This IP address has been reported a total of 1,217
times from 564 distinct
sources.
195.199.135.219 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 14 23:27:07 dabeau sshd[5945]: Invalid user taesung from 195.199.135.219 port 55118
Oct 14 ... show moreOct 14 23:27:07 dabeau sshd[5945]: Invalid user taesung from 195.199.135.219 port 55118
Oct 14 23:27:07 dabeau sshd[5945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219
Oct 14 23:27:09 dabeau sshd[5945]: Failed password for invalid user taesung from 195.199.135.219 port 55118 ssh2
... show less
Oct 14 23:18:26 cloud-server-0 sshd[1964843]: Failed password for invalid user sammy from 195.199.13 ... show moreOct 14 23:18:26 cloud-server-0 sshd[1964843]: Failed password for invalid user sammy from 195.199.135.219 port 57826 ssh2
Oct 14 23:19:06 cloud-server-0 sshd[1964856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219 user=root
Oct 14 23:19:07 cloud-server-0 sshd[1964856]: Failed password for root from 195.199.135.219 port 34694 ssh2
Oct 14 23:20:02 cloud-server-0 sshd[1964859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219 user=root
Oct 14 23:20:04 cloud-server-0 sshd[1964859]: Failed password for root from 195.199.135.219 port 53086 ssh2
Oct 14 23:20:41 cloud-server-0 sshd[1964861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219 user=root
Oct 14 23:20:43 cloud-server-0 sshd[1964861]: Failed password for root from 195.199.135.219 port 56796 ssh2
Oct 14 23:21:21 cloud-server-0 sshd[1964863]: Invalid user user from 19
... show less
Fail2Ban automatic report:
SSH brute-force:
Oct 14 22:50:28 serw sshd[136918]: Disconnec ... show moreFail2Ban automatic report:
SSH brute-force:
Oct 14 22:50:28 serw sshd[136918]: Disconnected from authenticating user root 195.199.135.219 port 57928 [preauth]
Oct 14 22:52:57 serw sshd[136980]: Disconnected from authenticating user root 195.199.135.219 port 59278 [preauth]
Oct 14 22:53:43 serw sshd[137165]: Disconnected from authenticating user root 195.199.135.219 port 36314 [preauth] show less
2024-10-14T21:25:22.182864voip.dilenatech.com sshd[22532]: Failed password for invalid user yuyongch ... show more2024-10-14T21:25:22.182864voip.dilenatech.com sshd[22532]: Failed password for invalid user yuyongchao from 195.199.135.219 port 55806 ssh2
2024-10-14T21:27:13.980673voip.dilenatech.com sshd[22634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219 user=root
2024-10-14T21:27:15.319807voip.dilenatech.com sshd[22634]: Failed password for root from 195.199.135.219 port 59326 ssh2
... show less
2024-10-15T03:28:09.136810 jp3.cdn.420422709.xyz sshd[54511]: pam_unix(sshd:auth): authentication fa ... show more2024-10-15T03:28:09.136810 jp3.cdn.420422709.xyz sshd[54511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219 user=root
2024-10-15T03:28:10.943611 jp3.cdn.420422709.xyz sshd[54511]: Failed password for root from 195.199.135.219 port 35908 ssh2
2024-10-15T03:28:56.907695 jp3.cdn.420422709.xyz sshd[54553]: Invalid user git from 195.199.135.219 port 47284
... show less
2024-10-14T19:14:59.178284+00:00 Linux15 sshd[1761182]: pam_unix(sshd:auth): authentication failure; ... show more2024-10-14T19:14:59.178284+00:00 Linux15 sshd[1761182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219
2024-10-14T19:15:01.867422+00:00 Linux15 sshd[1761182]: Failed password for invalid user test from 195.199.135.219 port 46336 ssh2
2024-10-14T19:15:40.892352+00:00 Linux15 sshd[1763409]: Invalid user test from 195.199.135.219 port 53892
2024-10-14T19:15:40.894259+00:00 Linux15 sshd[1763409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219
2024-10-14T19:15:43.212439+00:00 Linux15 sshd[1763409]: Failed password for invalid user test from 195.199.135.219 port 53892 ssh2
2024-10-14T19:16:23.472066+00:00 Linux15 sshd[1765416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.199.135.219 user=root
2024-10-14T19:16:26.026096+00:00 Linux15 sshd[1765416]: Failed password for root from 195.199.135.219 port 48170 ssh2
2024-10-14T19:17:03.8
... show less