This IP address has been reported a total of 2,030
times from 610 distinct
sources.
164.92.130.82 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
sshd[18378]: Failed password for www-data from 164.92.130.82 port 32802 ssh2
Brute-ForceSSH
Anonymous
Aug 24 19:27:00 f2b auth.info sshd[435832]: Invalid user www-data from 164.92.130.82 port 36114<br / ... show moreAug 24 19:27:00 f2b auth.info sshd[435832]: Invalid user www-data from 164.92.130.82 port 36114
Aug 24 19:27:00 f2b auth.info sshd[435832]: Failed password for invalid user www-data from 164.92.130.82 port 36114 ssh2
Aug 24 19:27:01 f2b auth.info sshd[435832]: Disconnected from invalid user www-data 164.92.130.82 port 36114 [preauth]
... show less
Aug 24 20:17:59 pkg-host01.packages.managed-infra.com sshd[75044]: Invalid user ian from 164.92.130. ... show moreAug 24 20:17:59 pkg-host01.packages.managed-infra.com sshd[75044]: Invalid user ian from 164.92.130.82 port 36120
Aug 24 20:17:59 pkg-host01.packages.managed-infra.com sshd[75044]: Disconnected from invalid user ian 164.92.130.82 port 36120 [preauth]
Aug 24 20:21:14 pkg-host01.packages.managed-infra.com sshd[75194]: Disconnected from authenticating user root 164.92.130.82 port 45432 [preauth]
Aug 24 20:23:15 pkg-host01.packages.managed-infra.com sshd[75343]: Invalid user student8 from 164.92.130.82 port 34902
Aug 24 20:23:15 pkg-host01.packages.managed-infra.com sshd[75343]: Disconnected from invalid user student8 164.92.130.82 port 34902 [preauth] show less
SSH Brute-Force. Matching log entries: Aug 24 21:01:52 mini sshd[355354]: Invalid user hadoop from 1 ... show moreSSH Brute-Force. Matching log entries: Aug 24 21:01:52 mini sshd[355354]: Invalid user hadoop from 164.92.130.82 port 59730
Aug 24 21:03:54 mini sshd[355381]: User root from 164.92.130.82 not allowed because not listed in AllowUsers
Aug 24 21:06:02 mini sshd[355403]: Invalid user nci from 164.92.130.82 port 58276
Aug 24 21:08:06 mini sshd[355434]: Invalid user sales1 from 164.92.130.82 port 58190
Aug 24 21:10:02 mini sshd[355541]: Invalid user mayur from 164.92.130.82 port 51712 show less
SSH Brute-Force. Matching log entries: Aug 24 20:37:27 mini sshd[354945]: User root from 164.92.130. ... show moreSSH Brute-Force. Matching log entries: Aug 24 20:37:27 mini sshd[354945]: User root from 164.92.130.82 not allowed because not listed in AllowUsers
Aug 24 20:39:31 mini sshd[355060]: Invalid user keli from 164.92.130.82 port 60638
Aug 24 20:41:34 mini sshd[355085]: User root from 164.92.130.82 not allowed because not listed in AllowUsers
Aug 24 20:43:33 mini sshd[355120]: Invalid user test01 from 164.92.130.82 port 47992
Aug 24 20:45:35 mini sshd[355160]: Invalid user watson from 164.92.130.82 port 52066 show less
SSH Brute-Force. Matching log entries: Aug 24 20:12:40 mini sshd[354643]: Invalid user ndutumo from ... show moreSSH Brute-Force. Matching log entries: Aug 24 20:12:40 mini sshd[354643]: Invalid user ndutumo from 164.92.130.82 port 35658
Aug 24 20:15:27 mini sshd[354676]: Invalid user user1 from 164.92.130.82 port 52120
Aug 24 20:17:27 mini sshd[354707]: Invalid user es from 164.92.130.82 port 55804
Aug 24 20:19:23 mini sshd[354756]: Invalid user vtl from 164.92.130.82 port 45772
Aug 24 20:21:22 mini sshd[354778]: Invalid user sj from 164.92.130.82 port 50264 show less
Aug 24 10:09:22 goldcrest sshd[3257444]: Failed password for invalid user ndutumo from 164.92.130.82 ... show moreAug 24 10:09:22 goldcrest sshd[3257444]: Failed password for invalid user ndutumo from 164.92.130.82 port 34452 ssh2
Aug 24 10:12:18 goldcrest sshd[3257624]: Invalid user user1 from 164.92.130.82 port 43292
Aug 24 10:12:18 goldcrest sshd[3257624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82
Aug 24 10:12:20 goldcrest sshd[3257624]: Failed password for invalid user user1 from 164.92.130.82 port 43292 ssh2
... show less
(sshd) Failed SSH login from 164.92.130.82 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direct ... show more(sshd) Failed SSH login from 164.92.130.82 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 24 16:03:13 eqxclasses-dev sshd[30717]: Invalid user mahendra from 164.92.130.82 port 39616
Aug 24 16:08:48 eqxclasses-dev sshd[30822]: Invalid user ali from 164.92.130.82 port 40686
Aug 24 16:10:52 eqxclasses-dev sshd[30872]: Invalid user charles from 164.92.130.82 port 49858
Aug 24 16:12:55 eqxclasses-dev sshd[30894]: Invalid user test1 from 164.92.130.82 port 34278
Aug 24 16:14:59 eqxclasses-dev sshd[30915]: Invalid user sylwia from 164.92.130.82 port 59744 show less
Port Scan
Anonymous
$f2bV_matches
Brute-ForceSSH
Anonymous
2023-08-24T12:04:47.108109 VOSTOK sshd[9949]: Invalid user mahendra from 164.92.130.82 port 60758<br ... show more2023-08-24T12:04:47.108109 VOSTOK sshd[9949]: Invalid user mahendra from 164.92.130.82 port 60758
2023-08-24T12:04:47.112251 VOSTOK sshd[9949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82
2023-08-24T12:04:48.729027 VOSTOK sshd[9949]: Failed password for invalid user mahendra from 164.92.130.82 port 60758 ssh2
2023-08-24T12:07:59.140475 VOSTOK sshd[10297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.82 user=root
2023-08-24T12:08:00.782370 VOSTOK sshd[10297]: Failed password for root from 164.92.130.82 port 35240 ssh2
... show less