This IP address has been reported a total of 20,929
times from 1,417 distinct
sources.
164.132.56.147 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-04-20T21:33:59.095922-04:00 debian sshd[377412]: Invalid user user from 164.132.56.147 port 559 ... show more2025-04-20T21:33:59.095922-04:00 debian sshd[377412]: Invalid user user from 164.132.56.147 port 55902
2025-04-20T21:33:59.099299-04:00 debian sshd[377412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
2025-04-20T21:34:01.384612-04:00 debian sshd[377412]: Failed password for invalid user user from 164.132.56.147 port 55902 ssh2
2025-04-20T21:34:54.610205-04:00 debian sshd[378062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147 user=root
2025-04-20T21:34:56.781510-04:00 debian sshd[378062]: Failed password for root from 164.132.56.147 port 47980 ssh2
... show less
Brute-ForceSSH
Anonymous
Apr 20 21:06:03 odoo16c sshd[2267501]: Invalid user int from 164.132.56.147 port 53044
Apr 20 ... show moreApr 20 21:06:03 odoo16c sshd[2267501]: Invalid user int from 164.132.56.147 port 53044
Apr 20 21:15:44 odoo16c sshd[2271407]: Invalid user michael from 164.132.56.147 port 43392
Apr 20 21:25:20 odoo16c sshd[2275103]: Invalid user shlee from 164.132.56.147 port 60968
... show less
Apr 20 19:14:41 phoebe sshd[1307013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreApr 20 19:14:41 phoebe sshd[1307013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
Apr 20 19:14:43 phoebe sshd[1307013]: Failed password for invalid user int from 164.132.56.147 port 54742 ssh2
Apr 20 19:19:52 phoebe sshd[1307283]: Invalid user michael from 164.132.56.147 port 34036
... show less
2025-04-20T21:06:29.325437-04:00 debian sshd[359903]: Failed password for invalid user int from 164. ... show more2025-04-20T21:06:29.325437-04:00 debian sshd[359903]: Failed password for invalid user int from 164.132.56.147 port 36458 ssh2
2025-04-20T21:07:08.478466-04:00 debian sshd[360352]: Invalid user int from 164.132.56.147 port 35944
2025-04-20T21:07:08.481964-04:00 debian sshd[360352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
2025-04-20T21:07:10.271263-04:00 debian sshd[360352]: Failed password for invalid user int from 164.132.56.147 port 35944 ssh2
2025-04-20T21:14:41.501162-04:00 debian sshd[365034]: Invalid user int from 164.132.56.147 port 36854
... show less
Brute-ForceSSH
Anonymous
2025-04-21T03:00:24.224582 prodgateway sshd[40598]: Invalid user nagios from 164.132.56.147 port 331 ... show more2025-04-21T03:00:24.224582 prodgateway sshd[40598]: Invalid user nagios from 164.132.56.147 port 33130
2025-04-21T03:00:24.229018 prodgateway sshd[40598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
2025-04-21T03:00:26.556765 prodgateway sshd[40598]: Failed password for invalid user nagios from 164.132.56.147 port 33130 ssh2
... show less
Brute-ForceSSH
Anonymous
2025-04-21T02:36:34.339138 prodgateway sshd[40347]: pam_unix(sshd:auth): authentication failure; log ... show more2025-04-21T02:36:34.339138 prodgateway sshd[40347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
2025-04-21T02:36:36.687140 prodgateway sshd[40347]: Failed password for invalid user test1 from 164.132.56.147 port 49818 ssh2
2025-04-21T02:41:24.629425 prodgateway sshd[40389]: Invalid user kocom from 164.132.56.147 port 58754
... show less
Brute-ForceSSH
Anonymous
2025-04-21T02:17:38.151576 prodgateway sshd[40193]: pam_unix(sshd:auth): authentication failure; log ... show more2025-04-21T02:17:38.151576 prodgateway sshd[40193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
2025-04-21T02:17:39.877805 prodgateway sshd[40193]: Failed password for invalid user user1 from 164.132.56.147 port 40298 ssh2
2025-04-21T02:22:33.477877 prodgateway sshd[40237]: Invalid user lsfadmin from 164.132.56.147 port 54184
... show less
Brute-ForceSSH
Anonymous
2025-04-21T01:57:47.506241 prodgateway sshd[40009]: Failed password for root from 164.132.56.147 por ... show more2025-04-21T01:57:47.506241 prodgateway sshd[40009]: Failed password for root from 164.132.56.147 port 60778 ssh2
2025-04-21T02:02:44.971297 prodgateway sshd[40067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147 user=root
2025-04-21T02:02:46.968420 prodgateway sshd[40067]: Failed password for root from 164.132.56.147 port 46516 ssh2
... show less
Brute-ForceSSH
Anonymous
Fail2Ban automatic report
Brute-ForceSSH
Anonymous
2025-04-21T01:33:34.991768 prodgateway sshd[39812]: Failed password for invalid user samr from 164.1 ... show more2025-04-21T01:33:34.991768 prodgateway sshd[39812]: Failed password for invalid user samr from 164.132.56.147 port 44716 ssh2
2025-04-21T01:38:27.446837 prodgateway sshd[39841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147 user=root
2025-04-21T01:38:29.423961 prodgateway sshd[39841]: Failed password for root from 164.132.56.147 port 39772 ssh2
... show less
Brute-ForceSSH
Anonymous
2025-04-21T01:14:17.915858 prodgateway sshd[39652]: pam_unix(sshd:auth): authentication failure; log ... show more2025-04-21T01:14:17.915858 prodgateway sshd[39652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
2025-04-21T01:14:19.832877 prodgateway sshd[39652]: Failed password for invalid user ali from 164.132.56.147 port 58356 ssh2
2025-04-21T01:19:13.912773 prodgateway sshd[39703]: Invalid user amssys from 164.132.56.147 port 35060
... show less
Brute-ForceSSH
Anonymous
Apr 20 18:03:36 jumarpab sshd[3319068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreApr 20 18:03:36 jumarpab sshd[3319068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
Apr 20 18:03:36 jumarpab sshd[3319068]: Invalid user user from 164.132.56.147 port 51766
Apr 20 18:03:39 jumarpab sshd[3319068]: Failed password for invalid user user from 164.132.56.147 port 51766 ssh2
... show less
Brute-ForceSSH
Anonymous
2025-04-21T00:59:35.721753 prodgateway sshd[39528]: Invalid user user from 164.132.56.147 port 50424 ... show more2025-04-21T00:59:35.721753 prodgateway sshd[39528]: Invalid user user from 164.132.56.147 port 50424
2025-04-21T00:59:35.729565 prodgateway sshd[39528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147
2025-04-21T00:59:37.561814 prodgateway sshd[39528]: Failed password for invalid user user from 164.132.56.147 port 50424 ssh2
... show less
Apr 20 16:45:51 tau sshd[648812]: Failed password for root from 164.132.56.147 port 39998 ssh2 ... show moreApr 20 16:45:51 tau sshd[648812]: Failed password for root from 164.132.56.147 port 39998 ssh2
Apr 20 16:50:44 tau sshd[648829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.147 user=root
Apr 20 16:50:47 tau sshd[648829]: Failed password for root from 164.132.56.147 port 55088 ssh2
... show less