This IP address has been reported a total of 43
times from 35 distinct
sources.
212.64.199.194 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jan 6 22:02:01 vpn sshd[25280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreJan 6 22:02:01 vpn sshd[25280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.199.194 user=root
Jan 6 22:02:02 vpn sshd[25280]: Failed password for root from 212.64.199.194 port 35938 ssh2
Jan 6 22:02:55 vpn sshd[25308]: Invalid user dmp from 212.64.199.194 port 60530
Jan 6 22:02:55 vpn sshd[25308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.199.194
Jan 6 22:02:57 vpn sshd[25308]: Failed password for invalid user dmp from 212.64.199.194 port 60530 ssh2 show less
Brute-ForceSSH
Anonymous
"Unauthorized connection attempt on SSHD detected"
2025-01-06T20:34:40.823056+00:00 my-vps sshd[441462]: Failed password for invalid user rishi from 21 ... show more2025-01-06T20:34:40.823056+00:00 my-vps sshd[441462]: Failed password for invalid user rishi from 212.64.199.194 port 57514 ssh2
2025-01-06T20:38:17.040532+00:00 my-vps sshd[441474]: Invalid user josue from 212.64.199.194 port 58956
2025-01-06T20:38:17.043487+00:00 my-vps sshd[441474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.199.194
2025-01-06T20:38:19.615664+00:00 my-vps sshd[441474]: Failed password for invalid user josue from 212.64.199.194 port 58956 ssh2
2025-01-06T20:38:56.058190+00:00 my-vps sshd[441482]: Invalid user system from 212.64.199.194 port 44244
... show less
2025-01-06T19:25:10.114723instance-20240913-2123 sshd[671562]: Invalid user ca from 212.64.199.194 p ... show more2025-01-06T19:25:10.114723instance-20240913-2123 sshd[671562]: Invalid user ca from 212.64.199.194 port 49458
2025-01-06T19:27:12.172265instance-20240913-2123 sshd[677815]: Invalid user report from 212.64.199.194 port 55824
2025-01-06T19:28:06.890389instance-20240913-2123 sshd[680943]: Invalid user consultor from 212.64.199.194 port 60632
2025-01-06T19:29:00.878220instance-20240913-2123 sshd[683557]: Invalid user zcm from 212.64.199.194 port 35158
2025-01-06T19:30:57.486524instance-20240913-2123 sshd[689810]: Invalid user jkkim from 212.64.199.194 port 43686
... show less
Jan 6 19:17:53 h3buntu sshd[2702520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreJan 6 19:17:53 h3buntu sshd[2702520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.199.194
Jan 6 19:17:55 h3buntu sshd[2702520]: Failed password for invalid user fabrice from 212.64.199.194 port 37406 ssh2
Jan 6 19:19:05 h3buntu sshd[2702900]: Invalid user shoutcast from 212.64.199.194 port 39002
... show less
2025-01-06T18:24:27.850984+01:00 hz-vm-web-024 sshd[900221]: pam_unix(sshd:auth): authentication fai ... show more2025-01-06T18:24:27.850984+01:00 hz-vm-web-024 sshd[900221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.199.194
2025-01-06T18:24:29.491567+01:00 hz-vm-web-024 sshd[900221]: Failed password for invalid user test from 212.64.199.194 port 49164 ssh2
2025-01-06T18:25:02.097990+01:00 hz-vm-web-024 sshd[901609]: Invalid user rudi from 212.64.199.194 port 48986
2025-01-06T18:25:02.100229+01:00 hz-vm-web-024 sshd[901609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.199.194
2025-01-06T18:25:04.212487+01:00 hz-vm-web-024 sshd[901609]: Failed password for invalid user rudi from 212.64.199.194 port 48986 ssh2 show less
Jan 6 16:50:58 hecnet-us-east-gw sshd[103156]: pam_unix(sshd:auth): authentication failure; logname ... show moreJan 6 16:50:58 hecnet-us-east-gw sshd[103156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.199.194 user=root
Jan 6 16:51:00 hecnet-us-east-gw sshd[103156]: Failed password for invalid user root from 212.64.199.194 port 45924 ssh2
Jan 6 16:51:00 hecnet-us-east-gw sshd[103156]: Disconnected from invalid user root 212.64.199.194 port 45924 [preauth]
... show less
Brute-Force
Anonymous
Blocked by UFW (TCP on 2222)
Source port: 37876
TTL: 40
Packet length: 60
TO ... show moreBlocked by UFW (TCP on 2222)
Source port: 37876
TTL: 40
Packet length: 60
TOS: 0x14
This report (for 212.64.199.194) was generated by:
https://github.com/sefinek/UFW-AbuseIPDB-Reporter show less
Jan 6 10:53:54 us-mfl-02 sshd[3394346]: Invalid user redash from 212.64.199.194 port 49650
.. ... show moreJan 6 10:53:54 us-mfl-02 sshd[3394346]: Invalid user redash from 212.64.199.194 port 49650
... show less