This IP address has been reported a total of 181
times from 129 distinct
sources.
194.163.166.12 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-19T13:28:46.285665+02:00 coffeelake sshd[1169296]: Invalid user jack from 194.163.166.12 por ... show more2024-09-19T13:28:46.285665+02:00 coffeelake sshd[1169296]: Invalid user jack from 194.163.166.12 port 45360
2024-09-19T13:32:54.918564+02:00 coffeelake sshd[1176229]: Invalid user user12 from 194.163.166.12 port 45504
2024-09-19T13:33:48.935371+02:00 coffeelake sshd[1177788]: Invalid user yang from 194.163.166.12 port 45544
2024-09-19T13:34:42.923616+02:00 coffeelake sshd[1179533]: Invalid user shiny from 194.163.166.12 port 45586
2024-09-19T13:35:36.885771+02:00 coffeelake sshd[1180795]: Invalid user ubuntu from 194.163.166.12 port 45626
... show less
2024-09-19T06:23:36.865645-04:00 prod-1 sshd[363742]: Disconnected from authenticating user root 194 ... show more2024-09-19T06:23:36.865645-04:00 prod-1 sshd[363742]: Disconnected from authenticating user root 194.163.166.12 port 47634 [preauth]
2024-09-19T06:28:09.307536-04:00 prod-1 sshd[364355]: Invalid user git from 194.163.166.12 port 47920
2024-09-19T06:28:09.431366-04:00 prod-1 sshd[364355]: Disconnected from invalid user git 194.163.166.12 port 47920 [preauth]
2024-09-19T06:28:51.185065-04:00 prod-1 sshd[364433]: Invalid user geonode from 194.163.166.12 port 47988
2024-09-19T06:28:51.372262-04:00 prod-1 sshd[364433]: Disconnected from invalid user geonode 194.163.166.12 port 47988 [preauth]
... show less
Sep 19 10:28:19 dabeau sshd[29988]: Invalid user git from 194.163.166.12 port 39540
Sep 19 10: ... show moreSep 19 10:28:19 dabeau sshd[29988]: Invalid user git from 194.163.166.12 port 39540
Sep 19 10:28:19 dabeau sshd[29988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.166.12
Sep 19 10:28:22 dabeau sshd[29988]: Failed password for invalid user git from 194.163.166.12 port 39540 ssh2
... show less
Brute-ForceSSH
Anonymous
194.163.166.12 (DE/Germany/-), 7 distributed sshd attacks on account [root] in the last 3600 secs; P ... show more194.163.166.12 (DE/Germany/-), 7 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 19 06:23:25 server2 sshd[3265]: Failed password for root from 164.163.98.49 port 52160 ssh2
Sep 19 06:21:44 server2 sshd[2773]: Failed password for root from 164.163.98.49 port 39369 ssh2
Sep 19 06:21:44 server2 sshd[2771]: Failed password for root from 139.59.234.19 port 56172 ssh2
Sep 19 06:22:29 server2 sshd[2998]: Failed password for root from 139.59.234.19 port 39796 ssh2
Sep 19 06:23:38 server2 sshd[3370]: Failed password for root from 201.32.178.190 port 42801 ssh2
Sep 19 06:23:40 server2 sshd[3382]: Failed password for root from 194.163.166.12 port 55430 ssh2
Sep 19 06:22:35 server2 sshd[3013]: Failed password for root from 164.163.98.49 port 45764 ssh2
IP Addresses Blocked:
164.163.98.49 (BR/Brazil/-)
139.59.234.19 (SG/Singapore/-)
201.32.178.190 (BR/Brazil/-) show less
[rede-arem1] (sshd) Failed SSH login from 194.163.166.12 (DE/Germany/vmd148899.contaboserver.net): 5 ... show more[rede-arem1] (sshd) Failed SSH login from 194.163.166.12 (DE/Germany/vmd148899.contaboserver.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 19 06:58:54 sshd[31064]: Failed password for [USERNAME] from 194.163.166.12 port 47398 ssh2
Sep 19 07:04:33 sshd[31359]: Failed password for [USERNAME] from 194.163.166.12 port 47664 ssh2
Sep 19 07:05:12 sshd[31406]: Failed password for [USERNAME] from 194.163.166.12 port 47718 ssh2
Sep 19 07:05:52 sshd[31518]: Failed password for [USERNAME] from 194.163.166.12 port 47774 ssh2
Sep 19 07:06:33 sshd[31688]: Invalid user [USERNAME] from 194.163.166.12 port 47830 show less
ssh login attempt Port [22] Username [root] Password [Abc@2020]
SSH
Anonymous
6 failed SSH login attempts between Thu, 19 Sep 2024 11:21:34 +0200 and Thu, 19 Sep 2024 11:26:27 +0 ... show more6 failed SSH login attempts between Thu, 19 Sep 2024 11:21:34 +0200 and Thu, 19 Sep 2024 11:26:27 +0200, port 22. show less
Brute-ForceSSH
Anonymous
2024-09-19T11:02:47+02:00 lb-2 sshd[22560]: Failed password for invalid user odoo from 194.163.166.1 ... show more2024-09-19T11:02:47+02:00 lb-2 sshd[22560]: Failed password for invalid user odoo from 194.163.166.12 port 60526 ssh2
2024-09-19T11:07:27+02:00 lb-2 sshd[22780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.166.12 user=root
2024-09-19T11:07:29+02:00 lb-2 sshd[22780]: Failed password for root from 194.163.166.12 port 60830 ssh2
2024-09-19T11:08:12+02:00 lb-2 sshd[22864]: Invalid user test from 194.163.166.12 port 60908
... show less
Sep 19 10:39:02 root sshd[2659925]: Failed password for invalid user odoo from 194.163.166.12 port 3 ... show moreSep 19 10:39:02 root sshd[2659925]: Failed password for invalid user odoo from 194.163.166.12 port 38164 ssh2
Sep 19 10:43:51 root sshd[2660455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.166.12 user=root
Sep 19 10:43:53 root sshd[2660455]: Failed password for root from 194.163.166.12 port 38388 ssh2
Sep 19 10:44:36 root sshd[2660656]: Invalid user test from 194.163.166.12 port 38462
... show less