This IP address has been reported a total of 955
times from 384 distinct
sources.
149.202.249.119 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 30 07:25:34 mk-bgp sshd[485434]: Invalid user test from 149.202.249.119 port 38330
Oct 30 ... show moreOct 30 07:25:34 mk-bgp sshd[485434]: Invalid user test from 149.202.249.119 port 38330
Oct 30 07:27:08 mk-bgp sshd[485650]: Invalid user test from 149.202.249.119 port 46646
Oct 30 07:41:34 mk-bgp sshd[487715]: Invalid user xiao from 149.202.249.119 port 34200
Oct 30 07:46:25 mk-bgp sshd[488385]: Invalid user webkul from 149.202.249.119 port 52906
Oct 30 07:51:11 mk-bgp sshd[489037]: Invalid user dts from 149.202.249.119 port 53296
... show less
Oct 30 08:22:53 ovh-proxmox sshd[2984124]: Failed password for invalid user test from 149.202.249.11 ... show moreOct 30 08:22:53 ovh-proxmox sshd[2984124]: Failed password for invalid user test from 149.202.249.119 port 39828 ssh2
Oct 30 08:28:32 ovh-proxmox sshd[2985109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.249.119 user=root
Oct 30 08:28:34 ovh-proxmox sshd[2985109]: Failed password for root from 149.202.249.119 port 40806 ssh2
... show less
Report 815162 with IP 1794535 for SSH brute-force attack by source 1851263 via ssh-honeypot/0.2.0+ht ... show moreReport 815162 with IP 1794535 for SSH brute-force attack by source 1851263 via ssh-honeypot/0.2.0+http show less
Oct 30 08:06:38 Digitalogic sshd[522103]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreOct 30 08:06:38 Digitalogic sshd[522103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.249.119
Oct 30 08:06:41 Digitalogic sshd[522103]: Failed password for invalid user administrator from 149.202.249.119 port 50382 ssh2
Oct 30 08:06:42 Digitalogic sshd[522103]: Disconnected from invalid user administrator 149.202.249.119 port 50382 [preauth]
... show less
Oct 30 07:36:08 Digitalogic sshd[515802]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreOct 30 07:36:08 Digitalogic sshd[515802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.249.119 user=ubuntu
Oct 30 07:36:10 Digitalogic sshd[515802]: Failed password for ubuntu from 149.202.249.119 port 34384 ssh2
Oct 30 07:36:12 Digitalogic sshd[515802]: Disconnected from authenticating user ubuntu 149.202.249.119 port 34384 [preauth]
... show less
Oct 30 05:03:39 mazen sshd[14402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreOct 30 05:03:39 mazen sshd[14402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.249.119
Oct 30 05:03:39 mazen sshd[14402]: Invalid user dad from 149.202.249.119 port 34674
Oct 30 05:03:41 mazen sshd[14402]: Failed password for invalid user dad from 149.202.249.119 port 34674 ssh2
Oct 30 05:06:02 mazen sshd[14405]: Invalid user ubuntu from 149.202.249.119 port 47040
Oct 30 05:06:02 mazen sshd[14405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.249.119
Oct 30 05:06:02 mazen sshd[14405]: Invalid user ubuntu from 149.202.249.119 port 47040
Oct 30 05:06:04 mazen sshd[14405]: Failed password for invalid user ubuntu from 149.202.249.119 port 47040 ssh2
... show less
Oct 30 07:02:41 Digitalogic sshd[508719]: Disconnected from authenticating user root 149.202.249.119 ... show moreOct 30 07:02:41 Digitalogic sshd[508719]: Disconnected from authenticating user root 149.202.249.119 port 51182 [preauth]
Oct 30 07:05:04 Digitalogic sshd[509293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.249.119 user=root
Oct 30 07:05:06 Digitalogic sshd[509293]: Failed password for root from 149.202.249.119 port 52960 ssh2
... show less
Oct 30 06:31:48 Digitalogic sshd[501129]: Invalid user ts3 from 149.202.249.119 port 36748
Oct ... show moreOct 30 06:31:48 Digitalogic sshd[501129]: Invalid user ts3 from 149.202.249.119 port 36748
Oct 30 06:31:48 Digitalogic sshd[501129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.249.119
Oct 30 06:31:50 Digitalogic sshd[501129]: Failed password for invalid user ts3 from 149.202.249.119 port 36748 ssh2
... show less
Oct 30 05:55:09 Digitalogic sshd[493341]: Failed password for postgres from 149.202.249.119 port 460 ... show moreOct 30 05:55:09 Digitalogic sshd[493341]: Failed password for postgres from 149.202.249.119 port 46004 ssh2
Oct 30 05:55:11 Digitalogic sshd[493341]: Disconnected from authenticating user postgres 149.202.249.119 port 46004 [preauth]
Oct 30 06:00:27 Digitalogic sshd[494483]: Invalid user zhang from 149.202.249.119 port 43098
... show less
[Automated F2B Report] 2023-10-29T22:02:53.329720webserver sshd[289817]: Invalid user developer from ... show more[Automated F2B Report] 2023-10-29T22:02:53.329720webserver sshd[289817]: Invalid user developer from 149.202.249.119 port 50940
2023-10-29T22:08:51.970715webserver sshd[289882]: Invalid user odoo from 149.202.249.119 port 45240
2023-10-29T22:11:22.783697webserver sshd[290013]: Invalid user abc from 149.202.249.119 port 43354
... show less