This IP address has been reported a total of 2,038
times from 611 distinct
sources.
164.92.130.82 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Aug 29 09:31:35 pornomens sshd[794222]: Failed password for root from 164.92.130.82 port 48108 ssh2< ... show moreAug 29 09:31:35 pornomens sshd[794222]: Failed password for root from 164.92.130.82 port 48108 ssh2
Aug 29 09:35:45 pornomens sshd[794250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82 user=root
Aug 29 09:35:47 pornomens sshd[794250]: Failed password for root from 164.92.130.82 port 36546 ssh2
Aug 29 09:35:56 pornomens sshd[794252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82 user=root
Aug 29 09:35:58 pornomens sshd[794252]: Failed password for root from 164.92.130.82 port 43584 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 29 07:08:02 d-code sshd[4108]: Invalid user testi from 164.92.130.82 port 55018
Aug 29 07: ... show moreAug 29 07:08:02 d-code sshd[4108]: Invalid user testi from 164.92.130.82 port 55018
Aug 29 07:13:34 d-code sshd[4705]: Invalid user ubuntu from 164.92.130.82 port 52932
Aug 29 07:14:10 d-code sshd[4765]: Invalid user ubuntu from 164.92.130.82 port 53548
... show less
Brute-ForceSSH
Anonymous
Aug 29 05:28:28 con01 sshd[1818730]: Failed password for root from 164.92.130.82 port 59358 ssh2<br ... show moreAug 29 05:28:28 con01 sshd[1818730]: Failed password for root from 164.92.130.82 port 59358 ssh2
Aug 29 05:28:38 con01 sshd[1820644]: Invalid user shill from 164.92.130.82 port 44316
Aug 29 05:28:38 con01 sshd[1820644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82
Aug 29 05:28:38 con01 sshd[1820644]: Invalid user shill from 164.92.130.82 port 44316
Aug 29 05:28:40 con01 sshd[1820644]: Failed password for invalid user shill from 164.92.130.82 port 44316 ssh2
... show less
(sshd) Failed SSH login from 164.92.130.82 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direct ... show more(sshd) Failed SSH login from 164.92.130.82 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Aug 28 18:57:32 14214 sshd[14046]: Invalid user admin from 164.92.130.82 port 47170
Aug 28 18:57:34 14214 sshd[14046]: Failed password for invalid user admin from 164.92.130.82 port 47170 ssh2
Aug 28 19:00:38 14214 sshd[14242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82 user=root
Aug 28 19:00:40 14214 sshd[14242]: Failed password for root from 164.92.130.82 port 35566 ssh2
Aug 28 19:00:48 14214 sshd[14249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82 user=root show less
2023-08-29T00:28:25.086567+02:00 server sshd[235654]: User root from 164.92.130.82 not allowed becau ... show more2023-08-29T00:28:25.086567+02:00 server sshd[235654]: User root from 164.92.130.82 not allowed because not listed in AllowUsers
... show less
Aug 28 20:16:22 cloudplex sshd[3804793]: Failed password for root from 164.92.130.82 port 39794 ssh2 ... show moreAug 28 20:16:22 cloudplex sshd[3804793]: Failed password for root from 164.92.130.82 port 39794 ssh2
Aug 28 20:16:30 cloudplex sshd[3804797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82 user=root
Aug 28 20:16:32 cloudplex sshd[3804797]: Failed password for root from 164.92.130.82 port 37456 ssh2
Aug 28 20:16:41 cloudplex sshd[3804799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82 user=root
Aug 28 20:16:43 cloudplex sshd[3804799]: Failed password for root from 164.92.130.82 port 56112 ssh2
... show less
Aug 27 22:49:23 admin sshd[915255]: Failed password for root from 164.92.130.82 port 43476 ssh2<br / ... show moreAug 27 22:49:23 admin sshd[915255]: Failed password for root from 164.92.130.82 port 43476 ssh2
Aug 27 22:49:33 admin sshd[915275]: Invalid user test from 164.92.130.82 port 45034
Aug 27 22:49:33 admin sshd[915275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82
Aug 27 22:49:33 admin sshd[915275]: Invalid user test from 164.92.130.82 port 45034
Aug 27 22:49:35 admin sshd[915275]: Failed password for invalid user test from 164.92.130.82 port 45034 ssh2
... show less
Aug 27 14:14:09 d-code sshd[11917]: Invalid user admin from 164.92.130.82 port 54252
Aug 27 14 ... show moreAug 27 14:14:09 d-code sshd[11917]: Invalid user admin from 164.92.130.82 port 54252
Aug 27 14:14:23 d-code sshd[11932]: Invalid user ubuntu from 164.92.130.82 port 44266
Aug 27 14:14:35 d-code sshd[11948]: Invalid user admin from 164.92.130.82 port 35720
... show less