This IP address has been reported a total of 246
times from 173 distinct
sources.
194.34.134.56 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Attempts to access SSH server with wrong credentials
SSH
Anonymous
Oct 31 09:20:01 ubuntu sshd[59376]: Failed password for invalid user jiva from 194.34.134.56 port 50 ... show moreOct 31 09:20:01 ubuntu sshd[59376]: Failed password for invalid user jiva from 194.34.134.56 port 50200 ssh2
Oct 31 09:20:01 ubuntu sshd[59376]: Disconnected from invalid user jiva 194.34.134.56 port 50200 [preauth]
Oct 31 09:22:58 ubuntu sshd[59407]: Invalid user uno50 from 194.34.134.56 port 58504
Oct 31 09:22:58 ubuntu sshd[59407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.34.134.56
Oct 31 09:23:01 ubuntu sshd[59407]: Failed password for invalid user uno50 from 194.34.134.56 port 58504 ssh2
... show less
2024-10-31T08:59:35.686166+01:00 **** sshd[3476010]: Failed password for invalid user **** from 194. ... show more2024-10-31T08:59:35.686166+01:00 **** sshd[3476010]: Failed password for invalid user **** from 194.34.134.56 port 55802 ssh2
2024-10-31T09:01:13.043890+01:00 **** sshd[3480383]: Invalid user **** from 194.34.134.56 port 55026
2024-10-31T09:01:13.092975+01:00 **** sshd[3480384]: Invalid user **** from 194.34.134.56 port 55040
2024-10-31T09:01:13.045704+01:00 **** sshd[3480383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.34.134.56
2024-10-31T09:01:15.610143+01:00 **** sshd[3480383]: Failed password for invalid user **** from 194.34.134.56 port 55026 ssh2 show less
2024-10-31T07:46:32.563996+00:00 ccoo-fundacio-dev sshd[1276189]: Invalid user opchopra from 194.34. ... show more2024-10-31T07:46:32.563996+00:00 ccoo-fundacio-dev sshd[1276189]: Invalid user opchopra from 194.34.134.56 port 41518
2024-10-31T07:50:36.341535+00:00 ccoo-fundacio-dev sshd[1276440]: Invalid user kntan from 194.34.134.56 port 34052
2024-10-31T07:58:26.582935+00:00 ccoo-fundacio-dev sshd[1276937]: Invalid user evania from 194.34.134.56 port 53556
... show less
Oct 31 02:13:51 [redacted] sshd[29101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 31 02:13:51 [redacted] sshd[29101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.34.134.56
Oct 31 02:13:53 [redacted] sshd[29101]: Failed password for invalid user jxw from 194.34.134.56 port 43040 ssh2
Oct 31 02:13:53 [redacted] sshd[29101]: Disconnected from 194.34.134.56 port 43040 [preauth] show less
Oct 31 07:44:01 monitoring01 sshd[1967416]: Invalid user smolt from 194.34.134.56 port 39290
O ... show moreOct 31 07:44:01 monitoring01 sshd[1967416]: Invalid user smolt from 194.34.134.56 port 39290
Oct 31 07:47:54 monitoring01 sshd[1968219]: Invalid user seooh from 194.34.134.56 port 40334
Oct 31 07:49:50 monitoring01 sshd[1968447]: Invalid user wenrui from 194.34.134.56 port 39472
Oct 31 07:51:39 monitoring01 sshd[1969144]: Invalid user nmenezes from 194.34.134.56 port 42020
... show less
Oct 31 06:42:33 lewisgillcom sshd[2307596]: Failed password for invalid user smolt from 194.34.134.5 ... show moreOct 31 06:42:33 lewisgillcom sshd[2307596]: Failed password for invalid user smolt from 194.34.134.56 port 45942 ssh2
Oct 31 06:47:15 lewisgillcom sshd[2308555]: Invalid user seooh from 194.34.134.56 port 33312
Oct 31 06:47:15 lewisgillcom sshd[2308555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.34.134.56
Oct 31 06:47:16 lewisgillcom sshd[2308555]: Failed password for invalid user seooh from 194.34.134.56 port 33312 ssh2
Oct 31 06:49:19 lewisgillcom sshd[2308925]: Invalid user wenrui from 194.34.134.56 port 35340
... show less