This IP address has been reported a total of 216
times from 108 distinct
sources.
161.132.49.141 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Invalid user deployer from 161.132.49.141 port 58454
Brute-ForceSSH
Anonymous
2024-11-21T15:50:44.220349+02:00 microfood-srv sshd[2683522]: Invalid user deployer from 161.132.49. ... show more2024-11-21T15:50:44.220349+02:00 microfood-srv sshd[2683522]: Invalid user deployer from 161.132.49.141 port 55096
2024-11-21T15:53:40.760069+02:00 microfood-srv sshd[2685006]: Invalid user ubuntu from 161.132.49.141 port 44754
2024-11-21T15:56:43.098853+02:00 microfood-srv sshd[2686695]: Invalid user dev from 161.132.49.141 port 35522
... show less
2024-11-21T14:49:09.504550+01:00 mail sshd[2397172]: Invalid user deployer from 161.132.49.141 port ... show more2024-11-21T14:49:09.504550+01:00 mail sshd[2397172]: Invalid user deployer from 161.132.49.141 port 44306
... show less
2024-11-21T13:20:41.059796+00:00 vps-212ccabb sshd[1224281]: Disconnected from authenticating user r ... show more2024-11-21T13:20:41.059796+00:00 vps-212ccabb sshd[1224281]: Disconnected from authenticating user root 161.132.49.141 port 55608 [preauth]
2024-11-21T13:24:03.609872+00:00 vps-212ccabb sshd[1224509]: Invalid user bob from 161.132.49.141 port 58934
2024-11-21T13:24:03.810055+00:00 vps-212ccabb sshd[1224509]: Disconnected from invalid user bob 161.132.49.141 port 58934 [preauth]
2024-11-21T13:25:49.157988+00:00 vps-212ccabb sshd[1224647]: Invalid user ubuntu from 161.132.49.141 port 58524
2024-11-21T13:25:49.357352+00:00 vps-212ccabb sshd[1224647]: Disconnected from invalid user ubuntu 161.132.49.141 port 58524 [preauth]
... show less
Nov 21 06:17:18 host1 sshd[2739744]: Invalid user deploy from 161.132.49.141 port 46374
Nov 21 ... show moreNov 21 06:17:18 host1 sshd[2739744]: Invalid user deploy from 161.132.49.141 port 46374
Nov 21 06:17:20 host1 sshd[2739744]: Failed password for invalid user deploy from 161.132.49.141 port 46374 ssh2
Nov 21 06:17:35 host1 sshd[2739776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.49.141 user=root
Nov 21 06:17:38 host1 sshd[2739776]: Failed password for root from 161.132.49.141 port 36088 ssh2
Nov 21 06:17:55 host1 sshd[2739807]: Invalid user alex from 161.132.49.141 port 60518
... show less
Nov 21 12:52:41 xzm sshd[12050]: Failed password for root from 161.132.49.141 port 33068 ssh2
... show moreNov 21 12:52:41 xzm sshd[12050]: Failed password for root from 161.132.49.141 port 33068 ssh2
Nov 21 12:52:43 xzm sshd[12052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.49.141 user=root
Nov 21 12:52:45 xzm sshd[12052]: Failed password for root from 161.132.49.141 port 33070 ssh2
Nov 21 12:52:47 xzm sshd[12054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.49.141 user=root
Nov 21 12:52:49 xzm sshd[12054]: Failed password for root from 161.132.49.141 port 41958 ssh2
... show less