This IP address has been reported a total of 123
times from 92 distinct
sources.
212.132.116.129 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Report 1498144 with IP 2541050 for SSH brute-force attack by source 2536094 via ssh-honeypot/0.2.0+h ... show moreReport 1498144 with IP 2541050 for SSH brute-force attack by source 2536094 via ssh-honeypot/0.2.0+http show less
2024-12-10T02:31:42.385336-05:00 linux.430bc6.com sshd[304861]: User root from 212.132.116.129 not a ... show more2024-12-10T02:31:42.385336-05:00 linux.430bc6.com sshd[304861]: User root from 212.132.116.129 not allowed because not listed in AllowUsers
2024-12-10T02:31:42.393297-05:00 linux.430bc6.com sshd[304862]: User root from 212.132.116.129 not allowed because not listed in AllowUsers
... show less
2024-12-10T06:25:46.734062+00:00 gamevps sshd[1385956]: Failed password for root from 212.132.116.12 ... show more2024-12-10T06:25:46.734062+00:00 gamevps sshd[1385956]: Failed password for root from 212.132.116.129 port 38654 ssh2
2024-12-10T06:25:51.679230+00:00 gamevps sshd[1385958]: Invalid user pi from 212.132.116.129 port 38660
2024-12-10T06:25:51.774596+00:00 gamevps sshd[1385958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.132.116.129
2024-12-10T06:25:53.414364+00:00 gamevps sshd[1385958]: Failed password for invalid user pi from 212.132.116.129 port 38660 ssh2
2024-12-10T06:25:59.055712+00:00 gamevps sshd[1385962]: Invalid user hive from 212.132.116.129 port 60388
... show less
Dec 10 07:25:47 monitoring sshd[27586]: User root from 212.132.116.129 not allowed because none of u ... show moreDec 10 07:25:47 monitoring sshd[27586]: User root from 212.132.116.129 not allowed because none of user's groups are listed in AllowGroups
Dec 10 07:25:47 monitoring sshd[27586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.132.116.129 user=root
Dec 10 07:25:49 monitoring sshd[27586]: Failed password for invalid user root from 212.132.116.129 port 50676 ssh2
Dec 10 07:25:54 monitoring sshd[27599]: Connection from 212.132.116.129 port 41182 on 5.9.54.139 port 22 rdomain ""
Dec 10 07:25:54 monitoring sshd[27599]: Invalid user pi from 212.132.116.129 port 41182
... show less
Dec 9 23:20:13 mailman sshd[31408]: Failed password for root from 212.132.116.129 port 44052 ssh2<b ... show moreDec 9 23:20:13 mailman sshd[31408]: Failed password for root from 212.132.116.129 port 44052 ssh2
Dec 9 23:20:13 mailman sshd[31408]: Connection closed by 212.132.116.129 port 44052 [preauth]
Dec 9 23:22:46 mailman sshd[31595]: Invalid user pi from 212.132.116.129 port 55916 show less
2024-12-10T06:12:32.729232+01:00 aligw01.aneirin.net sshd-session[39582]: Failed password for root f ... show more2024-12-10T06:12:32.729232+01:00 aligw01.aneirin.net sshd-session[39582]: Failed password for root from 212.132.116.129 port 60392 ssh2
2024-12-10T06:12:34.093694+01:00 aligw01.aneirin.net sshd-session[39582]: Connection closed by authenticating user root 212.132.116.129 port 60392 [preauth]
2024-12-10T06:14:43.558314+01:00 aligw01.aneirin.net sshd-session[39592]: Invalid user pi from 212.132.116.129 port 33454
... show less
Dec 10 02:47:42 hms97855 sshd[345891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreDec 10 02:47:42 hms97855 sshd[345891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.132.116.129 user=root
Dec 10 02:47:44 hms97855 sshd[345891]: Failed password for root from 212.132.116.129 port 42774 ssh2
Dec 10 02:47:46 hms97855 sshd[345895]: Invalid user hive from 212.132.116.129 port 44198
Dec 10 02:47:44 hms97855 sshd[345893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.132.116.129
Dec 10 02:47:46 hms97855 sshd[345893]: Failed password for invalid user pi from 212.132.116.129 port 44190 ssh2
... show less
2024-12-10T05:26:42.452683pantelemone.ru sshd[2357612]: pam_unix(sshd:auth): authentication failure; ... show more2024-12-10T05:26:42.452683pantelemone.ru sshd[2357612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.132.116.129 user=root
2024-12-10T05:26:44.554225pantelemone.ru sshd[2357612]: Failed password for root from 212.132.116.129 port 59792 ssh2
2024-12-10T05:26:45.004742pantelemone.ru sshd[2357618]: Invalid user hive from 212.132.116.129 port 59364
2024-12-10T05:26:43.793637pantelemone.ru sshd[2357616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.132.116.129
2024-12-10T05:26:45.701414pantelemone.ru sshd[2357616]: Failed password for invalid user pi from 212.132.116.129 port 59352 ssh2
... show less
2024-12-10T08:48:18.034859 mail.atmatech.id sshd[3219309]: Failed password for root from 212.132.116 ... show more2024-12-10T08:48:18.034859 mail.atmatech.id sshd[3219309]: Failed password for root from 212.132.116.129 port 43770 ssh2
2024-12-10T08:50:41.666861 mail.atmatech.id sshd[3221838]: Invalid user pi from 212.132.116.129 port 33136
2024-12-10T08:50:42.700985 mail.atmatech.id sshd[3221840]: Invalid user hive from 212.132.116.129 port 33148
... show less