This IP address has been reported a total of 998
times from 140 distinct
sources.
191.252.194.212 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-01-10T23:59:15.829790+00:00 aegon-segurosaegon sshd[3498861]: Invalid user hu from 191.252.194. ... show more2025-01-10T23:59:15.829790+00:00 aegon-segurosaegon sshd[3498861]: Invalid user hu from 191.252.194.212 port 40144
2025-01-11T00:02:38.550693+00:00 aegon-segurosaegon sshd[3629806]: Invalid user postgres from 191.252.194.212 port 54632
2025-01-11T00:03:18.246030+00:00 aegon-segurosaegon sshd[3655235]: Invalid user intel from 191.252.194.212 port 49460
... show less
(sshd) Failed SSH login from 191.252.194.212 (BR/Brazil/vps48922.publiccloud.com.br): 5 in the last ... show more(sshd) Failed SSH login from 191.252.194.212 (BR/Brazil/vps48922.publiccloud.com.br): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Jan 11 07:58:33 localhost sshd[2631415]: Invalid user hu from 191.252.194.212 port 57758
Jan 11 07:58:33 localhost sshd[2631415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.194.212
Jan 11 07:58:34 localhost sshd[2631415]: Failed password for invalid user hu from 191.252.194.212 port 57758 ssh2
Jan 11 08:02:39 localhost sshd[2633920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.194.212 user=postgres
Jan 11 08:02:41 localhost sshd[2633920]: Failed password for postgres from 191.252.194.212 port 56032 ssh2 show less
2025-01-10T22:05:43.393424+00:00 widevents-nutridoc sshd[1466105]: Invalid user tpaterni from 191.25 ... show more2025-01-10T22:05:43.393424+00:00 widevents-nutridoc sshd[1466105]: Invalid user tpaterni from 191.252.194.212 port 33254
2025-01-10T22:08:19.011782+00:00 widevents-nutridoc sshd[1466268]: Invalid user activemq from 191.252.194.212 port 47606
2025-01-10T22:08:26.961553+00:00 widevents-nutridoc sshd[1466274]: Invalid user tutor from 191.252.194.212 port 47264
... show less
2025-01-10T20:28:41.838683 mybox.markdonnellyonline.com sshd[15545]: pam_unix(sshd:auth): authentica ... show more2025-01-10T20:28:41.838683 mybox.markdonnellyonline.com sshd[15545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.194.212
2025-01-10T20:28:43.194756 mybox.markdonnellyonline.com sshd[15545]: Failed password for invalid user santurtzi from 191.252.194.212 port 56136 ssh2
2025-01-10T20:28:44.015342 mybox.markdonnellyonline.com sshd[15545]: Disconnected from invalid user santurtzi 191.252.194.212 port 56136 [preauth]
... show less
2025-01-10T11:26:59.186769+00:00 ns375825 sshd[3400182]: Failed password for root from 191.252.194.2 ... show more2025-01-10T11:26:59.186769+00:00 ns375825 sshd[3400182]: Failed password for root from 191.252.194.212 port 38680 ssh2
2025-01-10T11:26:59.507713+00:00 ns375825 sshd[3400182]: Disconnected from authenticating user root 191.252.194.212 port 38680 [preauth]
... show less
Brute-ForceSSH
Anonymous
Invalid user seedbox from 191.252.194.212 port 36222
Brute-ForceSSH
Anonymous
Invalid user seedbox from 191.252.194.212 port 36222
Brute-ForceSSH
Anonymous
Invalid user seedbox from 191.252.194.212 port 36222