This IP address has been reported a total of 194
times from 134 distinct
sources.
5.160.91.142 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-12-13T12:18:41.065965+01:00 debian-ht sshd[3371828]: pam_unix(sshd:auth): authentication failur ... show more2024-12-13T12:18:41.065965+01:00 debian-ht sshd[3371828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.91.142 user=root
2024-12-13T12:18:43.073356+01:00 debian-ht sshd[3371828]: Failed password for root from 5.160.91.142 port 51536 ssh2
2024-12-13T12:18:44.556623+01:00 debian-ht sshd[3371855]: Invalid user pi from 5.160.91.142 port 55958
2024-12-13T12:18:45.100299+01:00 debian-ht sshd[3371864]: Invalid user git from 5.160.91.142 port 34680
2024-12-13T12:18:46.633559+01:00 debian-ht sshd[3371884]: Invalid user hive from 5.160.91.142 port 59582
... show less
Dec 13 11:05:32 Ubuntu-2204-jammy-amd64-base sshd[871982]: pam_unix(sshd:auth): authentication failu ... show moreDec 13 11:05:32 Ubuntu-2204-jammy-amd64-base sshd[871982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.91.142 user=root
Dec 13 11:05:34 Ubuntu-2204-jammy-amd64-base sshd[871982]: Failed password for root from 5.160.91.142 port 41742 ssh2
Dec 13 11:05:44 Ubuntu-2204-jammy-amd64-base sshd[871991]: Invalid user pi from 5.160.91.142 port 60262
... show less
Dec 13 11:53:18 SFEEDS sshd[2562036]: Failed password for root from 5.160.91.142 port 57420 ssh2<br ... show moreDec 13 11:53:18 SFEEDS sshd[2562036]: Failed password for root from 5.160.91.142 port 57420 ssh2
Dec 13 11:53:19 SFEEDS sshd[2562038]: Invalid user pi from 5.160.91.142 port 48024
Dec 13 11:53:19 SFEEDS sshd[2562038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.91.142
Dec 13 11:53:21 SFEEDS sshd[2562038]: Failed password for invalid user pi from 5.160.91.142 port 48024 ssh2
Dec 13 11:53:24 SFEEDS sshd[2562042]: Invalid user hive from 5.160.91.142 port 37882
... show less
2024-12-13T10:37:25.059225+01:00 fusco sshd[987291]: pam_unix(sshd:auth): authentication failure; lo ... show more2024-12-13T10:37:25.059225+01:00 fusco sshd[987291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.91.142 user=root
2024-12-13T10:37:26.936138+01:00 fusco sshd[987291]: Failed password for root from 5.160.91.142 port 45916 ssh2
2024-12-13T10:38:11.467650+01:00 fusco sshd[990443]: Invalid user pi from 5.160.91.142 port 33732
... show less
2024-12-13T10:37:52.278331+01:00 s1 sshd[483596]: pam_unix(sshd:auth): authentication failure; logna ... show more2024-12-13T10:37:52.278331+01:00 s1 sshd[483596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.91.142 user=root
2024-12-13T10:37:54.195891+01:00 s1 sshd[483596]: Failed password for root from 5.160.91.142 port 44930 ssh2
2024-12-13T10:38:05.058663+01:00 s1 sshd[483655]: Invalid user pi from 5.160.91.142 port 57694
2024-12-13T10:38:05.947583+01:00 s1 sshd[483655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.91.142
2024-12-13T10:38:08.316567+01:00 s1 sshd[483655]: Failed password for invalid user pi from 5.160.91.142 port 57694 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-12-13T10:35:00.307906+01:00 svr10 sshd[1751152]: Connection closed by authenticating user root ... show more2024-12-13T10:35:00.307906+01:00 svr10 sshd[1751152]: Connection closed by authenticating user root 5.160.91.142 port 58712 [preauth]
2024-12-13T10:35:39.755567+01:00 svr10 sshd[1751727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.91.142 user=root
2024-12-13T10:35:41.747915+01:00 svr10 sshd[1751727]: Failed password for root from 5.160.91.142 port 51776 ssh2
... show less