This IP address has been reported a total of 2,803
times from 611 distinct
sources.
202.4.102.249 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-07-10T14:38:15.207470+02:00 swsrv sshd[108570]: User root from 202.4.102.249 not allowed becaus ... show more2025-07-10T14:38:15.207470+02:00 swsrv sshd[108570]: User root from 202.4.102.249 not allowed because not listed in AllowUsers
2025-07-10T14:42:16.792958+02:00 swsrv sshd[108686]: User root from 202.4.102.249 not allowed because not listed in AllowUsers
2025-07-10T14:43:42.544902+02:00 swsrv sshd[108696]: User root from 202.4.102.249 not allowed because not listed in AllowUsers
2025-07-10T14:45:12.607940+02:00 swsrv sshd[108728]: User root from 202.4.102.249 not allowed because not listed in AllowUsers
... show less
Jul 10 11:08:09 instance1 sshd[894825]: Disconnected from authenticating user root 202.4.102.249 por ... show moreJul 10 11:08:09 instance1 sshd[894825]: Disconnected from authenticating user root 202.4.102.249 port 24922 [preauth]
... show less
Brute-ForceSSH
Anonymous
2025-07-10T09:44:11.809553+00:00 TP sshd[4054800]: pam_unix(sshd:auth): authentication failure; logn ... show more2025-07-10T09:44:11.809553+00:00 TP sshd[4054800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.4.102.249 user=root
2025-07-10T09:44:13.732540+00:00 TP sshd[4054800]: Failed password for root from 202.4.102.249 port 48575 ssh2
2025-07-10T09:45:36.214867+00:00 TP sshd[4055452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.4.102.249 user=root
2025-07-10T09:45:38.142256+00:00 TP sshd[4055452]: Failed password for root from 202.4.102.249 port 19514 ssh2
2025-07-10T09:47:02.945781+00:00 TP sshd[4056108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.4.102.249 user=root
2025-07-10T09:47:05.009392+00:00 TP sshd[4056108]: Failed password for root from 202.4.102.249 port 46960 ssh2
2025-07-10T09:48:32.654846+00:00 TP sshd[4056773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
... show less
2025-07-10T09:40:46.870461Charlie sshd[103712]: Failed password for root from 202.4.102.249 port 589 ... show more2025-07-10T09:40:46.870461Charlie sshd[103712]: Failed password for root from 202.4.102.249 port 58974 ssh2
2025-07-10T09:42:15.603782Charlie sshd[103769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.4.102.249 user=root
2025-07-10T09:42:17.602736Charlie sshd[103769]: Failed password for root from 202.4.102.249 port 29915 ssh2
2025-07-10T09:43:41.726014Charlie sshd[103839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.4.102.249 user=root
2025-07-10T09:43:43.865326Charlie sshd[103839]: Failed password for root from 202.4.102.249 port 57363 ssh2
... show less