This IP address has been reported a total of 587
times from 237 distinct
sources.
157.230.26.137 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Apr 26 07:42:25 santamaria sshd\[7571\]: Invalid user user from 157.230.26.137
Apr 26 07:42:25 ... show moreApr 26 07:42:25 santamaria sshd\[7571\]: Invalid user user from 157.230.26.137
Apr 26 07:42:25 santamaria sshd\[7571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.26.137
Apr 26 07:42:26 santamaria sshd\[7571\]: Failed password for invalid user user from 157.230.26.137 port 47864 ssh2
... show less
Apr 26 13:36:33 doubuntu sshd[833436]: Unable to negotiate with 157.230.26.137 port 46884: no matchi ... show moreApr 26 13:36:33 doubuntu sshd[833436]: Unable to negotiate with 157.230.26.137 port 46884: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
... show less
2022-04-26T07:25:23.382054mail.broermann.family sshd[12973]: Failed password for invalid user user f ... show more2022-04-26T07:25:23.382054mail.broermann.family sshd[12973]: Failed password for invalid user user from 157.230.26.137 port 39934 ssh2
2022-04-26T07:25:40.114499mail.broermann.family sshd[12998]: Invalid user user from 157.230.26.137 port 49666
2022-04-26T07:25:40.119240mail.broermann.family sshd[12998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.26.137
2022-04-26T07:25:42.656144mail.broermann.family sshd[12998]: Failed password for invalid user user from 157.230.26.137 port 49666 ssh2
2022-04-26T07:25:59.094776mail.broermann.family sshd[13022]: Invalid user user from 157.230.26.137 port 60014
... show less
2022-04-26T12:16:46.927263koumakan sshd[105051]: Connection from 157.230.26.137 port 52936 on 192.16 ... show more2022-04-26T12:16:46.927263koumakan sshd[105051]: Connection from 157.230.26.137 port 52936 on 192.168.8.16 port 22 rdomain ""
2022-04-26T12:16:47.099879koumakan sshd[105051]: error: kex_exchange_identification: Connection closed by remote host
... show less
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 157.230.26.137 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direc ... show more(sshd) Failed SSH login from 157.230.26.137 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 26 00:04:49 server2 sshd[12926]: Invalid user user from 157.230.26.137 port 50476
Apr 26 00:04:49 server2 sshd[12928]: Invalid user user from 157.230.26.137 port 55906
Apr 26 00:04:49 server2 sshd[12926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.26.137
Apr 26 00:04:49 server2 sshd[12928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.26.137
Apr 26 00:04:49 server2 sshd[12925]: Invalid user user from 157.230.26.137 port 45028 show less
2022-04-26T05:32:37.787991mail..de sshd[2081931]: Unable to negotiate with 157.230.26.137 port 34566 ... show more2022-04-26T05:32:37.787991mail..de sshd[2081931]: Unable to negotiate with 157.230.26.137 port 34566: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2022-04-26T05:33:01.985458mail..de sshd[2081970]: Unable to negotiate with 157.230.26.137 port 43378: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2022-04-26T05:33:24.558863mail..de sshd[2082105]: Unable to negotiate with 157.230.26.137 port 52106: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] show less