This IP address has been reported a total of 621
times from 312 distinct
sources.
141.105.80.66 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-01-16T13:40:49.523283+02:00 wels sshd[438971]: Connection closed by 141.105.80.66 port 49072<br ... show more2025-01-16T13:40:49.523283+02:00 wels sshd[438971]: Connection closed by 141.105.80.66 port 49072
2025-01-16T13:40:50.483059+02:00 wels sshd[438972]: Invalid user router from 141.105.80.66 port 24860
2025-01-16T13:40:50.814743+02:00 wels sshd[438972]: Connection closed by invalid user router 141.105.80.66 port 24860 [preauth]
... show less
(sshd) Failed SSH login from 141.105.80.66 (LB/Lebanon/-): 5 in the last 3600 secs; Ports: *; Direct ... show more(sshd) Failed SSH login from 141.105.80.66 (LB/Lebanon/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 16 10:51:23 mx2 sshd[3626365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.80.66 user=root
Jan 16 10:51:24 mx2 sshd[3626365]: Failed password for root from 141.105.80.66 port 51836 ssh2
Jan 16 10:51:26 mx2 sshd[3626377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.80.66 user=root
Jan 16 10:51:28 mx2 sshd[3626377]: Failed password for root from 141.105.80.66 port 44946 ssh2
Jan 16 10:51:29 mx2 sshd[3626380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.80.66 user=root show less
Jan 16 11:25:18 mail sshd[833001]: Failed password for root from 141.105.80.66 port 48278 ssh2 ... show moreJan 16 11:25:18 mail sshd[833001]: Failed password for root from 141.105.80.66 port 48278 ssh2
Jan 16 11:25:21 mail sshd[833004]: Invalid user admin from 141.105.80.66 port 19564
Jan 16 11:25:21 mail sshd[833004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.80.66
Jan 16 11:25:23 mail sshd[833004]: Failed password for invalid user admin from 141.105.80.66 port 19564 ssh2
Jan 16 11:25:26 mail sshd[833008]: Invalid user user from 141.105.80.66 port 48749
... show less
2025-01-15T21:51:12.478297+00:00 storage sshd[1149339]: Invalid user cisco from 141.105.80.66 port 6 ... show more2025-01-15T21:51:12.478297+00:00 storage sshd[1149339]: Invalid user cisco from 141.105.80.66 port 64235
2025-01-15T21:51:17.095918+00:00 storage sshd[1149367]: Invalid user telecomadmin from 141.105.80.66 port 55148
2025-01-15T21:51:20.457239+00:00 storage sshd[1149370]: Invalid user dolphinscheduler from 141.105.80.66 port 51264
... show less
2025-01-15 16:47:52,275 fail2ban.actions [894]: NOTICE [sshd] Ban 141.105.80.66
Brute-ForceSSH
Anonymous
2025-01-15T16:01:13.391198+01:00 vps sshd[2052414]: pam_unix(sshd:auth): authentication failure; log ... show more2025-01-15T16:01:13.391198+01:00 vps sshd[2052414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.80.66
2025-01-15T16:01:15.163052+01:00 vps sshd[2052414]: Failed password for invalid user ubnt from 141.105.80.66 port 29523 ssh2
2025-01-15T16:01:16.950121+01:00 vps sshd[2052419]: Invalid user telecomadmin from 141.105.80.66 port 43446
... show less
2025-01-15T10:07:49.041127+01:00 runner3 sshd[1483553]: Invalid user admin from 141.105.80.66 port 5 ... show more2025-01-15T10:07:49.041127+01:00 runner3 sshd[1483553]: Invalid user admin from 141.105.80.66 port 50118
2025-01-15T10:07:49.118438+01:00 runner3 sshd[1483553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.80.66
2025-01-15T10:07:50.948683+01:00 runner3 sshd[1483553]: Failed password for invalid user admin from 141.105.80.66 port 50118 ssh2
2025-01-15T10:07:54.632973+01:00 runner3 sshd[1483557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.80.66 user=root
2025-01-15T10:07:56.818896+01:00 runner3 sshd[1483557]: Failed password for root from 141.105.80.66 port 41048 ssh2
... show less