This IP address has been reported a total of 573
times from 352 distinct
sources.
49.228.214.242 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 15 21:04:13 ny01 sshd[3224188]: Failed password for root from 49.228.214.242 port 46320 ssh2<br ... show moreNov 15 21:04:13 ny01 sshd[3224188]: Failed password for root from 49.228.214.242 port 46320 ssh2
Nov 15 21:06:34 ny01 sshd[3224378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 21:06:36 ny01 sshd[3224378]: Failed password for root from 49.228.214.242 port 33196 ssh2
Nov 15 21:09:05 ny01 sshd[3224626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 21:09:06 ny01 sshd[3224626]: Failed password for root from 49.228.214.242 port 60970 ssh2 show less
sshd[642298]: Failed password for root from 49.228.214.242 port 45934 ssh2
sshd[658948]: pam_u ... show moresshd[642298]: Failed password for root from 49.228.214.242 port 45934 ssh2
sshd[658948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
sshd[658948]: Failed password for root from 49.228.214.242 port 43928 ssh2
sshd[659105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
sshd[659105]: Failed password for root from 49.228.214.242 port 32846 ssh2 show less
Nov 16 02:02:07 mail sshd[3139982]: Failed password for root from 49.228.214.242 port 60576 ssh2<br ... show moreNov 16 02:02:07 mail sshd[3139982]: Failed password for root from 49.228.214.242 port 60576 ssh2
Nov 16 02:02:37 mail sshd[3139989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 16 02:02:39 mail sshd[3139989]: Failed password for root from 49.228.214.242 port 44282 ssh2
Nov 16 02:03:07 mail sshd[3140012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 16 02:03:09 mail sshd[3140012]: Failed password for root from 49.228.214.242 port 47404 ssh2
... show less
2024-11-16T02:25:32.200677+02:00 nc3.motyka.pro sshd[304184]: Invalid user virus from 49.228.214.242 ... show more2024-11-16T02:25:32.200677+02:00 nc3.motyka.pro sshd[304184]: Invalid user virus from 49.228.214.242 port 55454
2024-11-16T02:25:32.203625+02:00 nc3.motyka.pro sshd[304184]: Failed password for invalid user virus from 49.228.214.242 port 55454 ssh2
2024-11-16T02:28:23.996735+02:00 nc3.motyka.pro sshd[310097]: Invalid user nathen from 49.228.214.242 port 43268
2024-11-16T02:28:24.001564+02:00 nc3.motyka.pro sshd[310097]: Failed password for invalid user nathen from 49.228.214.242 port 43268 ssh2
2024-11-16T02:36:16.874937+02:00 nc3.motyka.pro sshd[325920]: Invalid user altibase1 from 49.228.214.242 port 40650
... show less
2024-11-16T00:23:12.169638+00:00 xxx sshd[3115963]: Invalid user virus from 49.228.214.242 port 4911 ... show more2024-11-16T00:23:12.169638+00:00 xxx sshd[3115963]: Invalid user virus from 49.228.214.242 port 49118
2024-11-16T00:27:04.748976+00:00 xxx sshd[3123958]: Invalid user nathen from 49.228.214.242 port 39036
2024-11-16T00:31:14.631585+00:00 xxx sshd[3132731]: Invalid user shelluser1 from 49.228.214.242 port 49452
... show less
Nov 15 23:48:12 ovh-docker-001 sshd[1184982]: Failed password for root from 49.228.214.242 port 3583 ... show moreNov 15 23:48:12 ovh-docker-001 sshd[1184982]: Failed password for root from 49.228.214.242 port 35830 ssh2
Nov 15 23:49:20 ovh-docker-001 sshd[1186535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 23:49:21 ovh-docker-001 sshd[1186535]: Failed password for root from 49.228.214.242 port 49722 ssh2
Nov 15 23:50:17 ovh-docker-001 sshd[1187751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 23:50:19 ovh-docker-001 sshd[1187751]: Failed password for root from 49.228.214.242 port 56740 ssh2
... show less
Report 1450911 with IP 2485538 for SSH brute-force attack by source 2480213 via ssh-honeypot/0.2.0+h ... show moreReport 1450911 with IP 2485538 for SSH brute-force attack by source 2480213 via ssh-honeypot/0.2.0+http show less
Nov 16 00:47:30 h2buntu sshd[2095789]: Failed password for root from 49.228.214.242 port 52966 ssh2< ... show moreNov 16 00:47:30 h2buntu sshd[2095789]: Failed password for root from 49.228.214.242 port 52966 ssh2
Nov 16 00:49:53 h2buntu sshd[2096089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 16 00:49:55 h2buntu sshd[2096089]: Failed password for root from 49.228.214.242 port 57634 ssh2
... show less