This IP address has been reported a total of 4,411
times from 869 distinct
sources.
174.138.1.164 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Nov 3 10:06:22 ip-172-31-16-56 sshd\[17164\]: Failed password for root from 174.138.1.164 port 3606 ... show moreNov 3 10:06:22 ip-172-31-16-56 sshd\[17164\]: Failed password for root from 174.138.1.164 port 36068 ssh2\
Nov 3 10:09:47 ip-172-31-16-56 sshd\[17279\]: Failed password for root from 174.138.1.164 port 47624 ssh2\
Nov 3 10:10:59 ip-172-31-16-56 sshd\[17289\]: Failed password for root from 174.138.1.164 port 51332 ssh2\
Nov 3 10:12:12 ip-172-31-16-56 sshd\[17297\]: Failed password for root from 174.138.1.164 port 58566 ssh2\
Nov 3 10:13:32 ip-172-31-16-56 sshd\[17305\]: Failed password for root from 174.138.1.164 port 42270 ssh2\ show less
Brute-ForceSSH
Anonymous
2023-11-03T10:12:38.822179mdol-nethserver.dargels.de sshd[26933]: Failed password for root from 174. ... show more2023-11-03T10:12:38.822179mdol-nethserver.dargels.de sshd[26933]: Failed password for root from 174.138.1.164 port 42436 ssh2
2023-11-03T10:12:37.593280mdol-nethserver.dargels.de sshd[26933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.1.164 user=root
2023-11-03T10:12:38.822179mdol-nethserver.dargels.de sshd[26933]: Failed password for root from 174.138.1.164 port 42436 ssh2
2023-11-03T10:14:02.752512mdol-nethserver.dargels.de sshd[28317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.1.164 user=root
2023-11-03T10:14:04.317426mdol-nethserver.dargels.de sshd[28317]: Failed password for root from 174.138.1.164 port 42760 ssh2
... show less
Nov 3 10:36:11 server2 sshd\[19580\]: User root from 174.138.1.164 not allowed because not listed i ... show moreNov 3 10:36:11 server2 sshd\[19580\]: User root from 174.138.1.164 not allowed because not listed in AllowUsers
Nov 3 10:37:53 server2 sshd\[19729\]: User root from 174.138.1.164 not allowed because not listed in AllowUsers
Nov 3 10:39:11 server2 sshd\[19842\]: User root from 174.138.1.164 not allowed because not listed in AllowUsers
Nov 3 10:40:26 server2 sshd\[20091\]: User root from 174.138.1.164 not allowed because not listed in AllowUsers
Nov 3 10:41:41 server2 sshd\[20204\]: User root from 174.138.1.164 not allowed because not listed in AllowUsers
Nov 3 10:42:50 server2 sshd\[20297\]: User root from 174.138.1.164 not allowed because not listed in AllowUsers show less
Brute-Force
Anonymous
2023-11-03T09:38:26.405383mdol-nethserver.dargels.de sshd[10364]: Failed password for root from 174. ... show more2023-11-03T09:38:26.405383mdol-nethserver.dargels.de sshd[10364]: Failed password for root from 174.138.1.164 port 39032 ssh2
2023-11-03T09:39:42.556970mdol-nethserver.dargels.de sshd[10848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.1.164 user=root
2023-11-03T09:39:44.654636mdol-nethserver.dargels.de sshd[10848]: Failed password for root from 174.138.1.164 port 53200 ssh2
2023-11-03T09:40:57.679832mdol-nethserver.dargels.de sshd[11548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.1.164 user=root
2023-11-03T09:40:59.742102mdol-nethserver.dargels.de sshd[11548]: Failed password for root from 174.138.1.164 port 48792 ssh2
... show less
2023-11-03T07:57:37.790947ipam sshd[145022]: Failed password for root from 174.138.1.164 port 55364 ... show more2023-11-03T07:57:37.790947ipam sshd[145022]: Failed password for root from 174.138.1.164 port 55364 ssh2
2023-11-03T07:58:47.247400ipam sshd[145037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.1.164 user=root
2023-11-03T07:58:48.983753ipam sshd[145037]: Failed password for root from 174.138.1.164 port 35182 ssh2
2023-11-03T08:00:01.710750ipam sshd[145057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.1.164 user=root
2023-11-03T08:00:03.936810ipam sshd[145057]: Failed password for root from 174.138.1.164 port 37014 ssh2
... show less
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2023-11-03T07:12:44Z and 2023-11- ... show moreCowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2023-11-03T07:12:44Z and 2023-11-03T07:24:31Z show less
Nov 3 08:14:19 jane sshd[1669710]: Failed password for root from 174.138.1.164 port 50764 ssh2<br / ... show moreNov 3 08:14:19 jane sshd[1669710]: Failed password for root from 174.138.1.164 port 50764 ssh2
Nov 3 08:15:32 jane sshd[1670895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.1.164 user=root
Nov 3 08:15:35 jane sshd[1670895]: Failed password for root from 174.138.1.164 port 32790 ssh2
... show less
2023-11-03T06:43:03.293262docker sshd[2350315]: Disconnected from authenticating user root 174.138.1 ... show more2023-11-03T06:43:03.293262docker sshd[2350315]: Disconnected from authenticating user root 174.138.1.164 port 38972 [preauth]
... show less