This IP address has been reported a total of 221
times from 67 distinct
sources.
164.92.66.64 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
May 13 14:33:46 scw-6657dc sshd[12219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMay 13 14:33:46 scw-6657dc sshd[12219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64 user=root
May 13 14:33:46 scw-6657dc sshd[12219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64 user=root
May 13 14:33:48 scw-6657dc sshd[12219]: Failed password for root from 164.92.66.64 port 58548 ssh2
... show less
Brute-ForceSSH
Anonymous
Brute-ForceSSH
Anonymous
2024-05-13T15:47:15.310473+02:00 mail sshd[502349]: Failed password for root from 164.92.66.64 port ... show more2024-05-13T15:47:15.310473+02:00 mail sshd[502349]: Failed password for root from 164.92.66.64 port 33628 ssh2
2024-05-13T15:54:44.228558+02:00 mail sshd[502640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64 user=root
2024-05-13T15:54:45.891413+02:00 mail sshd[502640]: Failed password for root from 164.92.66.64 port 60208 ssh2
2024-05-13T16:02:14.371184+02:00 mail sshd[502968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64 user=root
2024-05-13T16:02:16.479580+02:00 mail sshd[502968]: Failed password for root from 164.92.66.64 port 54410 ssh2
... show less
May 13 13:18:52 scw-6657dc sshd[10977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMay 13 13:18:52 scw-6657dc sshd[10977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64 user=root
May 13 13:18:52 scw-6657dc sshd[10977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64 user=root
May 13 13:18:53 scw-6657dc sshd[10977]: Failed password for root from 164.92.66.64 port 46990 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-05-13T14:18:11.008420+02:00 mail sshd[498119]: Invalid user testdev from 164.92.66.64 port 3338 ... show more2024-05-13T14:18:11.008420+02:00 mail sshd[498119]: Invalid user testdev from 164.92.66.64 port 33388
2024-05-13T14:18:11.327723+02:00 mail sshd[498119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64
2024-05-13T14:18:13.713150+02:00 mail sshd[498119]: Failed password for invalid user testdev from 164.92.66.64 port 33388 ssh2
2024-05-13T14:25:42.502708+02:00 mail sshd[498465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64 user=root
2024-05-13T14:25:44.803554+02:00 mail sshd[498465]: Failed password for root from 164.92.66.64 port 36944 ssh2
... show less
Brute-ForceSSH
Anonymous
May 13 12:10:56 vps-3cf7b8c3 sshd[1603437]: pam_unix(sshd:auth): authentication failure; logname= ui ... show moreMay 13 12:10:56 vps-3cf7b8c3 sshd[1603437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64
May 13 12:10:58 vps-3cf7b8c3 sshd[1603437]: Failed password for invalid user bad from 164.92.66.64 port 33898 ssh2
May 13 12:18:28 vps-3cf7b8c3 sshd[1609531]: Invalid user testdev from 164.92.66.64 port 34386
... show less
Brute-ForceSSH
Anonymous
May 13 20:10:13 172-16-10-1 sshd[455248]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreMay 13 20:10:13 172-16-10-1 sshd[455248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64
May 13 20:10:15 172-16-10-1 sshd[455248]: Failed password for invalid user bad from 164.92.66.64 port 57048 ssh2
May 13 20:17:44 172-16-10-1 sshd[455312]: Invalid user testdev from 164.92.66.64 port 35254
... show less
May 13 13:10:07 vm20 sshd[2019504]: Invalid user bad from 164.92.66.64 port 60282
May 13 13:17 ... show moreMay 13 13:10:07 vm20 sshd[2019504]: Invalid user bad from 164.92.66.64 port 60282
May 13 13:17:39 vm20 sshd[2019558]: Invalid user testdev from 164.92.66.64 port 46150
... show less
May 13 13:09:52 wt-discord-bots sshd[2445171]: pam_unix(sshd:auth): authentication failure; logname= ... show moreMay 13 13:09:52 wt-discord-bots sshd[2445171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64
May 13 13:09:55 wt-discord-bots sshd[2445171]: Failed password for invalid user bad from 164.92.66.64 port 36704 ssh2
May 13 13:17:23 wt-discord-bots sshd[2445847]: Invalid user testdev from 164.92.66.64 port 33274
... show less
May 13 14:07:01 vpn sshd[1696507]: Invalid user bad from 164.92.66.64 port 44210
May 13 14:07: ... show moreMay 13 14:07:01 vpn sshd[1696507]: Invalid user bad from 164.92.66.64 port 44210
May 13 14:07:04 vpn sshd[1696507]: Failed password for invalid user bad from 164.92.66.64 port 44210 ssh2
May 13 14:14:31 vpn sshd[1696604]: Invalid user testdev from 164.92.66.64 port 54106
... show less
2024-05-13T05:05:21.422298-07:00 pixelmemory sshd[1306828]: Failed password for invalid user bad fro ... show more2024-05-13T05:05:21.422298-07:00 pixelmemory sshd[1306828]: Failed password for invalid user bad from 164.92.66.64 port 33110 ssh2
2024-05-13T05:12:47.525961-07:00 pixelmemory sshd[1308227]: Invalid user testdev from 164.92.66.64 port 37126
2024-05-13T05:12:47.537411-07:00 pixelmemory sshd[1308227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.64
2024-05-13T05:12:49.778150-07:00 pixelmemory sshd[1308227]: Failed password for invalid user testdev from 164.92.66.64 port 37126 ssh2
... show less