This IP address has been reported a total of 529
times from 185 distinct
sources.
164.92.220.206 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 30 20:25:54 Debian-1202-bookworm-amd64-base sshd[1948605]: pam_unix(sshd:auth): authentication f ... show moreOct 30 20:25:54 Debian-1202-bookworm-amd64-base sshd[1948605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 20:25:56 Debian-1202-bookworm-amd64-base sshd[1948605]: Failed password for invalid user moonbeam from 164.92.220.206 port 52250 ssh2
Oct 30 20:32:39 Debian-1202-bookworm-amd64-base sshd[2122639]: Invalid user secret from 164.92.220.206 port 56068
Oct 30 20:32:39 Debian-1202-bookworm-amd64-base sshd[2122639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 20:32:40 Debian-1202-bookworm-amd64-base sshd[2122639]: Failed password for invalid user secret from 164.92.220.206 port 56068 ssh2
... show less
Oct 30 15:17:08 vps196363 sshd[13500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreOct 30 15:17:08 vps196363 sshd[13500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 15:17:10 vps196363 sshd[13500]: Failed password for invalid user polygon from 164.92.220.206 port 55774 ssh2
Oct 30 15:23:54 vps196363 sshd[13621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 15:23:56 vps196363 sshd[13621]: Failed password for invalid user moonbeam from 164.92.220.206 port 59594 ssh2
... show less
Oct 30 19:58:50 Debian-1202-bookworm-amd64-base sshd[1194374]: pam_unix(sshd:auth): authentication f ... show moreOct 30 19:58:50 Debian-1202-bookworm-amd64-base sshd[1194374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 19:58:52 Debian-1202-bookworm-amd64-base sshd[1194374]: Failed password for invalid user flow from 164.92.220.206 port 36976 ssh2
Oct 30 20:05:35 Debian-1202-bookworm-amd64-base sshd[1367641]: Invalid user celo from 164.92.220.206 port 40794
Oct 30 20:05:35 Debian-1202-bookworm-amd64-base sshd[1367641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 20:05:37 Debian-1202-bookworm-amd64-base sshd[1367641]: Failed password for invalid user celo from 164.92.220.206 port 40794 ssh2
... show less
Oct 30 14:50:05 vps196363 sshd[12866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreOct 30 14:50:05 vps196363 sshd[12866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 14:50:06 vps196363 sshd[12866]: Failed password for invalid user icon from 164.92.220.206 port 40502 ssh2
Oct 30 14:56:50 vps196363 sshd[12972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 14:56:52 vps196363 sshd[12972]: Failed password for invalid user flow from 164.92.220.206 port 44320 ssh2
... show less
2024-10-30T19:56:41.465959+01:00 server sshd[247175]: Invalid user flow from 164.92.220.206 port 536 ... show more2024-10-30T19:56:41.465959+01:00 server sshd[247175]: Invalid user flow from 164.92.220.206 port 53678
2024-10-30T19:56:41.495256+01:00 server sshd[247175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
2024-10-30T19:56:43.222965+01:00 server sshd[247175]: Failed password for invalid user flow from 164.92.220.206 port 53678 ssh2 show less
Oct 30 19:31:45 Debian-1202-bookworm-amd64-base sshd[573768]: pam_unix(sshd:auth): authentication fa ... show moreOct 30 19:31:45 Debian-1202-bookworm-amd64-base sshd[573768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 19:31:47 Debian-1202-bookworm-amd64-base sshd[573768]: Failed password for invalid user terra from 164.92.220.206 port 49936 ssh2
Oct 30 19:38:31 Debian-1202-bookworm-amd64-base sshd[732011]: Invalid user vechain from 164.92.220.206 port 53754
Oct 30 19:38:31 Debian-1202-bookworm-amd64-base sshd[732011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 19:38:33 Debian-1202-bookworm-amd64-base sshd[732011]: Failed password for invalid user vechain from 164.92.220.206 port 53754 ssh2
... show less
Oct 30 14:23:01 vps196363 sshd[12400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreOct 30 14:23:01 vps196363 sshd[12400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 14:23:03 vps196363 sshd[12400]: Failed password for invalid user elrond from 164.92.220.206 port 53460 ssh2
Oct 30 14:29:46 vps196363 sshd[12491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 14:29:47 vps196363 sshd[12491]: Failed password for invalid user terra from 164.92.220.206 port 57280 ssh2
... show less
Brute-ForceSSH
Anonymous
Oct 30 18:09:31 de-fra2-dns2 sshd[2189903]: Invalid user stratis from 164.92.220.206 port 57672<br / ... show moreOct 30 18:09:31 de-fra2-dns2 sshd[2189903]: Invalid user stratis from 164.92.220.206 port 57672
Oct 30 18:16:16 de-fra2-dns2 sshd[2189926]: Invalid user ravencoin from 164.92.220.206 port 33258
Oct 30 18:23:03 de-fra2-dns2 sshd[2190213]: Invalid user elrond from 164.92.220.206 port 37076
... show less
Oct 30 19:04:43 Debian-1202-bookworm-amd64-base sshd[4149397]: pam_unix(sshd:auth): authentication f ... show moreOct 30 19:04:43 Debian-1202-bookworm-amd64-base sshd[4149397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 19:04:45 Debian-1202-bookworm-amd64-base sshd[4149397]: Failed password for invalid user dash from 164.92.220.206 port 34662 ssh2
Oct 30 19:11:28 Debian-1202-bookworm-amd64-base sshd[109603]: Invalid user stratis from 164.92.220.206 port 38480
Oct 30 19:11:28 Debian-1202-bookworm-amd64-base sshd[109603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 19:11:30 Debian-1202-bookworm-amd64-base sshd[109603]: Failed password for invalid user stratis from 164.92.220.206 port 38480 ssh2
... show less
Oct 30 13:55:58 vps196363 sshd[11937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreOct 30 13:55:58 vps196363 sshd[11937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 13:55:59 vps196363 sshd[11937]: Failed password for invalid user stellar from 164.92.220.206 port 38188 ssh2
Oct 30 14:02:43 vps196363 sshd[12078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.220.206
Oct 30 14:02:46 vps196363 sshd[12078]: Failed password for invalid user dash from 164.92.220.206 port 42006 ssh2
... show less
2024-10-30T19:00:51.663825+01:00 Fubuki sshd[1330279]: Invalid user stellar from 164.92.220.206 port ... show more2024-10-30T19:00:51.663825+01:00 Fubuki sshd[1330279]: Invalid user stellar from 164.92.220.206 port 40452
... show less