This IP address has been reported a total of 112
times from 70 distinct
sources.
23.99.198.242 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
SSH Brute Force 2021-10-19T02:18:37+02:00 sshd[9194]: Invalid user test from 23.99.198.242 port 4754 ... show moreSSH Brute Force 2021-10-19T02:18:37+02:00 sshd[9194]: Invalid user test from 23.99.198.242 port 47540
2021-10-19T02:25:57+02:00 sshd[9328]: Invalid user ftpadmin from 23.99.198.242 port 49928
2021-10-19T02:26:14+02:00 sshd[9330]: Invalid user postgres from 23.99.198.242 port 56822
2021-10-19T02:26:32+02:00 sshd[9332]: Invalid user teamspeak from 23.99.198.242 port 35424
2021-10-19T02:29:31+02:00 sshd[9436]: Invalid user lenovo from 23.99.198.242 port 47746
2021-10-19T02:29:50+02:00 sshd[9438]: Invalid user dmdba from 23.99.198.242 port 54596
2021-10-19T02:30:08+02:00 sshd[9440]: Invalid user dmdba from 23.99.198.242 port 33242
2021-10-19T03:24:14+02:00 sshd[16675]: Connection from 23.99.198.242 port 58680 on 146.102.18.7 port 22
2021-10-19T03:24:14+02:00 sshd[16675]: Invalid user debianuser from 23.99.198.242 port 58680
... show less
Oct 19 03:01:49 localhost sshd\[23620\]: Invalid user debianuser from 23.99.198.242
Oct 19 03: ... show moreOct 19 03:01:49 localhost sshd\[23620\]: Invalid user debianuser from 23.99.198.242
Oct 19 03:01:49 localhost sshd\[23620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.99.198.242
Oct 19 03:01:52 localhost sshd\[23620\]: Failed password for invalid user debianuser from 23.99.198.242 port 49344 ssh2
Oct 19 03:02:06 localhost sshd\[23622\]: Invalid user test from 23.99.198.242
Oct 19 03:02:06 localhost sshd\[23622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.99.198.242
... show less
Oct 19 04:01:49 solidvpn sshd\[3028\]: Invalid user debianuser from 23.99.198.242
Oct 19 04:01 ... show moreOct 19 04:01:49 solidvpn sshd\[3028\]: Invalid user debianuser from 23.99.198.242
Oct 19 04:01:49 solidvpn sshd\[3028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.99.198.242
Oct 19 04:01:51 solidvpn sshd\[3028\]: Failed password for invalid user debianuser from 23.99.198.242 port 54916 ssh2
Oct 19 04:02:06 solidvpn sshd\[3030\]: Invalid user test from 23.99.198.242
Oct 19 04:02:06 solidvpn sshd\[3030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.99.198.242
... show less
2021-10-18T20:01:42.743442-05:00 kitsunetech sshd[31422]: Invalid user debianuser from 23.99.198.242 ... show more2021-10-18T20:01:42.743442-05:00 kitsunetech sshd[31422]: Invalid user debianuser from 23.99.198.242 port 38028
... show less
Oct 19 01:37:20 roki2 sshd\[4496\]: Invalid user debianuser from 23.99.198.242
Oct 19 01:37:20 ... show moreOct 19 01:37:20 roki2 sshd\[4496\]: Invalid user debianuser from 23.99.198.242
Oct 19 01:37:20 roki2 sshd\[4496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.99.198.242
Oct 19 01:37:22 roki2 sshd\[4496\]: Failed password for invalid user debianuser from 23.99.198.242 port 40958 ssh2
Oct 19 01:37:36 roki2 sshd\[4536\]: Invalid user test from 23.99.198.242
Oct 19 01:37:36 roki2 sshd\[4536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.99.198.242
... show less
2021-10-19T01:17:43.752085littlecat-den sshd[61771]: Unable to negotiate with 23.99.198.242 port 535 ... show more2021-10-19T01:17:43.752085littlecat-den sshd[61771]: Unable to negotiate with 23.99.198.242 port 53548: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2021-10-19T01:18:01.080436littlecat-den sshd[61774]: Connection from 23.99.198.242 port 60146 on 65.21.147.83 port 22 rdomain ""
2021-10-19T01:18:01.216529littlecat-den sshd[61774]: Unable to negotiate with 23.99.198.242 port 60146: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2021-10-19T01:18:20.052958littlecat-den sshd[61776]: Connection from 23.99.198.242 port 38552 on 65.21.147.83 port 22 rdomain ""
2021-10-19T01:18:20.192822littlecat-den sshd[61776]: Unable to negotiate with 23.99.198.242 port 38552: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hell
... show less
Oct 18 23:15:46 ip-172-31-16-56 sshd\[24222\]: Invalid user debianuser from 23.99.198.242\
Oct ... show moreOct 18 23:15:46 ip-172-31-16-56 sshd\[24222\]: Invalid user debianuser from 23.99.198.242\
Oct 18 23:15:48 ip-172-31-16-56 sshd\[24222\]: Failed password for invalid user debianuser from 23.99.198.242 port 34582 ssh2\
Oct 18 23:16:03 ip-172-31-16-56 sshd\[24224\]: Invalid user test from 23.99.198.242\
Oct 18 23:16:05 ip-172-31-16-56 sshd\[24224\]: Failed password for invalid user test from 23.99.198.242 port 41210 ssh2\
Oct 18 23:16:21 ip-172-31-16-56 sshd\[24226\]: Failed password for root from 23.99.198.242 port 47822 ssh2\ show less