This IP address has been reported a total of 690
times from 137 distinct
sources.
170.64.132.12 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Aug 9 10:53:54 C1D543E sshd[542732]: Invalid user opc from 170.64.132.12 port 35970
Aug 9 10 ... show moreAug 9 10:53:54 C1D543E sshd[542732]: Invalid user opc from 170.64.132.12 port 35970
Aug 9 10:53:54 C1D543E sshd[542732]: Failed password for invalid user opc from 170.64.132.12 port 35970 ssh2
Aug 9 10:53:56 C1D543E sshd[542734]: Invalid user zhongren123 from 170.64.132.12 port 36280
Aug 9 10:53:57 C1D543E sshd[542734]: Failed password for invalid user zhongren123 from 170.64.132.12 port 36280 ssh2
Aug 9 10:53:59 C1D543E sshd[542736]: User root from 170.64.132.12 not allowed because not listed in AllowUsers
... show less
Brute-ForceSSH
Anonymous
Aug 9 10:31:38 C1D543E sshd[542273]: User root from 170.64.132.12 not allowed because not listed in ... show moreAug 9 10:31:38 C1D543E sshd[542273]: User root from 170.64.132.12 not allowed because not listed in AllowUsers
Aug 9 10:31:39 C1D543E sshd[542273]: Failed password for invalid user root from 170.64.132.12 port 51844 ssh2
Aug 9 10:33:44 C1D543E sshd[542311]: Invalid user data from 170.64.132.12 port 40120
Aug 9 10:33:44 C1D543E sshd[542311]: Failed password for invalid user data from 170.64.132.12 port 40120 ssh2
Aug 9 10:33:47 C1D543E sshd[542313]: Invalid user user1 from 170.64.132.12 port 40430
... show less
Aug 9 01:31:39 servidor sshd[965230]: Failed password for root from 170.64.132.12 port 47952 ssh2<b ... show moreAug 9 01:31:39 servidor sshd[965230]: Failed password for root from 170.64.132.12 port 47952 ssh2
Aug 9 01:31:39 servidor sshd[965230]: Connection closed by authenticating user root 170.64.132.12 port 47952 [preauth]
Aug 9 01:33:43 servidor sshd[965420]: Invalid user data from 170.64.132.12 port 50398
... show less
Events: TCP SYN Discovery or Flooding, Seen 4 times in the last 10800 seconds
DDoS Attack
Anonymous
Aug 9 08:04:07 f2b auth.info sshd[13879]: Failed password for root from 170.64.132.12 port 45024 ss ... show moreAug 9 08:04:07 f2b auth.info sshd[13879]: Failed password for root from 170.64.132.12 port 45024 ssh2
Aug 9 08:06:14 f2b auth.info sshd[13883]: Invalid user data from 170.64.132.12 port 56588
Aug 9 08:06:14 f2b auth.info sshd[13883]: Failed password for invalid user data from 170.64.132.12 port 56588 ssh2
... show less
Aug 9 07:36:07 fail2ban sshd[285205]: Failed password for root from 170.64.132.12 port 58470 ssh2<b ... show moreAug 9 07:36:07 fail2ban sshd[285205]: Failed password for root from 170.64.132.12 port 58470 ssh2
Aug 9 07:38:12 fail2ban sshd[285208]: Invalid user data from 170.64.132.12 port 43752
... show less
Aug 9 08:38:11 thenormalpeople sshd[156620]: pam_unix(sshd:auth): authentication failure; logname= ... show moreAug 9 08:38:11 thenormalpeople sshd[156620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.132.12
Aug 9 08:38:11 thenormalpeople sshd[156620]: Invalid user data from 170.64.132.12 port 35040
Aug 9 08:38:13 thenormalpeople sshd[156620]: Failed password for invalid user data from 170.64.132.12 port 35040 ssh2
... show less