyz sshd[206421]: Failed password for root from 138.97. ... show more2023-12-11T04:50:55.167061 jp3.cdn.420422709.xyz sshd[206421]: Failed password for root from 138.97.64.134 port 47768 ssh2
2023-12-11T04:52:17.662564 jp3.cdn.420422709.xyz sshd[206570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134 user=root
2023-12-11T04:52:19.644484 jp3.cdn.420422709.xyz sshd[206570]: Failed password for root from 138.97.64.134 port 55960 ssh2
... show less
Dec 10 20:45:03 game-panel sshd[22564]: Failed password for root from 138.97.64.134 port 33420 ssh2< ... show moreDec 10 20:45:03 game-panel sshd[22564]: Failed password for root from 138.97.64.134 port 33420 ssh2
Dec 10 20:50:36 game-panel sshd[22810]: Failed password for root from 138.97.64.134 port 34436 ssh2 show less
Dec 10 21:00:49 arm-fr sshd[126223]: Invalid user openbravo from 138.97.64.134 port 40390
Dec ... show moreDec 10 21:00:49 arm-fr sshd[126223]: Invalid user openbravo from 138.97.64.134 port 40390
Dec 10 21:07:16 arm-fr sshd[127082]: Invalid user usuario from 138.97.64.134 port 42152
Dec 10 21:08:33 arm-fr sshd[127292]: Invalid user karthick from 138.97.64.134 port 52298
... show less
Dec 10 18:51:05 xproot sshd[1415380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreDec 10 18:51:05 xproot sshd[1415380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134 user=root
Dec 10 18:51:07 xproot sshd[1415380]: Failed password for root from 138.97.64.134 port 36090 ssh2
Dec 10 18:52:30 xproot sshd[1415450]: Invalid user masoud from 138.97.64.134 port 44582
Dec 10 18:52:30 xproot sshd[1415450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134
Dec 10 18:52:32 xproot sshd[1415450]: Failed password for invalid user masoud from 138.97.64.134 port 44582 ssh2
... show less
Dec 10 19:47:51 localhost sshd\[27604\]: pam_unix\(sshd:auth\): authentication failure\; logname= ui ... show moreDec 10 19:47:51 localhost sshd\[27604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134 user=root
Dec 10 19:47:53 localhost sshd\[27604\]: Failed password for root from 138.97.64.134 port 55214 ssh2
Dec 10 19:49:18 localhost sshd\[27739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134 user=root
Dec 10 19:49:20 localhost sshd\[27739\]: Failed password for root from 138.97.64.134 port 41300 ssh2
Dec 10 19:50:37 localhost sshd\[28072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134 user=root
... show less
Brute-ForceSSH
Anonymous
Dec 10 19:24:37 local sshd[1386897]: Invalid user vadim from 138.97.64.134 port 49368
Dec 10 1 ... show moreDec 10 19:24:37 local sshd[1386897]: Invalid user vadim from 138.97.64.134 port 49368
Dec 10 19:26:04 local sshd[1386912]: Invalid user chick from 138.97.64.134 port 34320
Dec 10 19:30:17 local sshd[1386972]: Invalid user administrator from 138.97.64.134 port 54554
Dec 10 19:33:06 local sshd[1387027]: Invalid user administrador from 138.97.64.134 port 33940
Dec 10 19:34:29 local sshd[1387050]: Invalid user doc from 138.97.64.134 port 52874
... show less
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 138.97.64.134 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Directi ... show more(sshd) Failed SSH login from 138.97.64.134 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Dec 10 13:20:23 server2 sshd[15981]: Invalid user ys from 138.97.64.134 port 52342
Dec 10 13:20:23 server2 sshd[15981]: Failed password for invalid user ys from 138.97.64.134 port 52342 ssh2
Dec 10 13:23:40 server2 sshd[16966]: Invalid user sac from 138.97.64.134 port 58708
Dec 10 13:23:40 server2 sshd[16966]: Failed password for invalid user sac from 138.97.64.134 port 58708 ssh2
Dec 10 13:25:07 server2 sshd[17427]: Invalid user vadim from 138.97.64.134 port 41268 show less
Dec 10 18:17:48 xproot sshd[1414596]: Failed password for invalid user ys from 138.97.64.134 port 42 ... show moreDec 10 18:17:48 xproot sshd[1414596]: Failed password for invalid user ys from 138.97.64.134 port 42520 ssh2
Dec 10 18:23:08 xproot sshd[1414692]: Invalid user sac from 138.97.64.134 port 56576
Dec 10 18:23:08 xproot sshd[1414692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134
Dec 10 18:23:10 xproot sshd[1414692]: Failed password for invalid user sac from 138.97.64.134 port 56576 ssh2
Dec 10 18:24:34 xproot sshd[1414726]: Invalid user vadim from 138.97.64.134 port 44678
... show less
Dec 10 19:22:22 localhost sshd\[24016\]: Invalid user ys from 138.97.64.134
Dec 10 19:22:22 lo ... show moreDec 10 19:22:22 localhost sshd\[24016\]: Invalid user ys from 138.97.64.134
Dec 10 19:22:22 localhost sshd\[24016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134
Dec 10 19:22:23 localhost sshd\[24016\]: Failed password for invalid user ys from 138.97.64.134 port 56366 ssh2
Dec 10 19:24:09 localhost sshd\[24190\]: Invalid user sac from 138.97.64.134
Dec 10 19:24:09 localhost sshd\[24190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134
... show less
Dec 10 17:30:34 vm-networkmanager sshd[2518441]: Invalid user sanchit from 138.97.64.134 port 58976< ... show moreDec 10 17:30:34 vm-networkmanager sshd[2518441]: Invalid user sanchit from 138.97.64.134 port 58976
Dec 10 17:30:34 vm-networkmanager sshd[2518441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134
Dec 10 17:30:34 vm-networkmanager sshd[2518441]: Invalid user sanchit from 138.97.64.134 port 58976
Dec 10 17:30:37 vm-networkmanager sshd[2518441]: Failed password for invalid user sanchit from 138.97.64.134 port 58976 ssh2
Dec 10 17:32:17 vm-networkmanager sshd[2518851]: Invalid user jennifer from 138.97.64.134 port 38716
... show less
sshd[1813628]: Invalid user wave from 138.97.64.134 port 49584
sshd[1813628]: pam_unix(sshd:au ... show moresshd[1813628]: Invalid user wave from 138.97.64.134 port 49584
sshd[1813628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134
sshd[1813628]: Failed password for invalid user wave from 138.97.64.134 port 49584 ssh2
sshd[1814057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134 user=root
sshd[1814057]: Failed password for root from 138.97.64.134 port 35652 ssh2 show less
2023-12-10T14:03:07.743971angela sshd[3277245]: pam_unix(sshd:auth): authentication failure; logname ... show more2023-12-10T14:03:07.743971angela sshd[3277245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.64.134
2023-12-10T14:03:09.771732angela sshd[3277245]: Failed password for invalid user jenkins from 138.97.64.134 port 43344 ssh2
2023-12-10T14:05:59.096660angela sshd[3277472]: Invalid user Admin from 138.97.64.134 port 52794
... show less