This IP address has been reported a total of 191
times from 57 distinct
sources.
202.190.50.219 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 15 22:53:31 vm20 sshd[778846]: Invalid user blacknellsatsea from 202.190.50.219 port 4263
... show moreOct 15 22:53:31 vm20 sshd[778846]: Invalid user blacknellsatsea from 202.190.50.219 port 4263
Oct 16 06:35:53 vm20 sshd[785775]: Invalid user blacknellsatsea from 202.190.50.219 port 3691
... show less
Oct 15 23:23:24 h2908150 sshd[2532748]: Invalid user mathe from 202.190.50.219 port 6666
Oct 1 ... show moreOct 15 23:23:24 h2908150 sshd[2532748]: Invalid user mathe from 202.190.50.219 port 6666
Oct 16 07:05:35 h2908150 sshd[2540474]: Connection from 202.190.50.219 port 29582 on 85.214.73.9 port 22 rdomain ""
Oct 16 07:05:36 h2908150 sshd[2540474]: Invalid user mathe from 202.190.50.219 port 29582
... show less
2024-10-16T04:01:44.895198+00:00 gouda sshd[1939840]: Invalid user bitcoinstickers from 202.190.50.2 ... show more2024-10-16T04:01:44.895198+00:00 gouda sshd[1939840]: Invalid user bitcoinstickers from 202.190.50.219 port 41841
... show less
Oct 16 04:53:00 dlcentre3 sshd[23923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreOct 16 04:53:00 dlcentre3 sshd[23923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219
Oct 16 04:53:03 dlcentre3 sshd[23923]: Failed password for invalid user distancelearningcentre from 202.190.50.219 port 6905 ssh2 show less
Oct 16 04:32:39 dlcentre3 sshd[18196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreOct 16 04:32:39 dlcentre3 sshd[18196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219
Oct 16 04:32:40 dlcentre3 sshd[18196]: Failed password for invalid user distancelearningcentre from 202.190.50.219 port 25322 ssh2 show less
Oct 16 05:18:10 nirox sshd[102945]: Invalid user enisosbajas from 202.190.50.219 port 31759
.. ... show moreOct 16 05:18:10 nirox sshd[102945]: Invalid user enisosbajas from 202.190.50.219 port 31759
... show less
2024-10-16T05:05:29.974444+02:00 Ariazonaa sshd[3795827]: Connection from 202.190.50.219 port 26229 ... show more2024-10-16T05:05:29.974444+02:00 Ariazonaa sshd[3795827]: Connection from 202.190.50.219 port 26229 on 45.145.40.148 port 22 rdomain ""
2024-10-16T05:05:30.714853+02:00 Ariazonaa sshd[3795827]: Invalid user tcpsyn from 202.190.50.219 port 26229
... show less
Brute-ForceSSH
Anonymous
Oct 16 04:44:15 hosting08 sshd[14722]: Failed password for zeepsmidse from 202.190.50.219 port 62449 ... show moreOct 16 04:44:15 hosting08 sshd[14722]: Failed password for zeepsmidse from 202.190.50.219 port 62449 ssh2
Oct 16 04:46:56 hosting08 sshd[14987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219
Oct 16 04:46:58 hosting08 sshd[14987]: Failed password for invalid user egbertduijn from 202.190.50.219 port 45737 ssh2
... show less