This IP address has been reported a total of 2,338
times from 704 distinct
sources.
189.50.215.129 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-12-05T22:58:43.255340+00:00 monteroespinosa-sql sshd[2677379]: Invalid user adit from 189.50.21 ... show more2024-12-05T22:58:43.255340+00:00 monteroespinosa-sql sshd[2677379]: Invalid user adit from 189.50.215.129 port 53734
2024-12-05T23:02:11.700039+00:00 monteroespinosa-sql sshd[2817351]: Invalid user tracker from 189.50.215.129 port 53714
2024-12-05T23:04:25.576660+00:00 monteroespinosa-sql sshd[2817432]: Invalid user zhanghui from 189.50.215.129 port 58000
... show less
Brute-Force
Anonymous
2024-12-06T00:04:28.543011+02:00 microfood-srv sshd[1277307]: Invalid user st3 from 189.50.215.129 p ... show more2024-12-06T00:04:28.543011+02:00 microfood-srv sshd[1277307]: Invalid user st3 from 189.50.215.129 port 39156
2024-12-06T00:06:10.760590+02:00 microfood-srv sshd[1278278]: Invalid user elb from 189.50.215.129 port 52878
2024-12-06T00:07:50.011876+02:00 microfood-srv sshd[1279136]: Invalid user st1 from 189.50.215.129 port 52662
... show less
Dec 5 21:57:17 lnxweb62 sshd[3933]: Invalid user gblanco from 189.50.215.129 port 43678
Dec ... show moreDec 5 21:57:17 lnxweb62 sshd[3933]: Invalid user gblanco from 189.50.215.129 port 43678
Dec 5 21:57:17 lnxweb62 sshd[3933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129
Dec 5 21:57:19 lnxweb62 sshd[3933]: Failed password for invalid user gblanco from 189.50.215.129 port 43678 ssh2
Dec 5 21:57:17 lnxweb62 sshd[3933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129
Dec 5 21:57:19 lnxweb62 sshd[3933]: Failed password for invalid user gblanco from 189.50.215.129 port 43678 ssh2
... show less
Dec 5 21:22:33 lnxweb62 sshd[19544]: Failed password for invalid user rogelio from 189.50.215.129 p ... show moreDec 5 21:22:33 lnxweb62 sshd[19544]: Failed password for invalid user rogelio from 189.50.215.129 port 54956 ssh2
Dec 5 21:22:33 lnxweb62 sshd[19544]: Disconnected from invalid user rogelio 189.50.215.129 port 54956 [preauth]
Dec 5 21:25:17 lnxweb62 sshd[20893]: Invalid user log from 189.50.215.129 port 39148
Dec 5 21:25:17 lnxweb62 sshd[20893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129
Dec 5 21:25:19 lnxweb62 sshd[20893]: Failed password for invalid user log from 189.50.215.129 port 39148 ssh2
... show less
2024-12-05T14:39:13.436716-05:00 ns05-a-ns-xyz sshd[3441654]: Failed password for root from 189.50.2 ... show more2024-12-05T14:39:13.436716-05:00 ns05-a-ns-xyz sshd[3441654]: Failed password for root from 189.50.215.129 port 45442 ssh2
2024-12-05T14:41:17.411343-05:00 ns05-a-ns-xyz sshd[3441674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=root
2024-12-05T14:41:19.592184-05:00 ns05-a-ns-xyz sshd[3441674]: Failed password for root from 189.50.215.129 port 34780 ssh2
2024-12-05T14:43:27.963447-05:00 ns05-a-ns-xyz sshd[3441695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=root
2024-12-05T14:43:29.657558-05:00 ns05-a-ns-xyz sshd[3441695]: Failed password for root from 189.50.215.129 port 43930 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-12-05T20:32:01.785451+01:00 svr10 sshd[2101457]: Disconnected from authenticating user root 189 ... show more2024-12-05T20:32:01.785451+01:00 svr10 sshd[2101457]: Disconnected from authenticating user root 189.50.215.129 port 59170 [preauth]
2024-12-05T20:36:12.642986+01:00 svr10 sshd[2104505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.215.129 user=root
2024-12-05T20:36:14.615800+01:00 svr10 sshd[2104505]: Failed password for root from 189.50.215.129 port 37968 ssh2
... show less
2024-12-05T18:17:05.454238+00:00 pesterchum sshd[152052]: Disconnected from authenticating user root ... show more2024-12-05T18:17:05.454238+00:00 pesterchum sshd[152052]: Disconnected from authenticating user root 189.50.215.129 port 58792 [preauth]
2024-12-05T18:20:33.125336+00:00 pesterchum sshd[152093]: Disconnected from authenticating user root 189.50.215.129 port 41512 [preauth]
2024-12-05T18:22:47.488176+00:00 pesterchum sshd[152122]: Disconnected from authenticating user root 189.50.215.129 port 43052 [preauth]
... show less