This IP address has been reported a total of 230
times from 161 distinct
sources.
199.245.101.50 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Nov 14 03:29:16 neptune sshd[2242449]: Failed password for invalid user cassandra from 199.245.101.5 ... show moreNov 14 03:29:16 neptune sshd[2242449]: Failed password for invalid user cassandra from 199.245.101.50 port 40002 ssh2
Nov 14 03:33:13 neptune sshd[2242629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.245.101.50 user=root
Nov 14 03:33:14 neptune sshd[2242629]: Failed password for root from 199.245.101.50 port 34230 ssh2
... show less
Nov 14 09:30:18 localhost sshd[3896184]: Failed password for root from 199.245.101.50 port 41714 ssh ... show moreNov 14 09:30:18 localhost sshd[3896184]: Failed password for root from 199.245.101.50 port 41714 ssh2
... show less
2024-11-14T03:13:49.590265-05:00 site sshd[542291]: Invalid user zstack from 199.245.101.50 port 572 ... show more2024-11-14T03:13:49.590265-05:00 site sshd[542291]: Invalid user zstack from 199.245.101.50 port 57286
2024-11-14T03:22:50.677018-05:00 site sshd[542302]: Invalid user minecraft from 199.245.101.50 port 38878
2024-11-14T03:28:20.686215-05:00 site sshd[542354]: Invalid user test from 199.245.101.50 port 59042
... show less
2024-11-14T09:09:36.724823+01:00 srv2 sshd[2918547]: Failed password for invalid user services from ... show more2024-11-14T09:09:36.724823+01:00 srv2 sshd[2918547]: Failed password for invalid user services from 199.245.101.50 port 40498 ssh2
2024-11-14T09:19:45.782045+01:00 srv2 sshd[2922232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.245.101.50 user=root
2024-11-14T09:19:48.346407+01:00 srv2 sshd[2922232]: Failed password for root from 199.245.101.50 port 39978 ssh2
2024-11-14T09:27:15.129903+01:00 srv2 sshd[2924785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.245.101.50 user=root
2024-11-14T09:27:17.474988+01:00 srv2 sshd[2924785]: Failed password for root from 199.245.101.50 port 34812 ssh2
... show less
2024-11-14T07:32:56.503621+00:00 Linux09 sshd[3458789]: Failed password for root from 199.245.101.50 ... show more2024-11-14T07:32:56.503621+00:00 Linux09 sshd[3458789]: Failed password for root from 199.245.101.50 port 58852 ssh2
2024-11-14T07:40:48.062836+00:00 Linux09 sshd[3483182]: Invalid user groupd from 199.245.101.50 port 44050
2024-11-14T07:40:48.064987+00:00 Linux09 sshd[3483182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.245.101.50
2024-11-14T07:40:50.135278+00:00 Linux09 sshd[3483182]: Failed password for invalid user groupd from 199.245.101.50 port 44050 ssh2
2024-11-14T07:50:01.486924+00:00 Linux09 sshd[3510696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.245.101.50 user=root
2024-11-14T07:50:03.807558+00:00 Linux09 sshd[3510696]: Failed password for root from 199.245.101.50 port 49716 ssh2
2024-11-14T07:59:48.536602+00:00 Linux09 sshd[3540491]: Invalid user fm from 199.245.101.50 port 35052
2024-11-14T07:59:48.539238+00:00 Linux09 sshd[3540491]: pam_unix(sshd:auth): authentication fa
... show less