This IP address has been reported a total of 404
times from 207 distinct
sources.
217.107.34.21 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2023-10-26T08:13:35.064417+08:00 kh-cfw-hk sshd[45043]: Invalid user doadmin from 217.107.34.21 port ... show more2023-10-26T08:13:35.064417+08:00 kh-cfw-hk sshd[45043]: Invalid user doadmin from 217.107.34.21 port 50360
... show less
Oct 25 22:56:56 monitoring sshd[3714481]: Failed password for root from 217.107.34.21 port 54852 ssh ... show moreOct 25 22:56:56 monitoring sshd[3714481]: Failed password for root from 217.107.34.21 port 54852 ssh2
Oct 25 22:58:11 monitoring sshd[3714857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 22:58:13 monitoring sshd[3714857]: Failed password for root from 217.107.34.21 port 44018 ssh2
Oct 25 22:59:57 monitoring sshd[3715258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 22:59:59 monitoring sshd[3715258]: Failed password for root from 217.107.34.21 port 46564 ssh2
... show less
Oct 25 22:40:39 monitoring sshd[3710364]: Failed password for root from 217.107.34.21 port 52818 ssh ... show moreOct 25 22:40:39 monitoring sshd[3710364]: Failed password for root from 217.107.34.21 port 52818 ssh2
Oct 25 22:41:57 monitoring sshd[3710703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 22:42:00 monitoring sshd[3710703]: Failed password for root from 217.107.34.21 port 48130 ssh2
Oct 25 22:43:20 monitoring sshd[3711069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 22:43:21 monitoring sshd[3711069]: Failed password for root from 217.107.34.21 port 42954 ssh2
... show less
Oct 25 22:10:47 monitoring sshd[3702744]: Failed password for root from 217.107.34.21 port 53548 ssh ... show moreOct 25 22:10:47 monitoring sshd[3702744]: Failed password for root from 217.107.34.21 port 53548 ssh2
Oct 25 22:12:15 monitoring sshd[3703139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 22:12:17 monitoring sshd[3703139]: Failed password for root from 217.107.34.21 port 34786 ssh2
Oct 25 22:13:31 monitoring sshd[3703443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 22:13:33 monitoring sshd[3703443]: Failed password for root from 217.107.34.21 port 54126 ssh2
... show less
Oct 25 21:54:42 monitoring sshd[3698699]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreOct 25 21:54:42 monitoring sshd[3698699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 21:54:43 monitoring sshd[3698699]: Failed password for root from 217.107.34.21 port 56996 ssh2
Oct 25 21:55:58 monitoring sshd[3698993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 21:55:59 monitoring sshd[3698993]: Failed password for root from 217.107.34.21 port 47896 ssh2
Oct 25 21:57:31 monitoring sshd[3699386]: Invalid user teste from 217.107.34.21 port 34544
... show less
Oct 25 20:50:20 Neko sshd[1198633]: Failed password for invalid user admin from 217.107.34.21 port 3 ... show moreOct 25 20:50:20 Neko sshd[1198633]: Failed password for invalid user admin from 217.107.34.21 port 35526 ssh2
Oct 25 20:52:48 Neko sshd[1202594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.107.34.21 user=root
Oct 25 20:52:50 Neko sshd[1202594]: Failed password for root from 217.107.34.21 port 57396 ssh2
... show less
2023-10-25T20:54:45.968994server03-k3s.crazycraftland.net sshd[1761866]: User root from 217.107.34.2 ... show more2023-10-25T20:54:45.968994server03-k3s.crazycraftland.net sshd[1761866]: User root from 217.107.34.21 not allowed because not listed in AllowUsers
2023-10-25T20:57:46.989015server03-k3s.crazycraftland.net sshd[1762553]: User root from 217.107.34.21 not allowed because not listed in AllowUsers
2023-10-25T20:58:57.864281server03-k3s.crazycraftland.net sshd[1762810]: User root from 217.107.34.21 not allowed because not listed in AllowUsers
... show less
2023-10-25T20:15:37.081752asociados1 sshd[451854]: Invalid user testsftp from 217.107.34.21 port 507 ... show more2023-10-25T20:15:37.081752asociados1 sshd[451854]: Invalid user testsftp from 217.107.34.21 port 50780
2023-10-25T20:19:06.091267asociados1 sshd[738080]: Invalid user ubuntu from 217.107.34.21 port 60942
2023-10-25T20:22:37.759009asociados1 sshd[1028286]: Invalid user ubuntu from 217.107.34.21 port 47422
... show less
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2023-10-25T17:22:52Z and 2023-10- ... show moreCowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2023-10-25T17:22:52Z and 2023-10-25T17:35:47Z show less