This IP address has been reported a total of 176
times from 15 distinct
sources.
164.92.65.149 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2023-09-22T04:24:15.319422 z3rg sshd[141790]: Failed password for invalid user hadoop from 164.92.65 ... show more2023-09-22T04:24:15.319422 z3rg sshd[141790]: Failed password for invalid user hadoop from 164.92.65.149 port 48668 ssh2
2023-09-22T04:25:55.131189 z3rg sshd[141801]: Invalid user jfedu1 from 164.92.65.149 port 50992
2023-09-22T04:25:55.217518 z3rg sshd[141801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
2023-09-22T04:25:57.746108 z3rg sshd[141801]: Failed password for invalid user jfedu1 from 164.92.65.149 port 50992 ssh2
2023-09-22T04:27:37.175386 z3rg sshd[141833]: Invalid user huawei from 164.92.65.149 port 55114
... show less
Lines containing failures of 164.92.65.149
Sep 21 03:49:46 finn sshd[28038]: Did not receive i ... show moreLines containing failures of 164.92.65.149
Sep 21 03:49:46 finn sshd[28038]: Did not receive identification string from 164.92.65.149 port 41974
Sep 21 03:52:41 finn sshd[28935]: AD user dbsql from 164.92.65.149 port 34212
Sep 21 03:52:41 finn sshd[28935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
Sep 21 03:52:42 finn sshd[28935]: Failed password for AD user dbsql from 164.92.65.149 port 34212 ssh2
Sep 21 03:52:43 finn sshd[28935]: Connection closed by AD user dbsql 164.92.65.149 port 34212 [preauth]
Sep 21 03:54:21 finn sshd[29009]: AD user sql from 164.92.65.149 port 54840
Sep 21 03:54:21 finn sshd[29009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=164.92.65.149 show less
Sep 22 01:02:30 magpie sshd[1162791]: Failed password for invalid user zookeeper from 164.92.65.149 ... show moreSep 22 01:02:30 magpie sshd[1162791]: Failed password for invalid user zookeeper from 164.92.65.149 port 36492 ssh2
Sep 22 01:04:09 magpie sshd[1162833]: Invalid user login from 164.92.65.149 port 57724
Sep 22 01:04:10 magpie sshd[1162833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
Sep 22 01:04:11 magpie sshd[1162833]: Failed password for invalid user login from 164.92.65.149 port 57724 ssh2
... show less
2023-09-22T03:58:44.105467 z3rg sshd[80141]: Failed password for invalid user bmp from 164.92.65.149 ... show more2023-09-22T03:58:44.105467 z3rg sshd[80141]: Failed password for invalid user bmp from 164.92.65.149 port 59062 ssh2
2023-09-22T04:00:24.131958 z3rg sshd[137677]: Invalid user es from 164.92.65.149 port 51434
2023-09-22T04:00:24.216820 z3rg sshd[137677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
2023-09-22T04:00:26.565451 z3rg sshd[137677]: Failed password for invalid user es from 164.92.65.149 port 51434 ssh2
2023-09-22T04:02:06.594395 z3rg sshd[141276]: Invalid user zookeeper from 164.92.65.149 port 57312
... show less
Sep 22 07:59:25 vps-9 sshd[1033026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreSep 22 07:59:25 vps-9 sshd[1033026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
Sep 22 07:59:27 vps-9 sshd[1033026]: Failed password for invalid user es from 164.92.65.149 port 49466 ssh2
Sep 22 07:59:48 vps-9 sshd[1033030]: Invalid user es from 164.92.65.149 port 38970
... show less
2023-09-22T03:33:14.940198 z3rg sshd[22583]: pam_unix(sshd:auth): authentication failure; logname= u ... show more2023-09-22T03:33:14.940198 z3rg sshd[22583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
2023-09-22T03:33:16.516096 z3rg sshd[22583]: Failed password for invalid user share from 164.92.65.149 port 59946 ssh2
2023-09-22T03:34:56.671002 z3rg sshd[22609]: Invalid user dmdba from 164.92.65.149 port 52054
2023-09-22T03:34:56.753074 z3rg sshd[22609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
2023-09-22T03:34:58.665196 z3rg sshd[22609]: Failed password for invalid user dmdba from 164.92.65.149 port 52054 ssh2
... show less
2023-09-22T03:06:09.782692 z3rg sshd[22002]: Failed password for invalid user visitors from 164.92.6 ... show more2023-09-22T03:06:09.782692 z3rg sshd[22002]: Failed password for invalid user visitors from 164.92.65.149 port 39878 ssh2
2023-09-22T03:07:50.140548 z3rg sshd[22023]: Invalid user visitors from 164.92.65.149 port 35738
2023-09-22T03:07:50.223095 z3rg sshd[22023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
2023-09-22T03:07:51.914592 z3rg sshd[22023]: Failed password for invalid user visitors from 164.92.65.149 port 35738 ssh2
2023-09-22T03:09:31.730278 z3rg sshd[22076]: Invalid user visitors from 164.92.65.149 port 36228
... show less
2023-09-22T02:40:41.019460 z3rg sshd[21411]: Failed password for invalid user mvas from 164.92.65.14 ... show more2023-09-22T02:40:41.019460 z3rg sshd[21411]: Failed password for invalid user mvas from 164.92.65.149 port 48710 ssh2
2023-09-22T02:42:21.392651 z3rg sshd[21444]: Invalid user mvas from 164.92.65.149 port 33568
2023-09-22T02:42:21.477384 z3rg sshd[21444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.65.149
2023-09-22T02:42:23.264452 z3rg sshd[21444]: Failed password for invalid user mvas from 164.92.65.149 port 33568 ssh2
2023-09-22T02:44:03.362851 z3rg sshd[21521]: Invalid user mvas from 164.92.65.149 port 34842
... show less