This IP address has been reported a total of 191
times from 57 distinct
sources.
202.190.50.219 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 15 04:57:30 zadana sshd[309146]: Invalid user serviceflow from 202.190.50.219 port 43439
. ... show moreOct 15 04:57:30 zadana sshd[309146]: Invalid user serviceflow from 202.190.50.219 port 43439
... show less
Oct 15 03:14:42 ns sshd[4289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tt ... show moreOct 15 03:14:42 ns sshd[4289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 15 03:14:43 ns sshd[4289]: Failed password for root from 202.190.50.219 port 29932 ssh2
Oct 15 03:14:43 ns sshd[4289]: Connection closed by authenticating user root 202.190.50.219 port 29932 [preauth]
Oct 15 03:14:43 ns sshd[4289]: Connection closed by authenticating user root 202.190.50.219 port 29932 [preauth]
... show less
Oct 14 **REMOVED** sshd[742976]: Failed password for root from 202.190.50.219 port 18133 ssh2
... show moreOct 14 **REMOVED** sshd[742976]: Failed password for root from 202.190.50.219 port 18133 ssh2
Oct 14 **REMOVED** sshd[747291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 14 **REMOVED** sshd[747291]: Failed password for root from 202.190.50.219 port 11436 ssh2 show less
Oct 14 22:40:15 webcore sshd[594635]: Failed password for root from 202.190.50.219 port 40641 ssh2<b ... show moreOct 14 22:40:15 webcore sshd[594635]: Failed password for root from 202.190.50.219 port 40641 ssh2
Oct 15 00:31:46 webcore sshd[615715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 15 00:31:48 webcore sshd[615715]: Failed password for root from 202.190.50.219 port 5445 ssh2
Oct 15 00:57:54 webcore sshd[620270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 15 00:57:57 webcore sshd[620270]: Failed password for root from 202.190.50.219 port 13252 ssh2
... show less
Brute-ForceSSH
Anonymous
Oct 14 23:21:26 hosting08 sshd[4818]: Failed password for root from 202.190.50.219 port 29759 ssh2<b ... show moreOct 14 23:21:26 hosting08 sshd[4818]: Failed password for root from 202.190.50.219 port 29759 ssh2
Oct 14 23:24:12 hosting08 sshd[5151]: Failed password for root from 202.190.50.219 port 24451 ssh2
... show less
Oct 14 12:07:15 ns sshd[31267]: Connection closed by authenticating user root 202.190.50.219 port 35 ... show moreOct 14 12:07:15 ns sshd[31267]: Connection closed by authenticating user root 202.190.50.219 port 35263 [preauth]
Oct 14 19:59:22 ns sshd[16855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 14 19:59:24 ns sshd[16855]: Failed password for root from 202.190.50.219 port 34665 ssh2
Oct 14 19:59:22 ns sshd[16855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 14 19:59:24 ns sshd[16855]: Failed password for root from 202.190.50.219 port 34665 ssh2
Oct 14 19:59:25 ns sshd[16855]: Connection closed by authenticating user root 202.190.50.219 port 34665 [preauth]
... show less