This IP address has been reported a total of 445
times from 249 distinct
sources.
195.133.221.94 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Sep 26 09:12:00 Failed password for invalid user root from 195.133.221.94 port 12719
Brute-ForceSSH
Anonymous
2024-09-26T11:09:46.622876+02:00 svr10 sshd[3696777]: pam_unix(sshd:auth): authentication failure; l ... show more2024-09-26T11:09:46.622876+02:00 svr10 sshd[3696777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.133.221.94
2024-09-26T11:09:48.955322+02:00 svr10 sshd[3696777]: Failed password for invalid user ubuntu from 195.133.221.94 port 20942 ssh2
2024-09-26T11:09:51.259204+02:00 svr10 sshd[3696777]: Disconnected from invalid user ubuntu 195.133.221.94 port 20942 [preauth]
... show less
Sep 25 12:42:15 srv3 sshd\[29242\]: Invalid user test from 195.133.221.94 port 28091
Sep 25 12 ... show moreSep 25 12:42:15 srv3 sshd\[29242\]: Invalid user test from 195.133.221.94 port 28091
Sep 25 12:42:15 srv3 sshd\[29242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.133.221.94
Sep 25 12:42:17 srv3 sshd\[29242\]: Failed password for invalid user test from 195.133.221.94 port 28091 ssh2
Sep 25 12:48:29 srv3 sshd\[29799\]: Invalid user testuser from 195.133.221.94 port 28092
Sep 25 12:48:29 srv3 sshd\[29799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.133.221.94
... show less
2024-09-25T07:58:36.304376mail sshd[2251763]: Invalid user reza from 195.133.221.94 port 49711 ... show more2024-09-25T07:58:36.304376mail sshd[2251763]: Invalid user reza from 195.133.221.94 port 49711
2024-09-25T07:58:36.307293mail sshd[2251763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.133.221.94
2024-09-25T07:58:37.798220mail sshd[2251763]: Failed password for invalid user reza from 195.133.221.94 port 49711 ssh2
... show less
2024-09-24T23:09:10.882011-06:00 yms sshd[158940]: Invalid user consulta from 195.133.221.94 port 14 ... show more2024-09-24T23:09:10.882011-06:00 yms sshd[158940]: Invalid user consulta from 195.133.221.94 port 14214
2024-09-24T23:09:11.195374-06:00 yms sshd[158940]: Disconnected from invalid user consulta 195.133.221.94 port 14214 [preauth]
... show less
2024-09-24T22:33:54.359679-06:00 yms sshd[3623000]: Disconnected from authenticating user root 195.1 ... show more2024-09-24T22:33:54.359679-06:00 yms sshd[3623000]: Disconnected from authenticating user root 195.133.221.94 port 14211 [preauth]
2024-09-24T22:39:59.165438-06:00 yms sshd[3803099]: Invalid user tomcat from 195.133.221.94 port 14212
2024-09-24T22:39:59.452392-06:00 yms sshd[3803099]: Disconnected from invalid user tomcat 195.133.221.94 port 14212 [preauth]
... show less