This IP address has been reported a total of 42
times from 30 distinct
sources.
150.138.92.150 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2025-02-11T16:06:52.584200+01:00 fra-GW01 sshd[2422946]: Failed password for root from 150.138.92.15 ... show more2025-02-11T16:06:52.584200+01:00 fra-GW01 sshd[2422946]: Failed password for root from 150.138.92.150 port 37876 ssh2
2025-02-11T16:06:54.987193+01:00 fra-GW01 sshd[2422962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.138.92.150 user=root
2025-02-11T16:06:57.380137+01:00 fra-GW01 sshd[2422962]: Failed password for root from 150.138.92.150 port 41726 ssh2
... show less
Feb 10 14:09:57 rendez-vous sshd[123566]: Failed password for root from 150.138.92.150 port 45428 ss ... show moreFeb 10 14:09:57 rendez-vous sshd[123566]: Failed password for root from 150.138.92.150 port 45428 ssh2
Feb 10 14:09:59 rendez-vous sshd[123568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.138.92.150 user=root
Feb 10 14:10:01 rendez-vous sshd[123568]: Failed password for root from 150.138.92.150 port 48932 ssh2 show less
Feb 10 04:27:58 Tower sshd-session[3644752]: Failed password for root from 150.138.92.150 port 59380 ... show moreFeb 10 04:27:58 Tower sshd-session[3644752]: Failed password for root from 150.138.92.150 port 59380 ssh2
Feb 10 04:28:00 Tower sshd-session[3644752]: Connection closed by authenticating user root 150.138.92.150 port 59380 [preauth]
Feb 10 04:28:00 Tower sshd-session[3645867]: Connection from 150.138.92.150 port 35394 on 192.168.10.220 port 22 rdomain ""
Feb 10 04:28:01 Tower sshd-session[3645867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.138.92.150 user=root show less