This IP address has been reported a total of 126
times from 18 distinct
sources.
213.202.212.117 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-08-09T09:04:14.093674+02:00 debv1 sshd[5094]: Invalid user ubuntu from 213.202.212.117 port 429 ... show more2024-08-09T09:04:14.093674+02:00 debv1 sshd[5094]: Invalid user ubuntu from 213.202.212.117 port 42984
2024-08-09T09:04:14.116842+02:00 debv1 sshd[5094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117
2024-08-09T09:04:15.447668+02:00 debv1 sshd[5094]: Failed password for invalid user ubuntu from 213.202.212.117 port 42984 ssh2
... show less
(sshd) Failed SSH login from 213.202.212.117 (DE/Germany/srv4.53cloud.de): 5 in the last 3600 secs; ... show more(sshd) Failed SSH login from 213.202.212.117 (DE/Germany/srv4.53cloud.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: 2024-08-09T05:27:58.063607+00:00 mc sshd[1195507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117 user=root
2024-08-09T05:28:00.118026+00:00 mc sshd[1195507]: Failed password for root from 213.202.212.117 port 41664 ssh2
2024-08-09T05:40:38.159663+00:00 mc sshd[1195776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117 user=root
2024-08-09T05:40:39.546842+00:00 mc sshd[1195776]: Failed password for root from 213.202.212.117 port 37774 ssh2
2024-08-09T05:53:17.975360+00:00 mc sshd[1196010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117 user=root show less
2024-08-09T07:05:32.630414+02:00 debv1 sshd[4519]: pam_unix(sshd:auth): authentication failure; logn ... show more2024-08-09T07:05:32.630414+02:00 debv1 sshd[4519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117
2024-08-09T07:05:34.233955+02:00 debv1 sshd[4519]: Failed password for invalid user ftpuser from 213.202.212.117 port 33296 ssh2
2024-08-09T07:07:03.271711+02:00 debv1 sshd[4526]: Invalid user ftpusr from 213.202.212.117 port 41930
... show less
Brute-ForceSSH
Anonymous
Aug 9 06:51:14 wm1 sshd[1266789]: Invalid user ftp123 from 213.202.212.117 port 57946
Aug 9 ... show moreAug 9 06:51:14 wm1 sshd[1266789]: Invalid user ftp123 from 213.202.212.117 port 57946
Aug 9 06:52:45 wm1 sshd[1266871]: Invalid user ftp1 from 213.202.212.117 port 59626
Aug 9 06:54:16 wm1 sshd[1267414]: Invalid user ftp2 from 213.202.212.117 port 33234
Aug 9 06:55:47 wm1 sshd[1267561]: Invalid user ftpadm from 213.202.212.117 port 33594
Aug 9 06:57:18 wm1 sshd[1267632]: Invalid user ftphome from 213.202.212.117 port 43650
... show less
2024-08-09T06:50:23.426725+02:00 debv1 sshd[4484]: Invalid user ftp from 213.202.212.117 port 52012< ... show more2024-08-09T06:50:23.426725+02:00 debv1 sshd[4484]: Invalid user ftp from 213.202.212.117 port 52012
2024-08-09T06:50:23.448712+02:00 debv1 sshd[4484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117
2024-08-09T06:50:25.263071+02:00 debv1 sshd[4484]: Failed password for invalid user ftp from 213.202.212.117 port 52012 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 9 06:31:33 wm1 sshd[1262542]: Invalid user user from 213.202.212.117 port 33234
Aug 9 06 ... show moreAug 9 06:31:33 wm1 sshd[1262542]: Invalid user user from 213.202.212.117 port 33234
Aug 9 06:33:04 wm1 sshd[1263284]: Invalid user user from 213.202.212.117 port 33576
Aug 9 06:34:35 wm1 sshd[1263370]: Invalid user user from 213.202.212.117 port 60936
Aug 9 06:37:36 wm1 sshd[1264109]: Invalid user test from 213.202.212.117 port 44186
Aug 9 06:39:07 wm1 sshd[1264983]: Invalid user forum from 213.202.212.117 port 40384
... show less
2024-08-09T06:33:44.317298+02:00 debv1 sshd[4448]: pam_unix(sshd:auth): authentication failure; logn ... show more2024-08-09T06:33:44.317298+02:00 debv1 sshd[4448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117
2024-08-09T06:33:46.321976+02:00 debv1 sshd[4448]: Failed password for invalid user user from 213.202.212.117 port 32924 ssh2
2024-08-09T06:35:15.031545+02:00 debv1 sshd[4450]: Invalid user user from 213.202.212.117 port 54574
... show less
Brute-ForceSSH
Anonymous
Aug 9 06:14:55 wm1 sshd[1259546]: Invalid user user from 213.202.212.117 port 60514
Aug 9 06 ... show moreAug 9 06:14:55 wm1 sshd[1259546]: Invalid user user from 213.202.212.117 port 60514
Aug 9 06:16:26 wm1 sshd[1259729]: Invalid user user from 213.202.212.117 port 40208
Aug 9 06:17:57 wm1 sshd[1259766]: Invalid user user from 213.202.212.117 port 58442
Aug 9 06:19:28 wm1 sshd[1260306]: Invalid user user from 213.202.212.117 port 41506
Aug 9 06:20:58 wm1 sshd[1260472]: Invalid user user from 213.202.212.117 port 36564
... show less
2024-08-09T06:17:06.015336+02:00 debv1 sshd[4403]: pam_unix(sshd:auth): authentication failure; logn ... show more2024-08-09T06:17:06.015336+02:00 debv1 sshd[4403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117
2024-08-09T06:17:08.675472+02:00 debv1 sshd[4403]: Failed password for invalid user user from 213.202.212.117 port 60152 ssh2
2024-08-09T06:18:36.830989+02:00 debv1 sshd[4405]: Invalid user user from 213.202.212.117 port 54028
... show less
2024-08-09T06:00:29.667636+02:00 debv1 sshd[4308]: Failed password for root from 213.202.212.117 por ... show more2024-08-09T06:00:29.667636+02:00 debv1 sshd[4308]: Failed password for root from 213.202.212.117 port 54980 ssh2
2024-08-09T06:01:58.544496+02:00 debv1 sshd[4319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117 user=root
2024-08-09T06:02:00.555479+02:00 debv1 sshd[4319]: Failed password for root from 213.202.212.117 port 42390 ssh2
... show less
2024-08-09T05:42:20.039475+02:00 debv1 sshd[4264]: Failed password for root from 213.202.212.117 por ... show more2024-08-09T05:42:20.039475+02:00 debv1 sshd[4264]: Failed password for root from 213.202.212.117 port 33138 ssh2
2024-08-09T05:43:48.908880+02:00 debv1 sshd[4267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117 user=root
2024-08-09T05:43:51.279608+02:00 debv1 sshd[4267]: Failed password for root from 213.202.212.117 port 37142 ssh2
... show less
2024-08-09T05:24:11.707220+02:00 debv1 sshd[4231]: Failed password for root from 213.202.212.117 por ... show more2024-08-09T05:24:11.707220+02:00 debv1 sshd[4231]: Failed password for root from 213.202.212.117 port 54832 ssh2
2024-08-09T05:25:40.171441+02:00 debv1 sshd[4233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117 user=root
2024-08-09T05:25:42.511415+02:00 debv1 sshd[4233]: Failed password for root from 213.202.212.117 port 42510 ssh2
... show less
2024-08-09T05:06:03.703216+02:00 debv1 sshd[4145]: Failed password for root from 213.202.212.117 por ... show more2024-08-09T05:06:03.703216+02:00 debv1 sshd[4145]: Failed password for root from 213.202.212.117 port 39970 ssh2
2024-08-09T05:07:32.025859+02:00 debv1 sshd[4148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117 user=root
2024-08-09T05:07:34.338314+02:00 debv1 sshd[4148]: Failed password for root from 213.202.212.117 port 41682 ssh2
... show less
2024-08-09T04:47:55.851325+02:00 debv1 sshd[4113]: Failed password for root from 213.202.212.117 por ... show more2024-08-09T04:47:55.851325+02:00 debv1 sshd[4113]: Failed password for root from 213.202.212.117 port 48634 ssh2
2024-08-09T04:49:24.586939+02:00 debv1 sshd[4115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.212.117 user=root
2024-08-09T04:49:26.867540+02:00 debv1 sshd[4115]: Failed password for root from 213.202.212.117 port 34870 ssh2
... show less