This IP address has been reported a total of 736
times from 390 distinct
sources.
49.49.50.241 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 11 03:22:38 v2202301167543214332 sshd[3817686]: Failed password for root from 49.49.50.241 port ... show moreNov 11 03:22:38 v2202301167543214332 sshd[3817686]: Failed password for root from 49.49.50.241 port 45758 ssh2
Nov 11 03:25:06 v2202301167543214332 sshd[3817735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 11 03:25:08 v2202301167543214332 sshd[3817735]: Failed password for root from 49.49.50.241 port 46516 ssh2
Nov 11 03:27:30 v2202301167543214332 sshd[3817775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 11 03:27:32 v2202301167543214332 sshd[3817775]: Failed password for root from 49.49.50.241 port 33458 ssh2
... show less
DDoS AttackPing of DeathWeb SpamEmail SpamBrute-ForceBad Web BotSSH
2024-11-10T19:11:49.483385-07:00 lain sshd-session[287163]: Failed password for root from 49.49.50.2 ... show more2024-11-10T19:11:49.483385-07:00 lain sshd-session[287163]: Failed password for root from 49.49.50.241 port 31972 ssh2
2024-11-10T19:14:29.113579-07:00 lain sshd-session[287226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
2024-11-10T19:14:31.254525-07:00 lain sshd-session[287226]: Failed password for root from 49.49.50.241 port 6164 ssh2
2024-11-10T19:17:00.194134-07:00 lain sshd-session[287294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
2024-11-10T19:17:01.930296-07:00 lain sshd-session[287294]: Failed password for root from 49.49.50.241 port 15174 ssh2
... show less
49.49.50.241 (TH/Thailand/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Po ... show more49.49.50.241 (TH/Thailand/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Nov 10 21:07:20 server5 sshd[24495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.180.192.183 user=root
Nov 10 21:07:06 server5 sshd[24471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.171.237 user=root
Nov 10 21:07:08 server5 sshd[24471]: Failed password for root from 209.97.171.237 port 47198 ssh2
Nov 10 21:07:01 server5 sshd[24424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 10 21:07:03 server5 sshd[24424]: Failed password for root from 49.49.50.241 port 6200 ssh2
Nov 10 21:06:44 server5 sshd[24378]: Failed password for root from 92.222.181.145 port 43752 ssh2
IP Addresses Blocked:
111.180.192.183 (CN/China/-)
209.97.171.237 (SG/Singapore/-) show less
2024-11-11T02:31:28.630645+01:00 ondrej-desktop sshd[2404251]: Failed password for root from 49.49.5 ... show more2024-11-11T02:31:28.630645+01:00 ondrej-desktop sshd[2404251]: Failed password for root from 49.49.50.241 port 40320 ssh2
2024-11-11T02:34:02.517001+01:00 ondrej-desktop sshd[2404795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
2024-11-11T02:34:04.566765+01:00 ondrej-desktop sshd[2404795]: Failed password for root from 49.49.50.241 port 26410 ssh2
... show less
Nov 10 18:30:27 b146-02 sshd[755765]: Failed password for root from 49.49.50.241 port 10396 ssh2<br ... show moreNov 10 18:30:27 b146-02 sshd[755765]: Failed password for root from 49.49.50.241 port 10396 ssh2
Nov 10 18:32:59 b146-02 sshd[756231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 10 18:33:01 b146-02 sshd[756231]: Failed password for root from 49.49.50.241 port 46296 ssh2
... show less
Nov 11 03:28:52 ubuntu-MQTT sshd[328401]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreNov 11 03:28:52 ubuntu-MQTT sshd[328401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 11 03:28:53 ubuntu-MQTT sshd[328401]: Failed password for invalid user root from 49.49.50.241 port 3872 ssh2
Nov 11 03:28:52 ubuntu-MQTT sshd[328401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 11 03:28:53 ubuntu-MQTT sshd[328401]: Failed password for invalid user root from 49.49.50.241 port 3872 ssh2
Nov 11 03:31:33 ubuntu-MQTT sshd[328420]: User root from 49.49.50.241 not allowed because not listed in AllowUsers
... show less
Nov 11 00:46:20 web8 sshd\[20541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 e ... show moreNov 11 00:46:20 web8 sshd\[20541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 11 00:46:22 web8 sshd\[20541\]: Failed password for root from 49.49.50.241 port 47492 ssh2
Nov 11 00:50:23 web8 sshd\[21759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 11 00:50:25 web8 sshd\[21759\]: Failed password for root from 49.49.50.241 port 45374 ssh2
Nov 11 00:52:51 web8 sshd\[22510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root show less
Brute-ForceSSH
Anonymous
Nov 10 19:16:38 jumarpab sshd[1298596]: Failed password for root from 49.49.50.241 port 40028 ssh2<b ... show moreNov 10 19:16:38 jumarpab sshd[1298596]: Failed password for root from 49.49.50.241 port 40028 ssh2
Nov 10 19:19:05 jumarpab sshd[1298999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 10 19:19:08 jumarpab sshd[1298999]: Failed password for root from 49.49.50.241 port 24646 ssh2
... show less
Nov 10 17:11:50 b146-61 sshd[172992]: Failed password for root from 49.49.50.241 port 40260 ssh2<br ... show moreNov 10 17:11:50 b146-61 sshd[172992]: Failed password for root from 49.49.50.241 port 40260 ssh2
Nov 10 17:14:14 b146-61 sshd[173156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.50.241 user=root
Nov 10 17:14:16 b146-61 sshd[173156]: Failed password for root from 49.49.50.241 port 39400 ssh2
... show less
2024-11-11T00:27:52.426377 ******* sshd[22202]: Disconnected from authenticating user root 49.49.50. ... show more2024-11-11T00:27:52.426377 ******* sshd[22202]: Disconnected from authenticating user root 49.49.50.241 port 40810 [preauth]
2024-11-11T00:31:25.883275 ******* sshd[22936]: Disconnected from authenticating user root 49.49.50.241 port 33766 [preauth]
2024-11-11T00:33:57.400890 ******* sshd[23388]: Disconnected from authenticating user root 49.49.50.241 port 48072 [preauth] show less