This IP address has been reported a total of 263
times from 136 distinct
sources.
212.22.85.13 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jan 26 03:03:39 Debian-1202-bookworm-amd64-base sshd[3497017]: pam_unix(sshd:auth): authentication f ... show moreJan 26 03:03:39 Debian-1202-bookworm-amd64-base sshd[3497017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.22.85.13 user=root
Jan 26 03:03:41 Debian-1202-bookworm-amd64-base sshd[3497017]: Failed password for root from 212.22.85.13 port 59744 ssh2
Jan 26 03:03:41 Debian-1202-bookworm-amd64-base sshd[3497046]: Invalid user hive from 212.22.85.13 port 59760
Jan 26 03:03:40 Debian-1202-bookworm-amd64-base sshd[3497035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.22.85.13
Jan 26 03:03:42 Debian-1202-bookworm-amd64-base sshd[3497035]: Failed password for invalid user pi from 212.22.85.13 port 59754 ssh2
... show less
Jan 26 02:34:06 amk sshd\[24849\]: Failed password for root from 212.22.85.13 port 60300 ssh2Jan 26 ... show moreJan 26 02:34:06 amk sshd\[24849\]: Failed password for root from 212.22.85.13 port 60300 ssh2Jan 26 02:36:38 amk sshd\[24928\]: Invalid user pi from 212.22.85.13
... show less
Jan 26 00:28:30 sanyalnet-oracle-vps2 sshd[982108]: pam_unix(sshd:auth): authentication failure; log ... show moreJan 26 00:28:30 sanyalnet-oracle-vps2 sshd[982108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.22.85.13 user=root
Jan 26 00:28:32 sanyalnet-oracle-vps2 sshd[982108]: Failed none for invalid user root from 212.22.85.13 port 49474 ssh2
Jan 26 00:28:36 sanyalnet-oracle-vps2 sshd[982108]: Failed password for invalid user root from 212.22.85.13 port 49474 ssh2
... show less
2025-01-25T21:31:41.648088+01:00 ns402 sshd[430643]: Failed password for root from 212.22.85.13 port ... show more2025-01-25T21:31:41.648088+01:00 ns402 sshd[430643]: Failed password for root from 212.22.85.13 port 59048 ssh2
2025-01-25T21:31:43.402406+01:00 ns402 sshd[430643]: Connection closed by authenticating user root 212.22.85.13 port 59048 [preauth]
2025-01-25T21:31:43.432922+01:00 ns402 sshd[430651]: Invalid user hive from 212.22.85.13 port 59064
2025-01-25T21:31:41.474200+01:00 ns402 sshd[430647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.22.85.13
2025-01-25T21:31:43.770283+01:00 ns402 sshd[430647]: Failed password for invalid user pi from 212.22.85.13 port 59062 ssh2
2025-01-25T21:31:45.357057+01:00 ns402 sshd[430670]: Invalid user git from 212.22.85.13 port 59074
2025-01-25T21:31:43.489070+01:00 ns402 sshd[430651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.22.85.13
2025-01-25T21:31:46.060798+01:00 ns402 sshd[430651]: Failed password for invalid user hive from 212.22.85.13 port 59064 ssh
... show less
Jan 25 14:45:09 h2930838 sshd[32757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreJan 25 14:45:09 h2930838 sshd[32757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.22.85.13
Jan 25 14:45:11 h2930838 sshd[32757]: Failed password for invalid user weblogic from 212.22.85.13 port 37432 ssh2 show less
Jan 25 14:24:33 h2930838 sshd[31867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreJan 25 14:24:33 h2930838 sshd[31867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.22.85.13 user=root
Jan 25 14:24:35 h2930838 sshd[31867]: Failed password for invalid user root from 212.22.85.13 port 41826 ssh2 show less