This IP address has been reported a total of 16,233
times from 1,393 distinct
sources.
166.62.94.122 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
(sshd) Failed SSH login from 166.62.94.122 (US/United States/122.94.62.166.host.secureserver.net): 5 ... show more(sshd) Failed SSH login from 166.62.94.122 (US/United States/122.94.62.166.host.secureserver.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 19 23:10:45 web02 sshd[606830]: Invalid user lgh from 166.62.94.122 port 33088
Feb 19 23:10:47 web02 sshd[606830]: Failed password for invalid user lgh from 166.62.94.122 port 33088 ssh2
Feb 19 23:14:39 web02 sshd[607734]: Invalid user oper from 166.62.94.122 port 53746
Feb 19 23:14:41 web02 sshd[607734]: Failed password for invalid user oper from 166.62.94.122 port 53746 ssh2
Feb 19 23:15:48 web02 sshd[608159]: Invalid user artem from 166.62.94.122 port 50416 show less
Feb 19 13:33:40 cake sshd[53792]: Invalid user import from 166.62.94.122 port 32834
Feb 19 13: ... show moreFeb 19 13:33:40 cake sshd[53792]: Invalid user import from 166.62.94.122 port 32834
Feb 19 13:36:05 cake sshd[54226]: Invalid user linuxacademy from 166.62.94.122 port 40124
Feb 19 13:37:13 cake sshd[54427]: Invalid user informix from 166.62.94.122 port 36906
... show less
2025-02-19T22:55:45.062867+02:00 groverp sshd[289716]: Failed password for invalid user nodeuser fro ... show more2025-02-19T22:55:45.062867+02:00 groverp sshd[289716]: Failed password for invalid user nodeuser from 166.62.94.122 port 54484 ssh2
2025-02-19T22:58:12.784755+02:00 groverp sshd[290145]: Invalid user pwserver from 166.62.94.122 port 34704
2025-02-19T22:58:12.786580+02:00 groverp sshd[290145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.62.94.122
2025-02-19T22:58:14.545325+02:00 groverp sshd[290145]: Failed password for invalid user pwserver from 166.62.94.122 port 34704 ssh2
2025-02-19T22:59:18.267125+02:00 groverp sshd[290336]: Invalid user tester from 166.62.94.122 port 59408
... show less
Feb 19 22:54:09 betelgeuse sshd[3185341]: Invalid user nodeuser from 166.62.94.122 port 44954
... show moreFeb 19 22:54:09 betelgeuse sshd[3185341]: Invalid user nodeuser from 166.62.94.122 port 44954
Feb 19 22:57:52 betelgeuse sshd[3257195]: Invalid user pwserver from 166.62.94.122 port 35576
... show less
Feb 19 21:16:31 ouranos sshd[1498066]: Invalid user star from 166.62.94.122 port 51108
Feb 19 ... show moreFeb 19 21:16:31 ouranos sshd[1498066]: Invalid user star from 166.62.94.122 port 51108
Feb 19 21:20:13 ouranos sshd[1498593]: Invalid user template from 166.62.94.122 port 41242
Feb 19 21:21:19 ouranos sshd[1498724]: Invalid user csgoserver from 166.62.94.122 port 38222
... show less
2025-02-19T19:43:11.643323+00:00 Linux03 sshd[3630590]: Failed password for invalid user webtest fro ... show more2025-02-19T19:43:11.643323+00:00 Linux03 sshd[3630590]: Failed password for invalid user webtest from 166.62.94.122 port 56146 ssh2
2025-02-19T19:44:20.213305+00:00 Linux03 sshd[3633820]: Invalid user azureuser from 166.62.94.122 port 52766
2025-02-19T19:44:20.216523+00:00 Linux03 sshd[3633820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.62.94.122
2025-02-19T19:44:22.874312+00:00 Linux03 sshd[3633820]: Failed password for invalid user azureuser from 166.62.94.122 port 52766 ssh2
2025-02-19T19:45:27.288496+00:00 Linux03 sshd[3637155]: Invalid user thomas from 166.62.94.122 port 49386
2025-02-19T19:45:27.290406+00:00 Linux03 sshd[3637155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.62.94.122
2025-02-19T19:45:29.812329+00:00 Linux03 sshd[3637155]: Failed password for invalid user thomas from 166.62.94.122 port 49386 ssh2
2025-02-19T19:46:32.396338+00:00 Linux03 sshd[3639892]: Invalid user d
... show less
2025-02-19T19:06:25.802236+01:00 debian sshd[2130974]: Failed password for invalid user min from 166 ... show more2025-02-19T19:06:25.802236+01:00 debian sshd[2130974]: Failed password for invalid user min from 166.62.94.122 port 34470 ssh2
2025-02-19T19:10:23.629640+01:00 debian sshd[2134165]: Invalid user light from 166.62.94.122 port 55792
2025-02-19T19:10:23.633006+01:00 debian sshd[2134165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.62.94.122
2025-02-19T19:10:25.760921+01:00 debian sshd[2134165]: Failed password for invalid user light from 166.62.94.122 port 55792 ssh2
2025-02-19T19:11:33.163403+01:00 debian sshd[2135132]: Invalid user dspace from 166.62.94.122 port 51940
... show less
Brute-ForceSSH
Anonymous
Feb 18 10:20:18 mail fail2ban.actions [590]: NOTICE [sshd] Ban 166.62.94.122
Feb 19 13 ... show moreFeb 18 10:20:18 mail fail2ban.actions [590]: NOTICE [sshd] Ban 166.62.94.122
Feb 19 13:58:25 mail fail2ban.actions [590]: NOTICE [sshd] Ban 166.62.94.122
Feb 20 02:06:43 mail fail2ban.actions [590]: NOTICE [sshd] Ban 166.62.94.122 show less
2025-02-20T01:33:44.321037+08:00 *hostname* sshd-session[292489]: Invalid user problem from 166.62.9 ... show more2025-02-20T01:33:44.321037+08:00 *hostname* sshd-session[292489]: Invalid user problem from 166.62.94.122 port 54864
2025-02-20T01:34:46.985215+08:00 *hostname* sshd-session[292495]: Connection from 166.62.94.122 port 51620 on 10.7.121.81 port 22 rdomain ""
2025-02-20T01:34:47.957260+08:00 *hostname* sshd-session[292495]: Invalid user mq from 166.62.94.122 port 51620
2025-02-20T01:35:48.442373+08:00 *hostname* sshd-session[292511]: Connection from 166.62.94.122 port 48372 on 10.7.121.81 port 22 rdomain ""
2025-02-20T01:35:49.323938+08:00 *hostname* sshd-session[292511]: Invalid user dab from 166.62.94.122 port 48372 show less