This IP address has been reported a total of 95
times from 73 distinct
sources.
213.199.49.110 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 2 02:47:42 fshubvidspace sshd[2977323]: Failed password for root from 213.199.49.110 port 36614 ... show moreOct 2 02:47:42 fshubvidspace sshd[2977323]: Failed password for root from 213.199.49.110 port 36614 ssh2
Oct 2 02:48:22 fshubvidspace sshd[2977393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 02:48:24 fshubvidspace sshd[2977393]: Failed password for root from 213.199.49.110 port 36660 ssh2
Oct 2 02:49:04 fshubvidspace sshd[2977435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 02:49:07 fshubvidspace sshd[2977435]: Failed password for root from 213.199.49.110 port 36706 ssh2
... show less
Oct 2 02:13:37 nanopirate sshd[32299]: refused connect from vmi2015567.contaboserver.net (213.199.4 ... show moreOct 2 02:13:37 nanopirate sshd[32299]: refused connect from vmi2015567.contaboserver.net (213.199.49.110)
... show less
Oct 1 23:50:59 ubuntu2204 sshd[1172960]: Failed password for root from 213.199.49.110 port 52300 ss ... show moreOct 1 23:50:59 ubuntu2204 sshd[1172960]: Failed password for root from 213.199.49.110 port 52300 ssh2 show less
Oct 2 01:40:01 srv4 sshd[504770]: Failed password for root from 213.199.49.110 port 42128 ssh2<br / ... show moreOct 2 01:40:01 srv4 sshd[504770]: Failed password for root from 213.199.49.110 port 42128 ssh2
Oct 2 01:40:40 srv4 sshd[504776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 01:40:42 srv4 sshd[504776]: Failed password for root from 213.199.49.110 port 42174 ssh2
Oct 2 01:41:21 srv4 sshd[504805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 01:41:23 srv4 sshd[504805]: Failed password for root from 213.199.49.110 port 42218 ssh2
... show less
Report 1357507 with IP 2405057 for SSH brute-force attack by source 2399732 via ssh-honeypot/0.2.0+h ... show moreReport 1357507 with IP 2405057 for SSH brute-force attack by source 2399732 via ssh-honeypot/0.2.0+http show less
(sshd) Failed SSH login from 213.199.49.110 (DE/Germany/vmi2015567.contaboserver.net): 5 in the last ... show more(sshd) Failed SSH login from 213.199.49.110 (DE/Germany/vmi2015567.contaboserver.net): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 2 06:55:31 localhost sshd[2218832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 06:55:33 localhost sshd[2218832]: Failed password for root from 213.199.49.110 port 51810 ssh2
Oct 2 06:58:30 localhost sshd[2220267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root
Oct 2 06:58:31 localhost sshd[2220267]: Failed password for root from 213.199.49.110 port 51932 ssh2
Oct 2 06:59:13 localhost sshd[2220625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.199.49.110 user=root show less