This IP address has been reported a total of 581
times from 349 distinct
sources.
140.245.49.130 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
140.245.49.130 fell into Endlessh tarpit; 0/1 total connections are currently still open. Total time ... show more140.245.49.130 fell into Endlessh tarpit; 0/1 total connections are currently still open. Total time wasted: 20s. Total bytes sent by tarpit: 17B. Report generated by Endlessh Report Generator v1.2.3 show less
Dec 13 18:21:07 Neptun sshd[3245971]: error: maximum authentication attempts exceeded for root from ... show moreDec 13 18:21:07 Neptun sshd[3245971]: error: maximum authentication attempts exceeded for root from 140.245.49.130 port 59234 ssh2 [preauth]
... show less
Cluster member (Omitted) (FR/France/-) said, DENY 140.245.49.130, Reason:[(sshd) Failed SSH login fr ... show moreCluster member (Omitted) (FR/France/-) said, DENY 140.245.49.130, Reason:[(sshd) Failed SSH login from 140.245.49.130 (SG/Singapore/-): 3 in the last (Omitted)] show less
2024-12-13T18:12:29.112655+01:00 cloudpanel sshd[371050]: error: maximum authentication attempts exc ... show more2024-12-13T18:12:29.112655+01:00 cloudpanel sshd[371050]: error: maximum authentication attempts exceeded for root from 140.245.49.130 port 63964 ssh2 [preauth]
2024-12-13T18:12:31.153039+01:00 cloudpanel sshd[371052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.245.49.130 user=root
2024-12-13T18:12:33.667947+01:00 cloudpanel sshd[371052]: Failed password for root from 140.245.49.130 port 5500 ssh2
... show less
[rede-164-29] (sshd) Failed SSH login from 140.245.49.130 (SG/Singapore/-): 5 in the last 3600 secs; ... show more[rede-164-29] (sshd) Failed SSH login from 140.245.49.130 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 13 14:03:47 sshd[4972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.245.49.130 user=[USERNAME]
Dec 13 14:03:49 sshd[4972]: Failed password for [USERNAME] from 140.245.49.130 port 60472 ssh2
Dec 13 14:03:51 sshd[4972]: Failed password for [USERNAME] from 140.245.49.130 port 60472 ssh2
Dec 13 14:03:54 sshd[4972]: Failed password for [USERNAME] from 140.245.49.130 port 60472 ssh2
Dec 13 14:03:56 sshd[4972]: Failed password for [USERNAME] from 140 show less
Dec 13 17:19:39 mail sshd[13907]: error: maximum authentication attempts exceeded for invalid user r ... show moreDec 13 17:19:39 mail sshd[13907]: error: maximum authentication attempts exceeded for invalid user root from 140.245.49.130 port 14296 ssh2 [preauth]
... show less
Dec 13 17:16:45 h2996638 sshd[3814443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreDec 13 17:16:45 h2996638 sshd[3814443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.245.49.130 user=root
Dec 13 17:16:47 h2996638 sshd[3814443]: Failed password for root from 140.245.49.130 port 36698 ssh2
Dec 13 17:17:02 h2996638 sshd[3814443]: Failed password for root from 140.245.49.130 port 36698 ssh2
Dec 13 17:17:06 h2996638 sshd[3814443]: Failed password for root from 140.245.49.130 port 36698 ssh2
... show less
Dec 13 15:57:25 watchtower sshd[2190444]: Failed password for root from 140.245.49.130 port 59662 ss ... show moreDec 13 15:57:25 watchtower sshd[2190444]: Failed password for root from 140.245.49.130 port 59662 ssh2
Dec 13 15:57:28 watchtower sshd[2190444]: Failed password for root from 140.245.49.130 port 59662 ssh2
... show less
2024-12-13T15:52:45.148214+00:00 BAW-C01 sshd-session[1010343]: Failed password for root from 140.24 ... show more2024-12-13T15:52:45.148214+00:00 BAW-C01 sshd-session[1010343]: Failed password for root from 140.245.49.130 port 38494 ssh2
2024-12-13T15:52:47.971708+00:00 BAW-C01 sshd-session[1010343]: Failed password for root from 140.245.49.130 port 38494 ssh2
2024-12-13T15:52:48.401369+00:00 BAW-C01 sshd-session[1010343]: error: maximum authentication attempts exceeded for root from 140.245.49.130 port 38494 ssh2 [preauth]
2024-12-13T15:52:49.057236+00:00 BAW-C01 sshd-session[1010353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.245.49.130 user=root
2024-12-13T15:52:51.210615+00:00 BAW-C01 sshd-session[1010353]: Failed password for root from 140.245.49.130 port 51038 ssh2
... show less
2024-12-13T15:16:51.052328+00:00 DE-FFM-05 sshd[1514313]: Failed password for root from 140.245.49.1 ... show more2024-12-13T15:16:51.052328+00:00 DE-FFM-05 sshd[1514313]: Failed password for root from 140.245.49.130 port 24322 ssh2
2024-12-13T15:16:54.761143+00:00 DE-FFM-05 sshd[1514313]: Failed password for root from 140.245.49.130 port 24322 ssh2
... show less