This IP address has been reported a total of 2,340
times from 705 distinct
sources.
189.50.215.129 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-12-09T05:26:06.542578+01:00 ruddy-force sshd[1330244]: Failed password for invalid user vera fr ... show more2024-12-09T05:26:06.542578+01:00 ruddy-force sshd[1330244]: Failed password for invalid user vera from 189.50.215.129 port 58800 ssh2
2024-12-09T05:28:23.263001+01:00 ruddy-force sshd[1330280]: Invalid user us from 189.50.215.129 port 50640
2024-12-09T05:28:23.265789+01:00 ruddy-force sshd[1330280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129
2024-12-09T05:28:25.123281+01:00 ruddy-force sshd[1330280]: Failed password for invalid user us from 189.50.215.129 port 50640 ssh2
2024-12-09T05:30:43.309581+01:00 ruddy-force sshd[1330329]: Invalid user enrico from 189.50.215.129 port 38458
... show less
2024-12-07T14:45:02.453187+01:00 yucca sshd[480485]: Invalid user mercadeo from 189.50.215.129 port ... show more2024-12-07T14:45:02.453187+01:00 yucca sshd[480485]: Invalid user mercadeo from 189.50.215.129 port 59298
... show less
Dec 7 05:49:29 centrum sshd-session[8867]: Disconnected from authenticating user root 189.50.215.12 ... show moreDec 7 05:49:29 centrum sshd-session[8867]: Disconnected from authenticating user root 189.50.215.129 port 33348 [preauth]
Dec 7 05:52:56 centrum sshd-session[8993]: Disconnected from authenticating user root 189.50.215.129 port 42600 [preauth]
... show less
[rede-164-29] (sshd) Failed SSH login from 189.50.215.129 (BR/Brazil/-): 5 in the last 3600 secs; Po ... show more[rede-164-29] (sshd) Failed SSH login from 189.50.215.129 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 6 13:40:07 sshd[6096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=[USERNAME]
Dec 6 13:40:10 sshd[6096]: Failed password for [USERNAME] from 189.50.215.129 port 35334 ssh2
Dec 6 13:44:03 sshd[6203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=[USERNAME]
Dec 6 13:44:05 sshd[6203]: Failed password for [USERNAME] from 189.50.215.129 port 36816 ssh2
Dec 6 13:46:0 show less
Dec 3 23:23:10 check sshd[881924]: Invalid user sjt from 189.50.215.129 port 41726
Dec 3 23: ... show moreDec 3 23:23:10 check sshd[881924]: Invalid user sjt from 189.50.215.129 port 41726
Dec 3 23:27:57 check sshd[882070]: Invalid user dileep from 189.50.215.129 port 47732
Dec 3 23:30:00 check sshd[882103]: Invalid user john from 189.50.215.129 port 51110
... show less
[rede-176-124] (sshd) Failed SSH login from 189.50.215.129 (BR/Brazil/-): 5 in the last 3600 secs; P ... show more[rede-176-124] (sshd) Failed SSH login from 189.50.215.129 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 6 11:14:18 sshd[17351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=[USERNAME]
Dec 6 11:14:20 sshd[17351]: Failed password for [USERNAME] from 189.50.215.129 port 33362 ssh2
Dec 6 11:17:57 sshd[17431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=[USERNAME]
Dec 6 11:17:59 sshd[17431]: Failed password for [USERNAME] from 189.50.215.129 port 60204 ssh2
Dec 6 11: show less