This IP address has been reported a total of 2,376
times from 709 distinct
sources.
189.50.215.129 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Nov 9 05:53:15 adycoaduanas sshd[3791808]: Failed password for invalid user root from 189.50.215.12 ... show moreNov 9 05:53:15 adycoaduanas sshd[3791808]: Failed password for invalid user root from 189.50.215.129 port 49168 ssh2
Nov 9 05:55:37 adycoaduanas sshd[3793378]: User root from 189.50.215.129 not allowed because not listed in AllowUsers
Nov 9 05:55:37 adycoaduanas sshd[3793378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=root
Nov 9 05:55:38 adycoaduanas sshd[3793378]: Failed password for invalid user root from 189.50.215.129 port 45772 ssh2
Nov 9 05:57:58 adycoaduanas sshd[3794725]: User root from 189.50.215.129 not allowed because not listed in AllowUsers
... show less
Nov 8 21:39:02 b146-33 sshd[1608638]: Failed password for root from 189.50.215.129 port 33448 ssh2< ... show moreNov 8 21:39:02 b146-33 sshd[1608638]: Failed password for root from 189.50.215.129 port 33448 ssh2
Nov 8 21:41:32 b146-33 sshd[1609164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=root
Nov 8 21:41:34 b146-33 sshd[1609164]: Failed password for root from 189.50.215.129 port 54642 ssh2
... show less
Nov 9 05:35:46 adycoaduanas sshd[3781007]: Failed password for invalid user root from 189.50.215.12 ... show moreNov 9 05:35:46 adycoaduanas sshd[3781007]: Failed password for invalid user root from 189.50.215.129 port 54768 ssh2
Nov 9 05:38:46 adycoaduanas sshd[3782875]: User root from 189.50.215.129 not allowed because not listed in AllowUsers
Nov 9 05:38:46 adycoaduanas sshd[3782875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=root
Nov 9 05:38:48 adycoaduanas sshd[3782875]: Failed password for invalid user root from 189.50.215.129 port 37788 ssh2
Nov 9 05:41:17 adycoaduanas sshd[3784444]: User root from 189.50.215.129 not allowed because not listed in AllowUsers
... show less
Nov 9 03:58:57 s1 sshd[270639]: Invalid user jic from 189.50.215.129 port 44016
Nov 9 04:01: ... show moreNov 9 03:58:57 s1 sshd[270639]: Invalid user jic from 189.50.215.129 port 44016
Nov 9 04:01:34 s1 sshd[270937]: Invalid user escobar from 189.50.215.129 port 34152
Nov 9 04:04:03 s1 sshd[271195]: Invalid user jodelle from 189.50.215.129 port 38734
Nov 9 04:06:18 s1 sshd[271379]: Invalid user forbes from 189.50.215.129 port 52990
Nov 9 04:08:34 s1 sshd[271655]: Invalid user fluffy from 189.50.215.129 port 49490 show less
2024-11-09T03:59:14.308598+00:00 edge-fog-bcn01.int.pdx.net.uk sshd[1687758]: Invalid user jic from ... show more2024-11-09T03:59:14.308598+00:00 edge-fog-bcn01.int.pdx.net.uk sshd[1687758]: Invalid user jic from 189.50.215.129 port 52218
2024-11-09T04:01:44.546563+00:00 edge-fog-bcn01.int.pdx.net.uk sshd[1688305]: Invalid user escobar from 189.50.215.129 port 52580
2024-11-09T04:04:13.486272+00:00 edge-fog-bcn01.int.pdx.net.uk sshd[1688834]: Invalid user jodelle from 189.50.215.129 port 39530
... show less
Nov 9 03:58:16 GT sshd[339403]: Failed password for invalid user jic from 189.50.215.129 port 46216 ... show moreNov 9 03:58:16 GT sshd[339403]: Failed password for invalid user jic from 189.50.215.129 port 46216 ssh2
Nov 9 04:01:06 GT sshd[339447]: Invalid user escobar from 189.50.215.129 port 35678
Nov 9 04:01:06 GT sshd[339447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129
Nov 9 04:01:08 GT sshd[339447]: Failed password for invalid user escobar from 189.50.215.129 port 35678 ssh2
Nov 9 04:03:36 GT sshd[339451]: Invalid user jodelle from 189.50.215.129 port 54124
... show less
Nov 9 03:58:32 fail2ban sshd[1028798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreNov 9 03:58:32 fail2ban sshd[1028798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129
Nov 9 03:58:33 fail2ban sshd[1028798]: Failed password for invalid user jic from 189.50.215.129 port 40766 ssh2
... show less
Nov 9 03:39:26 sshd[1059169]: Disconnected from authenticating user XXXX 189.50.215.129 port 50968 [ ... show moreNov 9 03:39:26 sshd[1059169]: Disconnected from authenticating user XXXX 189.50.215.129 port 50968 [preauth] show less
Nov 9 03:19:26 sshd[1058623]: Disconnected from authenticating user XXXX 189.50.215.129 port 47458 [ ... show moreNov 9 03:19:26 sshd[1058623]: Disconnected from authenticating user XXXX 189.50.215.129 port 47458 [preauth]
Nov 9 03:22:16 sshd[1058706]: Disconnected from authenticating user XXXX 189.50.215.129 port 33140 [preauth] show less
2024-11-09T03:01:08.736028+00:00 hikari-starfire sshd[450111]: Invalid user remote4 from 189.50.215. ... show more2024-11-09T03:01:08.736028+00:00 hikari-starfire sshd[450111]: Invalid user remote4 from 189.50.215.129 port 35404
2024-11-09T03:03:34.385425+00:00 hikari-starfire sshd[450193]: Invalid user whsmeeting from 189.50.215.129 port 49420
2024-11-09T03:05:58.452042+00:00 hikari-starfire sshd[450303]: Invalid user clouding from 189.50.215.129 port 38502
2024-11-09T03:08:20.303114+00:00 hikari-starfire sshd[450377]: Invalid user constancio from 189.50.215.129 port 33272
2024-11-09T03:10:44.576194+00:00 hikari-starfire sshd[450491]: Invalid user ea24 from 189.50.215.129 port 57866
... show less