This IP address has been reported a total of 202
times from 123 distinct
sources.
219.134.149.219 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 14 17:30:19 vps-9 sshd[2505596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreDec 14 17:30:19 vps-9 sshd[2505596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.134.149.219
Dec 14 17:30:21 vps-9 sshd[2505596]: Failed password for invalid user ernawati from 219.134.149.219 port 20574 ssh2
Dec 14 17:37:33 vps-9 sshd[2506914]: Invalid user hadoopuser from 219.134.149.219 port 24496
... show less
Dec 14 16:03:48 JMC sshd[1270534]: Invalid user lai from 219.134.149.219 port 22942
Dec 14 16: ... show moreDec 14 16:03:48 JMC sshd[1270534]: Invalid user lai from 219.134.149.219 port 22942
Dec 14 16:10:45 JMC sshd[1270674]: Invalid user hr from 219.134.149.219 port 22721
Dec 14 16:11:35 JMC sshd[1270698]: Invalid user ubuntu from 219.134.149.219 port 21127
... show less
2024-12-14T16:07:55.575925+00:00 cdn-nl sshd[3148926]: Invalid user lai from 219.134.149.219 port 22 ... show more2024-12-14T16:07:55.575925+00:00 cdn-nl sshd[3148926]: Invalid user lai from 219.134.149.219 port 22909
2024-12-14T16:10:53.451487+00:00 cdn-nl sshd[3149189]: Invalid user hr from 219.134.149.219 port 21487
2024-12-14T16:11:21.731172+00:00 cdn-nl sshd[3149281]: Invalid user sftpuser from 219.134.149.219 port 23443
... show less
Brute-ForceSSH
Anonymous
Dec 14 15:42:36 de-fra2-dns1 sshd[440222]: Invalid user hadoopuser from 219.134.149.219 port 21679<b ... show moreDec 14 15:42:36 de-fra2-dns1 sshd[440222]: Invalid user hadoopuser from 219.134.149.219 port 21679
Dec 14 15:51:58 de-fra2-dns1 sshd[440423]: Invalid user test1 from 219.134.149.219 port 21836
Dec 14 15:53:30 de-fra2-dns1 sshd[440448]: Invalid user wildfly from 219.134.149.219 port 23228
... show less
2024-12-14T15:37:32.307985+01:00 nirox sshd[233272]: Invalid user moodle from 219.134.149.219 port 2 ... show more2024-12-14T15:37:32.307985+01:00 nirox sshd[233272]: Invalid user moodle from 219.134.149.219 port 20970
... show less
Dec 14 14:06:37 web3 sshd[9737]: Failed password for invalid user wp from 219.134.149.219 port 24382 ... show moreDec 14 14:06:37 web3 sshd[9737]: Failed password for invalid user wp from 219.134.149.219 port 24382 ssh2
Dec 14 14:08:57 web3 sshd[9792]: Invalid user tttest from 219.134.149.219 port 23576
Dec 14 14:08:57 web3 sshd[9792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.134.149.219
Dec 14 14:08:59 web3 sshd[9792]: Failed password for invalid user tttest from 219.134.149.219 port 23576 ssh2
Dec 14 14:11:13 web3 sshd[9899]: Invalid user fb from 219.134.149.219 port 23764 show less
2024-12-14T13:03:18.519471+00:00 tkhaldi-remote-droplet sshd[1845338]: Invalid user cpc from 219.134 ... show more2024-12-14T13:03:18.519471+00:00 tkhaldi-remote-droplet sshd[1845338]: Invalid user cpc from 219.134.149.219 port 21378
2024-12-14T13:04:33.646527+00:00 tkhaldi-remote-droplet sshd[1845411]: Invalid user nexus from 219.134.149.219 port 22277
2024-12-14T13:05:19.008170+00:00 tkhaldi-remote-droplet sshd[1845464]: Invalid user ubuntu from 219.134.149.219 port 23863
... show less