This IP address has been reported a total of 467
times from 275 distinct
sources.
164.68.102.81 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
2024-09-13T04:08:09.491023+02:00 mx01 sshd[1930220]: Invalid user user from 164.68.102.81 port 42868 ... show more2024-09-13T04:08:09.491023+02:00 mx01 sshd[1930220]: Invalid user user from 164.68.102.81 port 42868
2024-09-13T04:15:22.355549+02:00 mx01 sshd[1931029]: Invalid user hoo from 164.68.102.81 port 44684
2024-09-13T04:16:26.505708+02:00 mx01 sshd[1931086]: Invalid user kwx from 164.68.102.81 port 57338
... show less
Sep 13 01:50:19 odin sshd[3597]: Failed password for root from 164.68.102.81 port 36918 ssh2
S ... show moreSep 13 01:50:19 odin sshd[3597]: Failed password for root from 164.68.102.81 port 36918 ssh2
Sep 13 01:52:51 odin sshd[3832]: Failed password for root from 164.68.102.81 port 37134 ssh2
Sep 13 01:55:25 odin sshd[4864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.102.81 show less
Sep 12 23:44:55 backup sshd[1055527]: Failed password for root from 164.68.102.81 port 49778 ssh2<br ... show moreSep 12 23:44:55 backup sshd[1055527]: Failed password for root from 164.68.102.81 port 49778 ssh2
Sep 12 23:46:03 backup sshd[1055748]: Invalid user reader from 164.68.102.81 port 35768
Sep 12 23:46:03 backup sshd[1055748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.102.81
Sep 12 23:46:04 backup sshd[1055748]: Failed password for invalid user reader from 164.68.102.81 port 35768 ssh2
Sep 12 23:47:24 backup sshd[1055968]: Invalid user lighthouse from 164.68.102.81 port 49994
... show less
Sep 13 01:27:42 odin sshd[30073]: Failed password for root from 164.68.102.81 port 38880 ssh2
... show moreSep 13 01:27:42 odin sshd[30073]: Failed password for root from 164.68.102.81 port 38880 ssh2
Sep 13 01:35:10 odin sshd[31941]: Failed password for root from 164.68.102.81 port 35618 ssh2 show less
Sep 13 09:09:21 electronicohost sshd[2594363]: Failed password for invalid user newftpuser from 164. ... show moreSep 13 09:09:21 electronicohost sshd[2594363]: Failed password for invalid user newftpuser from 164.68.102.81 port 39936 ssh2
Sep 13 09:11:28 electronicohost sshd[2594653]: Invalid user administrator from 164.68.102.81 port 59478
Sep 13 09:11:28 electronicohost sshd[2594653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.102.81
Sep 13 09:11:29 electronicohost sshd[2594653]: Failed password for invalid user administrator from 164.68.102.81 port 59478 ssh2
Sep 13 09:13:32 electronicohost sshd[2594864]: Invalid user guest from 164.68.102.81 port 56154 show less
Sep 12 14:48:50 b146-68 sshd[1616125]: Invalid user mis from 164.68.102.81 port 41328
Sep 12 1 ... show moreSep 12 14:48:50 b146-68 sshd[1616125]: Invalid user mis from 164.68.102.81 port 41328
Sep 12 14:48:50 b146-68 sshd[1616125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.102.81
Sep 12 14:48:52 b146-68 sshd[1616125]: Failed password for invalid user mis from 164.68.102.81 port 41328 ssh2
... show less
Brute-ForceSSH
Anonymous
164.68.102.81 (DE/Germany/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Po ... show more164.68.102.81 (DE/Germany/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 12 16:05:36 server2 sshd[3145]: Failed password for root from 106.75.130.189 port 23108 ssh2
Sep 12 16:07:24 server2 sshd[3514]: Failed password for root from 187.62.88.130 port 42512 ssh2
Sep 12 16:08:03 server2 sshd[3651]: Failed password for root from 36.103.234.60 port 47616 ssh2
Sep 12 16:07:51 server2 sshd[3593]: Failed password for root from 164.68.102.81 port 59778 ssh2
Sep 12 16:06:31 server2 sshd[3343]: Failed password for root from 187.62.88.130 port 48788 ssh2
IP Addresses Blocked:
106.75.130.189 (CN/China/-)
187.62.88.130 (-)
36.103.234.60 (CN/China/-) show less
Sep 12 22:02:38 localhost sshd[3327501]: Invalid user water from 164.68.102.81 port 59590
...
Brute-ForceSSH
Anonymous
Sep 12 19:23:11 f2b auth.info sshd[127978]: Invalid user git from 164.68.102.81 port 38464
Sep ... show moreSep 12 19:23:11 f2b auth.info sshd[127978]: Invalid user git from 164.68.102.81 port 38464
Sep 12 19:23:11 f2b auth.info sshd[127978]: Failed password for invalid user git from 164.68.102.81 port 38464 ssh2
Sep 12 19:23:11 f2b auth.info sshd[127978]: Disconnected from invalid user git 164.68.102.81 port 38464 [preauth]
... show less