This IP address has been reported a total of 156
times from 110 distinct
sources.
49.245.85.97 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 16 20:33:39 tidy-feed sshd[152290]: Invalid user vagrant from 49.245.85.97 port 41060
Nov ... show moreNov 16 20:33:39 tidy-feed sshd[152290]: Invalid user vagrant from 49.245.85.97 port 41060
Nov 16 20:34:24 tidy-feed sshd[152299]: Invalid user postgres from 49.245.85.97 port 51864
Nov 16 20:34:51 tidy-feed sshd[152308]: Invalid user csgo from 49.245.85.97 port 54390
Nov 16 20:34:59 tidy-feed sshd[152311]: Invalid user postgres from 49.245.85.97 port 55342
Nov 16 20:35:15 tidy-feed sshd[152317]: Invalid user admin from 49.245.85.97 port 58438
... show less
Nov 16 20:07:13 mail010 sshd[1135999]: error: maximum authentication attempts exceeded for root from ... show moreNov 16 20:07:13 mail010 sshd[1135999]: error: maximum authentication attempts exceeded for root from 49.245.85.97 port 33362 ssh2 [preauth]
Nov 16 20:07:23 mail010 sshd[1136002]: error: maximum authentication attempts exceeded for root from 49.245.85.97 port 33956 ssh2 [preauth]
Nov 16 20:07:30 mail010 sshd[1136004]: error: maximum authentication attempts exceeded for root from 49.245.85.97 port 34302 ssh2 [preauth]
Nov 16 20:07:45 mail010 sshd[1136015]: Invalid user admin from 49.245.85.97 port 38094
... show less
Nov 16 05:05:32 ift sshd[1093557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreNov 16 05:05:32 ift sshd[1093557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.245.85.97
Nov 16 05:05:30 ift sshd[1093557]: Invalid user wp from 49.245.85.97 port 57044
Nov 16 05:05:34 ift sshd[1093557]: Failed password for invalid user wp from 49.245.85.97 port 57044 ssh2
... show less
[Fri Nov 15 09:44:04 PM CET 2024] [Automated Fail2Ban Report] Unauthorized attempt to connect via SS ... show more[Fri Nov 15 09:44:04 PM CET 2024] [Automated Fail2Ban Report] Unauthorized attempt to connect via SSH show less
Nov 15 17:10:40 fw01 sshd[3617049]: Invalid user centos from 49.245.85.97 port 34866
Nov 15 17 ... show moreNov 15 17:10:40 fw01 sshd[3617049]: Invalid user centos from 49.245.85.97 port 34866
Nov 15 17:11:05 fw01 sshd[3617112]: Invalid user ubuntu from 49.245.85.97 port 46438
Nov 15 17:11:14 fw01 sshd[3617127]: Invalid user orangepi from 49.245.85.97 port 50054
Nov 15 17:11:21 fw01 sshd[3617147]: Invalid user ftuser from 49.245.85.97 port 55262
... show less
Nov 15 11:34:48 s1-jellyfish sshd[3170866]: pam_unix(sshd:auth): authentication failure; logname= ui ... show moreNov 15 11:34:48 s1-jellyfish sshd[3170866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.245.85.97
Nov 15 11:34:50 s1-jellyfish sshd[3170866]: Failed password for invalid user guest from 49.245.85.97 port 45426 ssh2
... show less