This IP address has been reported a total of 95
times from 73 distinct
sources.
213.199.49.110 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 2 09:05:11 fedi sshd[3617914]: Invalid user ubuntu from 213.199.49.110 port 40560
Oct 2 ... show moreOct 2 09:05:11 fedi sshd[3617914]: Invalid user ubuntu from 213.199.49.110 port 40560
Oct 2 09:06:38 fedi sshd[3618001]: Invalid user ubuntu from 213.199.49.110 port 40700
... show less
Oct 2 01:45:42 server01 sshd[7143]: Failed password for root from 213.199.49.110 port 47936 ssh2<br ... show moreOct 2 01:45:42 server01 sshd[7143]: Failed password for root from 213.199.49.110 port 47936 ssh2
Oct 2 01:47:25 server01 sshd[7222]: Failed password for root from 213.199.49.110 port 48004 ssh2
... show less
2024-10-02T10:47:08.407167+02:00 pokevador sshd[59122]: Failed password for root from 213.199.49.110 ... show more2024-10-02T10:47:08.407167+02:00 pokevador sshd[59122]: Failed password for root from 213.199.49.110 port 44390 ssh2
2024-10-02T10:47:51.216549+02:00 pokevador sshd[59488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
2024-10-02T10:47:52.988675+02:00 pokevador sshd[59488]: Failed password for root from 213.199.49.110 port 44444 ssh2
... show less
Oct 2 08:54:09 serv248043 sshd[1228595]: Invalid user ubuntu from 213.199.49.110 port 44544
. ... show moreOct 2 08:54:09 serv248043 sshd[1228595]: Invalid user ubuntu from 213.199.49.110 port 44544
... show less
Oct 2 08:30:47 h18 sshd[2914658]: Failed password for root from 213.199.49.110 port 34790 ssh2<br / ... show moreOct 2 08:30:47 h18 sshd[2914658]: Failed password for root from 213.199.49.110 port 34790 ssh2
Oct 2 08:31:29 h18 sshd[2914736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 08:31:30 h18 sshd[2914736]: Failed password for root from 213.199.49.110 port 34856 ssh2
Oct 2 08:32:12 h18 sshd[2914851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 08:32:15 h18 sshd[2914851]: Failed password for root from 213.199.49.110 port 34926 ssh2
... show less
(sshd) Failed SSH login from 213.199.49.110 (DE/Germany/vmi2015567.contaboserver.net): ; Ports: *; D ... show more(sshd) Failed SSH login from 213.199.49.110 (DE/Germany/vmi2015567.contaboserver.net): ; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 1 23:27:59 temporary sshd[1890642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root show less
Brute-ForceSSH
Anonymous
Oct 2 03:17:23 ica-cluster sshd[3532768]: Failed password for root from 213.199.49.110 port 35270 s ... show moreOct 2 03:17:23 ica-cluster sshd[3532768]: Failed password for root from 213.199.49.110 port 35270 ssh2
Oct 2 03:18:02 ica-cluster sshd[3532797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 03:18:04 ica-cluster sshd[3532797]: Failed password for root from 213.199.49.110 port 35330 ssh2
Oct 2 03:18:46 ica-cluster sshd[3532840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 03:18:48 ica-cluster sshd[3532840]: Failed password for root from 213.199.49.110 port 35394 ssh2
... show less