This IP address has been reported a total of 189
times from 56 distinct
sources.
202.190.50.219 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 14 15:36:44 hosting08 sshd[11056]: Failed password for root from 202.190.50.219 port 25445 ssh2< ... show moreOct 14 15:36:44 hosting08 sshd[11056]: Failed password for root from 202.190.50.219 port 25445 ssh2
Oct 14 15:39:41 hosting08 sshd[11436]: Failed password for root from 202.190.50.219 port 21609 ssh2
... show less
Brute-ForceSSH
Anonymous
202.190.50.219 (MY/Malaysia/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; ... show more202.190.50.219 (MY/Malaysia/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 14 09:36:23 server2 sshd[22075]: Failed password for root from 52.161.137.151 port 50768 ssh2
Oct 14 09:34:34 server2 sshd[21473]: Failed password for root from 162.19.48.19 port 46854 ssh2
Oct 14 09:34:52 server2 sshd[21610]: Failed password for root from 182.151.13.56 port 52234 ssh2
Oct 14 09:33:44 server2 sshd[21243]: Failed password for root from 181.23.60.79 port 39559 ssh2
Oct 14 09:34:59 server2 sshd[21628]: Failed password for root from 202.190.50.219 port 16639 ssh2
IP Addresses Blocked:
52.161.137.151 (US/United States/-)
162.19.48.19 (US/United States/-)
182.151.13.56 (CN/China/-)
181.23.60.79 (AR/Argentina/-) show less
Oct 14 04:28:02 ns sshd[4357]: Failed password for root from 202.190.50.219 port 25861 ssh2
Oc ... show moreOct 14 04:28:02 ns sshd[4357]: Failed password for root from 202.190.50.219 port 25861 ssh2
Oct 14 04:28:00 ns sshd[4357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 14 04:28:02 ns sshd[4357]: Failed password for root from 202.190.50.219 port 25861 ssh2
Oct 14 04:28:04 ns sshd[4357]: Connection closed by authenticating user root 202.190.50.219 port 25861 [preauth]
Oct 14 04:28:04 ns sshd[4357]: Connection closed by authenticating user root 202.190.50.219 port 25861 [preauth]
Oct 14 12:07:11 ns sshd[31267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 14 12:07:13 ns sshd[31267]: Failed password for root from 202.190.50.219 port 35263 ssh2
... show less
Oct 14 09:40:22 webcore sshd[427082]: Failed password for root from 202.190.50.219 port 64182 ssh2<b ... show moreOct 14 09:40:22 webcore sshd[427082]: Failed password for root from 202.190.50.219 port 64182 ssh2
Oct 14 09:59:22 webcore sshd[430710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 14 09:59:24 webcore sshd[430710]: Failed password for root from 202.190.50.219 port 47189 ssh2
Oct 14 10:16:03 webcore sshd[434234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
Oct 14 10:16:04 webcore sshd[434234]: Failed password for root from 202.190.50.219 port 45472 ssh2
... show less
2024-10-14T07:15:10.859319+00:00 gouda sshd[164464]: pam_unix(sshd:auth): authentication failure; lo ... show more2024-10-14T07:15:10.859319+00:00 gouda sshd[164464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
2024-10-14T07:15:12.450171+00:00 gouda sshd[164464]: Failed password for root from 202.190.50.219 port 8637 ssh2
... show less
Brute-Force
Anonymous
202.190.50.219 (MY/Malaysia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; ... show more202.190.50.219 (MY/Malaysia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 14 02:51:18 server5 sshd[20676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.228.123 user=root
Oct 14 02:51:20 server5 sshd[20676]: Failed password for root from 168.167.228.123 port 17131 ssh2
Oct 14 02:50:14 server5 sshd[20579]: Failed password for root from 100.42.184.121 port 56498 ssh2
Oct 14 02:51:10 server5 sshd[20663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.112.4 user=root
Oct 14 02:51:12 server5 sshd[20663]: Failed password for root from 121.11.112.4 port 48444 ssh2
Oct 14 02:51:26 server5 sshd[20692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.190.50.219 user=root
IP Addresses Blocked:
168.167.228.123 (BW/Botswana/-)
100.42.184.121 (US/United States/-)
121.11.112.4 (CN/China/-) show less
Brute-Force
Anonymous
Oct 14 07:57:22 hosting08 sshd[6228]: Failed password for root from 202.190.50.219 port 62212 ssh2<b ... show moreOct 14 07:57:22 hosting08 sshd[6228]: Failed password for root from 202.190.50.219 port 62212 ssh2
Oct 14 08:00:12 hosting08 sshd[7035]: Failed password for root from 202.190.50.219 port 41413 ssh2
... show less