This IP address has been reported a total of 2,539
times from 93 distinct
sources.
202.190.50.129 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-09-10T02:13:35.437460+00:00 vultrregeneration0 sshd[223319]: Invalid user revvy from 202.190.50 ... show more2024-09-10T02:13:35.437460+00:00 vultrregeneration0 sshd[223319]: Invalid user revvy from 202.190.50.129 port 37803
2024-09-10T02:13:35.842568+00:00 vultrregeneration0 sshd[223319]: Connection closed by invalid user revvy 202.190.50.129 port 37803 [preauth]
... show less
Sep 9 22:43:06 odin sshd[6247]: Failed password for root from 202.190.50.129 port 19245 ssh2
... show moreSep 9 22:43:06 odin sshd[6247]: Failed password for root from 202.190.50.129 port 19245 ssh2
Sep 9 22:48:06 odin sshd[7368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.129
Sep 9 22:48:07 odin sshd[7368]: Failed password for invalid user powerball from 202.190.50.129 port 44881 ssh2 show less
2024-09-09T17:09:58.791826+02:00 mail sshd[2006168]: User root from 202.190.50.129 not allowed becau ... show more2024-09-09T17:09:58.791826+02:00 mail sshd[2006168]: User root from 202.190.50.129 not allowed because not listed in AllowUsers
... show less
Brute-ForceSSH
Anonymous
202.190.50.129 (MY/Malaysia/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; ... show more202.190.50.129 (MY/Malaysia/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 9 09:05:29 server2 sshd[26719]: Failed password for root from 42.200.78.78 port 52416 ssh2
Sep 9 09:07:23 server2 sshd[27240]: Failed password for root from 148.66.132.204 port 35432 ssh2
Sep 9 09:04:45 server2 sshd[26360]: Failed password for root from 187.251.123.104 port 35354 ssh2
Sep 9 09:04:59 server2 sshd[26379]: Failed password for root from 58.215.203.139 port 56476 ssh2
Sep 9 09:06:01 server2 sshd[26842]: Failed password for root from 202.190.50.129 port 12198 ssh2
IP Addresses Blocked:
42.200.78.78 (HK/Hong Kong/-)
148.66.132.204 (SG/Singapore/-)
187.251.123.104 (MX/Mexico/-)
58.215.203.139 (CN/China/-) show less
Sep 9 04:44:16 webcore sshd[2523005]: Invalid user 123marketing from 202.190.50.129 port 52616<br / ... show moreSep 9 04:44:16 webcore sshd[2523005]: Invalid user 123marketing from 202.190.50.129 port 52616
Sep 9 04:44:16 webcore sshd[2523005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.129
Sep 9 04:44:18 webcore sshd[2523005]: Failed password for invalid user 123marketing from 202.190.50.129 port 52616 ssh2
Sep 9 08:02:15 webcore sshd[2738760]: Invalid user dwmp from 202.190.50.129 port 43866
... show less
2024-09-09T04:01:46.497124+00:00 gouda sshd[32555]: Invalid user bitcoinstickers from 202.190.50.129 ... show more2024-09-09T04:01:46.497124+00:00 gouda sshd[32555]: Invalid user bitcoinstickers from 202.190.50.129 port 50267
... show less