This IP address has been reported a total of 189
times from 56 distinct
sources.
202.190.50.219 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
Oct 13 16:46:55 hosting08 sshd[21406]: Failed password for root from 202.190.50.219 port 18695 ssh2< ... show moreOct 13 16:46:55 hosting08 sshd[21406]: Failed password for root from 202.190.50.219 port 18695 ssh2
Oct 13 16:49:45 hosting08 sshd[21678]: Failed password for root from 202.190.50.219 port 58413 ssh2
... show less
202.190.50.219 (MY/Malaysia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; ... show more202.190.50.219 (MY/Malaysia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 13 10:48:48 server2 sshd[14320]: Failed password for root from 89.216.47.154 port 56913 ssh2
Oct 13 10:42:49 server2 sshd[11351]: Failed password for root from 91.207.115.249 port 51759 ssh2
Oct 13 10:42:49 server2 sshd[11351]: Failed password for root from 91.207.115.249 port 51759 ssh2
Oct 13 10:42:50 server2 sshd[11351]: Failed password for root from 91.207.115.249 port 51759 ssh2
Oct 13 10:45:16 server2 sshd[13049]: Failed password for root from 202.190.50.219 port 61222 ssh2
Oct 13 10:43:54 server2 sshd[12611]: Failed password for root from 106.225.167.89 port 52348 ssh2
IP Addresses Blocked:
89.216.47.154 (RS/Serbia/-)
91.207.115.249 (RU/Russia/-) show less
Oct 13 **REMOVED** sshd[717016]: Failed password for root from 202.190.50.219 port 39167 ssh2
... show moreOct 13 **REMOVED** sshd[717016]: Failed password for root from 202.190.50.219 port 39167 ssh2
Oct 13 **REMOVED** sshd[718310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 13 **REMOVED** sshd[718310]: Failed password for root from 202.190.50.219 port 27126 ssh2 show less
Brute-ForceSSH
Anonymous
Oct 13 09:12:22 hosting08 sshd[17048]: Failed password for root from 202.190.50.219 port 53416 ssh2< ... show moreOct 13 09:12:22 hosting08 sshd[17048]: Failed password for root from 202.190.50.219 port 53416 ssh2
Oct 13 09:15:07 hosting08 sshd[17633]: Failed password for root from 202.190.50.219 port 41954 ssh2
... show less
Oct 12 08:39:11 lab sshd[1314661]: Connection closed by authenticating user root 202.190.50.219 port ... show moreOct 12 08:39:11 lab sshd[1314661]: Connection closed by authenticating user root 202.190.50.219 port 53319 [preauth]
Oct 12 16:15:18 lab sshd[1315825]: Connection closed by authenticating user root 202.190.50.219 port 31350 [preauth]
Oct 12 23:50:17 lab sshd[1316812]: Connection closed by authenticating user root 202.190.50.219 port 44587 [preauth]
... show less
Oct 13 05:55:10 webcore sshd[1822715]: Failed password for root from 202.190.50.219 port 18910 ssh2< ... show moreOct 13 05:55:10 webcore sshd[1822715]: Failed password for root from 202.190.50.219 port 18910 ssh2
Oct 13 06:28:52 webcore sshd[1836184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 13 06:28:54 webcore sshd[1836184]: Failed password for root from 202.190.50.219 port 17522 ssh2
Oct 13 06:31:13 webcore sshd[1843260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 13 06:31:15 webcore sshd[1843260]: Failed password for root from 202.190.50.219 port 29314 ssh2
... show less