This IP address has been reported a total of 16,756
times from 1,367 distinct
sources.
36.64.68.99 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Detected multiple authentication failures and invalid user attempts from IP address 36.64.68.99 on [ ... show moreDetected multiple authentication failures and invalid user attempts from IP address 36.64.68.99 on [PT] Lis-29 Node. show less
2025-01-20T05:15:24.879901+00:00 mapir-proxmox sshd[3215253]: pam_unix(sshd:auth): authentication fa ... show more2025-01-20T05:15:24.879901+00:00 mapir-proxmox sshd[3215253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.64.68.99
2025-01-20T05:15:27.380981+00:00 mapir-proxmox sshd[3215253]: Failed password for invalid user qw from 36.64.68.99 port 51894 ssh2
2025-01-20T05:16:30.101858+00:00 mapir-proxmox sshd[3224490]: Invalid user aaaa from 36.64.68.99 port 54594
... show less
Jan 20 06:43:08 betelgeuse sshd[3161622]: Invalid user roott from 36.64.68.99 port 56960
Jan 2 ... show moreJan 20 06:43:08 betelgeuse sshd[3161622]: Invalid user roott from 36.64.68.99 port 56960
Jan 20 06:46:16 betelgeuse sshd[3231590]: Invalid user cacti from 36.64.68.99 port 45322
... show less
2025-01-20T04:23:29.345303+00:00 widevents-jornadastrasplantes sshd[2309078]: Invalid user thomas fr ... show more2025-01-20T04:23:29.345303+00:00 widevents-jornadastrasplantes sshd[2309078]: Invalid user thomas from 36.64.68.99 port 36250
2025-01-20T04:26:51.638101+00:00 widevents-jornadastrasplantes sshd[2309295]: Invalid user zmarin from 36.64.68.99 port 32780
2025-01-20T04:27:26.854064+00:00 widevents-jornadastrasplantes sshd[2309361]: Invalid user andrew from 36.64.68.99 port 54914
... show less
Jan 19 23:26:06 www4 sshd[3732336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreJan 19 23:26:06 www4 sshd[3732336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.64.68.99 user=root
Jan 19 23:26:08 www4 sshd[3732336]: Failed password for root from 36.64.68.99 port 48236 ssh2
Jan 19 23:26:42 www4 sshd[3732414]: Invalid user zmarin from 36.64.68.99 port 51640
Jan 19 23:26:42 www4 sshd[3732414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.64.68.99
Jan 19 23:26:44 www4 sshd[3732414]: Failed password for invalid user zmarin from 36.64.68.99 port 51640 ssh2
... show less
Jan 20 04:22:36 schenklradio sshd[1095130]: Invalid user server from 36.64.68.99 port 41602
Ja ... show moreJan 20 04:22:36 schenklradio sshd[1095130]: Invalid user server from 36.64.68.99 port 41602
Jan 20 04:26:17 schenklradio sshd[1095173]: Invalid user precio from 36.64.68.99 port 58756
Jan 20 04:27:36 schenklradio sshd[1095187]: Invalid user murali from 36.64.68.99 port 44828
Jan 20 04:28:08 schenklradio sshd[1095192]: Invalid user bitrix from 36.64.68.99 port 39314
Jan 20 04:28:39 schenklradio sshd[1095197]: Invalid user tidb from 36.64.68.99 port 58230
... show less
Jan 19 19:45:06 ssg-laptop sshd[267112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreJan 19 19:45:06 ssg-laptop sshd[267112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.64.68.99
Jan 19 19:45:08 ssg-laptop sshd[267112]: Failed password for invalid user sipv from 36.64.68.99 port 45294 ssh2
Jan 19 19:47:05 ssg-laptop sshd[267186]: Invalid user marco from 36.64.68.99 port 60142
... show less
Jan 20 10:35:45 vmi1621575 sshd[2097285]: Invalid user sina from 36.64.68.99 port 45332
Jan 20 ... show moreJan 20 10:35:45 vmi1621575 sshd[2097285]: Invalid user sina from 36.64.68.99 port 45332
Jan 20 10:36:38 vmi1621575 sshd[2099503]: Invalid user frontend from 36.64.68.99 port 49642
Jan 20 10:37:11 vmi1621575 sshd[2100946]: Invalid user teamcity from 36.64.68.99 port 42756
Jan 20 10:37:42 vmi1621575 sshd[2102290]: Invalid user csgo from 36.64.68.99 port 57946
Jan 20 10:38:13 vmi1621575 sshd[2103716]: Invalid user github from 36.64.68.99 port 35508
... show less
2025-01-20T01:54:59.619319+00:00 robotstxt-wpsabot sshd[3340827]: Invalid user fox from 36.64.68.99 ... show more2025-01-20T01:54:59.619319+00:00 robotstxt-wpsabot sshd[3340827]: Invalid user fox from 36.64.68.99 port 37464
2025-01-20T01:56:15.370406+00:00 robotstxt-wpsabot sshd[3342527]: Invalid user usuario from 36.64.68.99 port 52902
2025-01-20T01:56:46.959479+00:00 robotstxt-wpsabot sshd[3343970]: Invalid user camera from 36.64.68.99 port 39484
... show less
2025-01-20T02:24:27.552687+01:00 s1 sshd[3264170]: Failed password for invalid user marco from 36.64 ... show more2025-01-20T02:24:27.552687+01:00 s1 sshd[3264170]: Failed password for invalid user marco from 36.64.68.99 port 36508 ssh2
2025-01-20T02:26:24.443652+01:00 s1 sshd[3264900]: Invalid user ppp from 36.64.68.99 port 51354
2025-01-20T02:26:24.445415+01:00 s1 sshd[3264900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.64.68.99
2025-01-20T02:26:26.351163+01:00 s1 sshd[3264900]: Failed password for invalid user ppp from 36.64.68.99 port 51354 ssh2
2025-01-20T02:26:59.879317+01:00 s1 sshd[3265044]: Invalid user yaya from 36.64.68.99 port 51320
... show less
Brute-ForceSSH
Anonymous
Jan 20 01:14:08 ns5024002 sshd[2858641]: Failed password for invalid user nvidia from 36.64.68.99 po ... show moreJan 20 01:14:08 ns5024002 sshd[2858641]: Failed password for invalid user nvidia from 36.64.68.99 port 59848 ssh2
Jan 20 01:16:36 ns5024002 sshd[2861943]: Invalid user pc from 36.64.68.99 port 51814
Jan 20 01:16:36 ns5024002 sshd[2861943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.64.68.99
Jan 20 01:16:38 ns5024002 sshd[2861943]: Failed password for invalid user pc from 36.64.68.99 port 51814 ssh2
Jan 20 01:17:10 ns5024002 sshd[2862715]: Invalid user grid from 36.64.68.99 port 60480
... show less