This IP address has been reported a total of 189
times from 56 distinct
sources.
202.190.50.219 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-10-14T03:20:00.444370+02:00 mail sshd[940721]: User root from 202.190.50.219 not allowed becaus ... show more2024-10-14T03:20:00.444370+02:00 mail sshd[940721]: User root from 202.190.50.219 not allowed because not listed in AllowUsers
... show less
Oct 13 16:58:32 phoenix sshd[147719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreOct 13 16:58:32 phoenix sshd[147719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 13 16:58:34 phoenix sshd[147719]: Failed password for root from 202.190.50.219 port 10360 ssh2
... show less
SSH
Anonymous
Oct 14 00:19:27 hosting08 sshd[30047]: Failed password for root from 202.190.50.219 port 41167 ssh2< ... show moreOct 14 00:19:27 hosting08 sshd[30047]: Failed password for root from 202.190.50.219 port 41167 ssh2
Oct 14 00:22:12 hosting08 sshd[30429]: Failed password for root from 202.190.50.219 port 25998 ssh2
... show less
Oct 13 18:50:36 webcore sshd[26149]: Failed password for root from 202.190.50.219 port 29707 ssh2<br ... show moreOct 13 18:50:36 webcore sshd[26149]: Failed password for root from 202.190.50.219 port 29707 ssh2
Oct 13 19:07:11 webcore sshd[29153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 13 19:07:13 webcore sshd[29153]: Failed password for root from 202.190.50.219 port 23076 ssh2
Oct 13 21:09:44 webcore sshd[51139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 13 21:09:46 webcore sshd[51139]: Failed password for root from 202.190.50.219 port 16576 ssh2
... show less
Oct 13 05:42:47 ns sshd[8957]: Failed password for root from 202.190.50.219 port 24310 ssh2
Oc ... show moreOct 13 05:42:47 ns sshd[8957]: Failed password for root from 202.190.50.219 port 24310 ssh2
Oct 13 05:42:49 ns sshd[8957]: Connection closed by authenticating user root 202.190.50.219 port 24310 [preauth]
Oct 13 13:20:25 ns sshd[30488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 13 13:20:27 ns sshd[30488]: Failed password for root from 202.190.50.219 port 40119 ssh2
Oct 13 13:20:29 ns sshd[30488]: Connection closed by authenticating user root 202.190.50.219 port 40119 [preauth]
Oct 13 20:57:51 ns sshd[19132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 13 20:57:53 ns sshd[19132]: Failed password for root from 202.190.50.219 port 12525 ssh2
... show less