This IP address has been reported a total of 398
times from 269 distinct
sources.
49.212.135.96 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 10 19:02:25 b146-44 sshd[1898035]: Failed password for root from 49.212.135.96 port 57229 ssh2<b ... show moreNov 10 19:02:25 b146-44 sshd[1898035]: Failed password for root from 49.212.135.96 port 57229 ssh2
Nov 10 19:04:52 b146-44 sshd[1898320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.212.135.96 user=root
Nov 10 19:04:54 b146-44 sshd[1898320]: Failed password for root from 49.212.135.96 port 50914 ssh2
... show less
Nov 11 02:21:47 cloud sshd[240728]: Invalid user Aatu from 49.212.135.96 port 58921
Nov 11 02: ... show moreNov 11 02:21:47 cloud sshd[240728]: Invalid user Aatu from 49.212.135.96 port 58921
Nov 11 02:24:50 cloud sshd[240741]: Invalid user gerhard from 49.212.135.96 port 55971
Nov 11 02:27:19 cloud sshd[240763]: Invalid user elan from 49.212.135.96 port 49516
Nov 11 02:29:34 cloud sshd[240778]: Invalid user melanie from 49.212.135.96 port 43055
Nov 11 02:31:41 cloud sshd[240797]: Invalid user kemp from 49.212.135.96 port 36594 show less
Nov 11 00:58:40 s158416 sshd[1678474]: Failed password for root from 49.212.135.96 port 49714 ssh2<b ... show moreNov 11 00:58:40 s158416 sshd[1678474]: Failed password for root from 49.212.135.96 port 49714 ssh2
Nov 11 01:00:57 s158416 sshd[1679249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.212.135.96 user=root
Nov 11 01:01:00 s158416 sshd[1679249]: Failed password for root from 49.212.135.96 port 43150 ssh2
Nov 11 01:03:18 s158416 sshd[1680204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.212.135.96 user=root
Nov 11 01:03:20 s158416 sshd[1680204]: Failed password for root from 49.212.135.96 port 36583 ssh2
... show less
Nov 11 00:49:56 nervous-edison8 sshd[3268114]: Failed password for root from 49.212.135.96 port 5786 ... show moreNov 11 00:49:56 nervous-edison8 sshd[3268114]: Failed password for root from 49.212.135.96 port 57864 ssh2
Nov 11 00:52:14 nervous-edison8 sshd[3269101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.212.135.96 user=root
Nov 11 00:52:16 nervous-edison8 sshd[3269101]: Failed password for root from 49.212.135.96 port 51300 ssh2
Nov 11 00:54:37 nervous-edison8 sshd[3270121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.212.135.96 user=root
Nov 11 00:54:39 nervous-edison8 sshd[3270121]: Failed password for root from 49.212.135.96 port 44736 ssh2
... show less
Nov 11 01:04:29 racetecweb sshd[1901056]: User root from 49.212.135.96 not allowed because not liste ... show moreNov 11 01:04:29 racetecweb sshd[1901056]: User root from 49.212.135.96 not allowed because not listed in AllowUsers
Nov 11 01:07:56 racetecweb sshd[1901074]: User root from 49.212.135.96 not allowed because not listed in AllowUsers
Nov 11 01:10:30 racetecweb sshd[1901218]: User root from 49.212.135.96 not allowed because not listed in AllowUsers
... show less
2024-11-11T02:04:05.429928+02:00 server01.k3s.pve01.rma.ch.crazycraftland.net sshd[2293261]: User ro ... show more2024-11-11T02:04:05.429928+02:00 server01.k3s.pve01.rma.ch.crazycraftland.net sshd[2293261]: User root from 49.212.135.96 not allowed because not listed in AllowUsers
2024-11-11T02:07:42.210994+02:00 server01.k3s.pve01.rma.ch.crazycraftland.net sshd[2294208]: User root from 49.212.135.96 not allowed because not listed in AllowUsers
2024-11-11T02:10:15.239011+02:00 server01.k3s.pve01.rma.ch.crazycraftland.net sshd[2294881]: User root from 49.212.135.96 not allowed because not listed in AllowUsers
... show less
Nov 11 00:30:55 h2992075 sshd[454862]: Invalid user merrie from 49.212.135.96 port 34398
Nov 1 ... show moreNov 11 00:30:55 h2992075 sshd[454862]: Invalid user merrie from 49.212.135.96 port 34398
Nov 11 00:30:55 h2992075 sshd[454862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.212.135.96
Nov 11 00:30:55 h2992075 sshd[454862]: Invalid user merrie from 49.212.135.96 port 34398
Nov 11 00:30:56 h2992075 sshd[454862]: Failed password for invalid user merrie from 49.212.135.96 port 34398 ssh2
Nov 11 00:33:21 h2992075 sshd[454927]: Invalid user adminftp from 49.212.135.96 port 55979
... show less
[Automated F2B Report] 2024-11-10T23:27:40.619431webserver sshd[1267769]: Invalid user bay from 49.2 ... show more[Automated F2B Report] 2024-11-10T23:27:40.619431webserver sshd[1267769]: Invalid user bay from 49.212.135.96 port 54280
2024-11-10T23:30:50.367028webserver sshd[1267850]: Invalid user merrie from 49.212.135.96 port 52177
2024-11-10T23:33:16.051375webserver sshd[1267904]: Invalid user adminftp from 49.212.135.96 port 45526
... show less
Brute-ForceSSH
Anonymous
2024-11-11T00:26:48+01:00 lb-1 sshd[2473324]: Invalid user bay from 49.212.135.96 port 38507
2 ... show more2024-11-11T00:26:48+01:00 lb-1 sshd[2473324]: Invalid user bay from 49.212.135.96 port 38507
2024-11-11T00:26:48+01:00 lb-1 sshd[2473324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.212.135.96
2024-11-11T00:26:51+01:00 lb-1 sshd[2473324]: Failed password for invalid user bay from 49.212.135.96 port 38507 ssh2
... show less