This IP address has been reported a total of 183
times from 137 distinct
sources.
164.90.150.131 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2025-01-02T06:15:41+01:00 [redacted] [Thu Jan 02 06:15:41.368629 2025] [core:info] [pid 16822:tid 14 ... show more2025-01-02T06:15:41+01:00 [redacted] [Thu Jan 02 06:15:41.368629 2025] [core:info] [pid 16822:tid 140044002105024] [client 164.90.150.131:47821] AH00128: File does not exist: /var/services/web/ads.txt show less
Blocked by UFW (TCP on port 8080).
Source port: 61005
TTL: 243
Packet length: 44<b ... show moreBlocked by UFW (TCP on port 8080).
Source port: 61005
TTL: 243
Packet length: 44
TOS: 0x00
This report (for 164.90.150.131) was generated by:
https://github.com/sefinek/UFW-AbuseIPDB-Reporter show less
2024-12-22T05:17:14.852754+00:00 atlas-ru sshd[1071916]: Connection closed by authenticating user ro ... show more2024-12-22T05:17:14.852754+00:00 atlas-ru sshd[1071916]: Connection closed by authenticating user root 164.90.150.131 port 52370 [preauth]
2024-12-22T05:19:47.808925+00:00 atlas-ru sshd[1072205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.150.131 user=root
2024-12-22T05:19:49.508484+00:00 atlas-ru sshd[1072205]: Failed password for root from 164.90.150.131 port 44406 ssh2
2024-12-22T05:19:49.864183+00:00 atlas-ru sshd[1072207]: Invalid user pi from 164.90.150.131 port 44422
2024-12-22T05:19:50.647186+00:00 atlas-ru sshd[1072205]: Connection closed by authenticating user root 164.90.150.131 port 44406 [preauth]
... show less
Dec 22 04:01:25 ******** sshd[3515826]: User root from 164.90.150.131 not allowed because not listed ... show moreDec 22 04:01:25 ******** sshd[3515826]: User root from 164.90.150.131 not allowed because not listed in AllowUsers show less