This IP address has been reported a total of 332
times from 205 distinct
sources.
164.92.240.80 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-10-12T16:10:54.903857+02:00 zrh02.ch.pop.as202427.net sshd[3640111]: Invalid user gameserver fr ... show more2024-10-12T16:10:54.903857+02:00 zrh02.ch.pop.as202427.net sshd[3640111]: Invalid user gameserver from 164.92.240.80 port 39214
2024-10-12T16:17:15.791079+02:00 zrh02.ch.pop.as202427.net sshd[3641050]: User bin from 164.92.240.80 not allowed because not listed in AllowUsers
2024-10-12T16:17:51.898399+02:00 zrh02.ch.pop.as202427.net sshd[3641172]: User root from 164.92.240.80 not allowed because not listed in AllowUsers
... show less
2024-10-12T13:09:54.904055+00:00 wpespana-webs sshd[2217565]: Invalid user lara from 164.92.240.80 p ... show more2024-10-12T13:09:54.904055+00:00 wpespana-webs sshd[2217565]: Invalid user lara from 164.92.240.80 port 44212
2024-10-12T13:11:37.827910+00:00 wpespana-webs sshd[2217818]: Invalid user ubuntu from 164.92.240.80 port 51358
2024-10-12T13:12:41.598205+00:00 wpespana-webs sshd[2217969]: Invalid user git from 164.92.240.80 port 51152
... show less
2024-10-12T12:39:22.283713+00:00 robotstxt-mantenimiento sshd[3614970]: Invalid user clara from 164. ... show more2024-10-12T12:39:22.283713+00:00 robotstxt-mantenimiento sshd[3614970]: Invalid user clara from 164.92.240.80 port 51660
2024-10-12T12:43:39.971320+00:00 robotstxt-mantenimiento sshd[3619624]: Invalid user informix from 164.92.240.80 port 41684
2024-10-12T12:45:29.046895+00:00 robotstxt-mantenimiento sshd[3621418]: Invalid user ubuntu from 164.92.240.80 port 48570
... show less
[rede-44-49] (sshd) Failed SSH login from 164.92.240.80 (DE/Germany/-): 5 in the last 3600 secs; Por ... show more[rede-44-49] (sshd) Failed SSH login from 164.92.240.80 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Oct 12 08:25:12 sshd[19726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.240.80 user=[USERNAME]
Oct 12 08:25:14 sshd[19726]: Failed password for [USERNAME] from 164.92.240.80 port 54696 ssh2
Oct 12 08:27:43 sshd[20004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.240.80 user=[USERNAME]
Oct 12 08:27:46 sshd[20004]: Failed password for [USERNAME] from 164.92.240.80 port 39658 ssh2
Oct 12 08:28:3 show less
2024-10-12T12:06:41.877366+01:00 saccapposh sshd[50417]: Invalid user ahad from 164.92.240.80 port 5 ... show more2024-10-12T12:06:41.877366+01:00 saccapposh sshd[50417]: Invalid user ahad from 164.92.240.80 port 52850
2024-10-12T12:08:39.397068+01:00 saccapposh sshd[53992]: Invalid user artinarad from 164.92.240.80 port 38072
2024-10-12T12:09:28.865447+01:00 saccapposh sshd[55753]: Invalid user mcserver from 164.92.240.80 port 46284
... show less
Oct 12 03:40:03 b146-72 sshd[3593051]: Failed password for root from 164.92.240.80 port 48720 ssh2<b ... show moreOct 12 03:40:03 b146-72 sshd[3593051]: Failed password for root from 164.92.240.80 port 48720 ssh2
Oct 12 03:40:40 b146-72 sshd[3593090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.240.80 user=root
Oct 12 03:40:42 b146-72 sshd[3593090]: Failed password for root from 164.92.240.80 port 42060 ssh2
... show less
2024-10-07 11:53:53,446 fail2ban.actions [899]: NOTICE [sshd] Ban 164.92.240.80
2024-1 ... show more2024-10-07 11:53:53,446 fail2ban.actions [899]: NOTICE [sshd] Ban 164.92.240.80
2024-10-07 11:53:53,781 fail2ban.actions [899]: NOTICE [pam-generic] Ban 164.92.240.80 show less