This IP address has been reported a total of 191
times from 57 distinct
sources.
202.190.50.219 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-10-15T05:19:21.546026+00:00 gouda sshd[2770339]: Invalid user bitcoinstickers from 202.190.50.2 ... show more2024-10-15T05:19:21.546026+00:00 gouda sshd[2770339]: Invalid user bitcoinstickers from 202.190.50.219 port 51820
... show less
Oct 15 06:10:30 dlcentre3 sshd[6764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreOct 15 06:10:30 dlcentre3 sshd[6764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219
Oct 15 06:10:31 dlcentre3 sshd[6764]: Failed password for invalid user distancelearningcentre from 202.190.50.219 port 5772 ssh2 show less
2024-10-15T03:17:47.290019+03:00 zlydnev sshd[1376026]: Failed password for root from 202.190.50.219 ... show more2024-10-15T03:17:47.290019+03:00 zlydnev sshd[1376026]: Failed password for root from 202.190.50.219 port 55239 ssh2
2024-10-15T08:02:33.776800+03:00 zlydnev sshd[1393307]: Connection from 202.190.50.219 port 50628 on 5.252.118.130 port 22 rdomain ""
2024-10-15T08:02:34.447433+03:00 zlydnev sshd[1393307]: Invalid user zlydneva from 202.190.50.219 port 50628
2024-10-15T08:02:34.623269+03:00 zlydnev sshd[1393307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219
2024-10-15T08:02:36.210381+03:00 zlydnev sshd[1393307]: Failed password for invalid user zlydneva from 202.190.50.219 port 50628 ssh2
... show less
Oct 15 05:49:52 dlcentre3 sshd[2259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreOct 15 05:49:52 dlcentre3 sshd[2259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219
Oct 15 05:49:54 dlcentre3 sshd[2259]: Failed password for invalid user distancelearningcentre from 202.190.50.219 port 17131 ssh2 show less
Brute-ForceSSH
Anonymous
Oct 15 06:42:37 hosting08 sshd[32378]: Failed password for zeepsmidse from 202.190.50.219 port 37576 ... show moreOct 15 06:42:37 hosting08 sshd[32378]: Failed password for zeepsmidse from 202.190.50.219 port 37576 ssh2
Oct 15 06:45:28 hosting08 sshd[32700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219
Oct 15 06:45:30 hosting08 sshd[32700]: Failed password for invalid user egbertduijn from 202.190.50.219 port 10521 ssh2
... show less