This IP address has been reported a total of 120
times from 74 distinct
sources.
191.96.206.50 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Feb 18 03:22:13 b146-InstructorA sshd[1227111]: pam_unix(sshd:auth): authentication failure; logname ... show moreFeb 18 03:22:13 b146-InstructorA sshd[1227111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.206.50
Feb 18 03:22:15 b146-InstructorA sshd[1227111]: Failed password for invalid user nick from 191.96.206.50 port 44556 ssh2
Feb 18 03:27:22 b146-InstructorA sshd[1227420]: Invalid user teamspeak from 191.96.206.50 port 49864
... show less
(sshd) Failed SSH login from 191.96.206.50 (HK/-/-): 5 in the last 3600 secs; Ports: *; Direction: i ... show more(sshd) Failed SSH login from 191.96.206.50 (HK/-/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 18 03:34:40 na-s3 sshd[1830012]: Invalid user changshuo from 191.96.206.50 port 42144
Feb 18 03:39:29 na-s3 sshd[1898409]: Invalid user va from 191.96.206.50 port 44036
Feb 18 03:40:53 na-s3 sshd[1915079]: Invalid user ikeda from 191.96.206.50 port 42244
Feb 18 03:42:10 na-s3 sshd[1930335]: Invalid user joanne from 191.96.206.50 port 40222
Feb 18 03:43:29 na-s3 sshd[1947196]: Invalid user kyt from 191.96.206.50 port 38342 show less
Feb 18 00:35:40 autolycus sshd[3760458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreFeb 18 00:35:40 autolycus sshd[3760458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.206.50
Feb 18 00:35:41 autolycus sshd[3760458]: Failed password for invalid user changshuo from 191.96.206.50 port 37562 ssh2
Feb 18 00:39:44 autolycus sshd[3762751]: Invalid user va from 191.96.206.50 port 60674
... show less
Feb 18 08:32:31 ubuntu sshd[352140]: Invalid user pendulum from 191.96.206.50 port 39190
Feb 1 ... show moreFeb 18 08:32:31 ubuntu sshd[352140]: Invalid user pendulum from 191.96.206.50 port 39190
Feb 18 08:35:11 ubuntu sshd[352207]: Invalid user bobi from 191.96.206.50 port 51482
Feb 18 08:36:53 ubuntu sshd[352216]: Invalid user librenms from 191.96.206.50 port 53598
Feb 18 08:38:41 ubuntu sshd[352244]: Invalid user bi from 191.96.206.50 port 55568
Feb 18 08:40:20 ubuntu sshd[352351]: Invalid user finance from 191.96.206.50 port 57550
Feb 18 08:42:05 ubuntu sshd[352358]: Invalid user neolinux from 191.96.206.50 port 59558
... show less
Brute-ForceSSH
Anonymous
2025-02-18T07:35:25.260649+00:00 TP72 sshd[3961532]: pam_unix(sshd:auth): authentication failure; lo ... show more2025-02-18T07:35:25.260649+00:00 TP72 sshd[3961532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.206.50
2025-02-18T07:35:27.980702+00:00 TP72 sshd[3961532]: Failed password for invalid user bobi from 191.96.206.50 port 34066 ssh2
2025-02-18T07:37:13.081602+00:00 TP72 sshd[3961995]: Invalid user librenms from 191.96.206.50 port 36204
2025-02-18T07:37:13.082875+00:00 TP72 sshd[3961995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.206.50
2025-02-18T07:37:15.295534+00:00 TP72 sshd[3961995]: Failed password for invalid user librenms from 191.96.206.50 port 36204 ssh2
2025-02-18T07:38:55.685625+00:00 TP72 sshd[3962430]: Invalid user bi from 191.96.206.50 port 38148
2025-02-18T07:38:55.686887+00:00 TP72 sshd[3962430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.206.50
2025-02-18T07:38:57.569097+00:00 TP72 sshd[3962430]: Failed
... show less
Log Entry: 2025-02-18T07:32:44517 abuse sshd[2159330]: Invalid user pendulum from 191.96.206.50 port ... show moreLog Entry: 2025-02-18T07:32:44517 abuse sshd[2159330]: Invalid user pendulum from 191.96.206.50 port 52808
Log Entry: 2025-02-18T07:35:15786 abuse sshd[2159549]: Invalid user bobi from 191.96.206.50 port 35370
Log Entry: 2025-02-18T07:36:58506 abuse sshd[2159705]: Invalid user librenms from 191.96.206.50 port 37464
Log Entry: ... show less
Feb 18 07:29:11 athena sshd[791876]: Failed password for invalid user docker from 191.96.206.50 port ... show moreFeb 18 07:29:11 athena sshd[791876]: Failed password for invalid user docker from 191.96.206.50 port 55240 ssh2
Feb 18 07:30:33 athena sshd[792481]: Invalid user mcbserver from 191.96.206.50 port 53316
Feb 18 07:30:33 athena sshd[792481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.206.50
Feb 18 07:30:36 athena sshd[792481]: Failed password for invalid user mcbserver from 191.96.206.50 port 53316 ssh2
Feb 18 07:31:59 athena sshd[793110]: Invalid user test from 191.96.206.50 port 51390
... show less
Feb 18 06:59:09 athena sshd[778806]: Failed password for invalid user vagrant from 191.96.206.50 por ... show moreFeb 18 06:59:09 athena sshd[778806]: Failed password for invalid user vagrant from 191.96.206.50 port 45104 ssh2
Feb 18 07:02:43 athena sshd[780331]: Invalid user ftpuser from 191.96.206.50 port 35046
Feb 18 07:02:43 athena sshd[780331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.206.50
Feb 18 07:02:45 athena sshd[780331]: Failed password for invalid user ftpuser from 191.96.206.50 port 35046 ssh2
Feb 18 07:04:15 athena sshd[780981]: Invalid user stack from 191.96.206.50 port 33298
... show less