This IP address has been reported a total of 573
times from 352 distinct
sources.
49.228.214.242 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-15T18:22:59.276611+00:00 prod-3 sshd[2149641]: Disconnected from authenticating user root 49 ... show more2024-11-15T18:22:59.276611+00:00 prod-3 sshd[2149641]: Disconnected from authenticating user root 49.228.214.242 port 37092 [preauth]
2024-11-15T18:25:11.193366+00:00 prod-3 sshd[2149917]: Disconnected from authenticating user root 49.228.214.242 port 53730 [preauth]
2024-11-15T18:25:29.343087+00:00 prod-3 sshd[2149939]: Disconnected from authenticating user root 49.228.214.242 port 49010 [preauth]
2024-11-15T18:27:03.238823+00:00 prod-3 sshd[2150100]: Disconnected from authenticating user root 49.228.214.242 port 41602 [preauth]
2024-11-15T18:27:50.763040+00:00 prod-3 sshd[2150201]: Disconnected from authenticating user root 49.228.214.242 port 36368 [preauth]
... show less
Nov 15 19:24:33 mtb-server sshd[991246]: Failed password for root from 49.228.214.242 port 59922 ssh ... show moreNov 15 19:24:33 mtb-server sshd[991246]: Failed password for root from 49.228.214.242 port 59922 ssh2
Nov 15 19:24:50 mtb-server sshd[991253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 19:24:51 mtb-server sshd[991253]: Failed password for root from 49.228.214.242 port 42278 ssh2
Nov 15 19:25:08 mtb-server sshd[991622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 19:25:10 mtb-server sshd[991622]: Failed password for root from 49.228.214.242 port 53982 ssh2
... show less
Nov 15 18:02:38 mail sshd[870906]: Failed password for root from 49.228.214.242 port 55174 ssh2<br / ... show moreNov 15 18:02:38 mail sshd[870906]: Failed password for root from 49.228.214.242 port 55174 ssh2
Nov 15 18:05:10 mail sshd[871209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 18:05:12 mail sshd[871209]: Failed password for root from 49.228.214.242 port 35580 ssh2
... show less
2024-11-15T17:39:46.489015 socky.stom66.co.uk sshd[1667538]: Invalid user torben from 49.228.214.242 ... show more2024-11-15T17:39:46.489015 socky.stom66.co.uk sshd[1667538]: Invalid user torben from 49.228.214.242 port 46616
2024-11-15T17:40:21.285977 socky.stom66.co.uk sshd[1668445]: Invalid user mqm from 49.228.214.242 port 47848
... show less
2024-11-15T16:52:12.950304+01:00 lin2me-srv sshd[1428560]: Invalid user despacho from 49.228.214.242 ... show more2024-11-15T16:52:12.950304+01:00 lin2me-srv sshd[1428560]: Invalid user despacho from 49.228.214.242 port 53646
2024-11-15T16:52:37.392815+01:00 lin2me-srv sshd[1428582]: Connection from 49.228.214.242 port 36386 on 185.39.222.142 port 22 rdomain ""
2024-11-15T16:52:38.493917+01:00 lin2me-srv sshd[1428582]: Invalid user uat1 from 49.228.214.242 port 36386
... show less
Brute-ForceSSH
Anonymous
Nov 15 15:36:15 scw-6657dc sshd[5137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreNov 15 15:36:15 scw-6657dc sshd[5137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 15:36:15 scw-6657dc sshd[5137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 15:36:18 scw-6657dc sshd[5137]: Failed password for root from 49.228.214.242 port 44464 ssh2
... show less
Nov 15 15:21:13 ovh sshd[2360598]: Failed password for root from 49.228.214.242 port 57884 ssh2<br / ... show moreNov 15 15:21:13 ovh sshd[2360598]: Failed password for root from 49.228.214.242 port 57884 ssh2
Nov 15 15:22:32 ovh sshd[2361200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 15:22:34 ovh sshd[2361200]: Failed password for root from 49.228.214.242 port 36156 ssh2
Nov 15 15:23:00 ovh sshd[2361376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242 user=root
Nov 15 15:23:02 ovh sshd[2361376]: Failed password for root from 49.228.214.242 port 34004 ssh2
... show less
Brute-Force
Anonymous
Nov 15 15:11:53 syslog-dus sshd[2093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreNov 15 15:11:53 syslog-dus sshd[2093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.228.214.242
Nov 15 15:11:55 syslog-dus sshd[2093]: Failed password for invalid user import from 49.228.214.242 port 50538 ssh2
Nov 15 15:14:01 syslog-dus sshd[2103]: Invalid user sites from 49.228.214.242 port 48958
... show less