This IP address has been reported a total of 15,940
times from 1,189 distinct
sources.
60.50.99.134 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Mar 14 08:18:37 arm-fr sshd[1825997]: Invalid user ftpuser from 60.50.99.134 port 58428
Mar 14 ... show moreMar 14 08:18:37 arm-fr sshd[1825997]: Invalid user ftpuser from 60.50.99.134 port 58428
Mar 14 08:28:08 arm-fr sshd[1827241]: Invalid user postgres from 60.50.99.134 port 35208
Mar 14 08:30:03 arm-fr sshd[1827420]: Invalid user alyssa from 60.50.99.134 port 37712
... show less
Mar 14 08:19:07 ns3307833 sshd[3561894]: Invalid user ftpuser from 60.50.99.134 port 40102
Mar ... show moreMar 14 08:19:07 ns3307833 sshd[3561894]: Invalid user ftpuser from 60.50.99.134 port 40102
Mar 14 08:28:40 ns3307833 sshd[3562132]: Invalid user postgres from 60.50.99.134 port 45116
... show less
Mar 14 07:39:30 gw-de21-01.guestgw.net sshd[81800]: Invalid user ct from 60.50.99.134 port 52868<br ... show moreMar 14 07:39:30 gw-de21-01.guestgw.net sshd[81800]: Invalid user ct from 60.50.99.134 port 52868
Mar 14 07:39:30 gw-de21-01.guestgw.net sshd[81800]: Disconnected from invalid user ct 60.50.99.134 port 52868 [preauth]
Mar 14 07:41:53 gw-de21-01.guestgw.net sshd[82167]: Disconnected from authenticating user root 60.50.99.134 port 55034 [preauth]
Mar 14 07:43:21 gw-de21-01.guestgw.net sshd[82395]: Disconnected from authenticating user root 60.50.99.134 port 52214 [preauth]
Mar 14 07:44:52 gw-de21-01.guestgw.net sshd[82527]: Disconnected from authenticating user root 60.50.99.134 port 49398 [preauth] show less
Mar 14 07:39:30 gw-de21-01.guestgw.net sshd[81800]: Invalid user ct from 60.50.99.134 port 52868<br ... show moreMar 14 07:39:30 gw-de21-01.guestgw.net sshd[81800]: Invalid user ct from 60.50.99.134 port 52868
Mar 14 07:39:30 gw-de21-01.guestgw.net sshd[81800]: Disconnected from invalid user ct 60.50.99.134 port 52868 [preauth]
Mar 14 07:41:53 gw-de21-01.guestgw.net sshd[82167]: Disconnected from authenticating user root 60.50.99.134 port 55034 [preauth]
Mar 14 07:43:21 gw-de21-01.guestgw.net sshd[82395]: Disconnected from authenticating user root 60.50.99.134 port 52214 [preauth]
Mar 14 07:44:52 gw-de21-01.guestgw.net sshd[82527]: Disconnected from authenticating user root 60.50.99.134 port 49398 [preauth] show less
Mar 14 06:39:48 srv02 sshd[2694422]: Failed password for invalid user joe from 60.50.99.134 port 515 ... show moreMar 14 06:39:48 srv02 sshd[2694422]: Failed password for invalid user joe from 60.50.99.134 port 51518 ssh2
Mar 14 06:41:11 srv02 sshd[2696790]: Invalid user john from 60.50.99.134 port 48708
Mar 14 06:41:11 srv02 sshd[2696790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.50.99.134
Mar 14 06:41:13 srv02 sshd[2696790]: Failed password for invalid user john from 60.50.99.134 port 48708 ssh2
Mar 14 06:42:38 srv02 sshd[2698906]: Invalid user client1 from 60.50.99.134 port 45896
... show less
Mar 14 06:11:22 srv02 sshd[2651319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreMar 14 06:11:22 srv02 sshd[2651319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.50.99.134
Mar 14 06:11:25 srv02 sshd[2651319]: Failed password for invalid user jboss from 60.50.99.134 port 51258 ssh2
Mar 14 06:12:51 srv02 sshd[2653656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.50.99.134 user=root
Mar 14 06:12:53 srv02 sshd[2653656]: Failed password for root from 60.50.99.134 port 48444 ssh2
Mar 14 06:14:16 srv02 sshd[2656091]: Invalid user openhabian from 60.50.99.134 port 45642
... show less
DATE:2023-03-14 06:11:28, IP:60.50.99.134, PORT:ssh SSH brute force auth on honeypot server (epe-hon ... show moreDATE:2023-03-14 06:11:28, IP:60.50.99.134, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq) show less
Mar 14 02:33:20 ip-172-26-3-243 sshd[14879]: Invalid user admin from 60.50.99.134 port 42200
M ... show moreMar 14 02:33:20 ip-172-26-3-243 sshd[14879]: Invalid user admin from 60.50.99.134 port 42200
Mar 14 02:36:28 ip-172-26-3-243 sshd[14896]: Invalid user svnuser from 60.50.99.134 port 54338
Mar 14 02:38:01 ip-172-26-3-243 sshd[14925]: Invalid user sshvpn from 60.50.99.134 port 55516
... show less
Brute-ForceSSH
Anonymous
2023-03-14T03:31:58.020649hz01.yumiweb.com sshd[32008]: Invalid user admin from 60.50.99.134 port 44 ... show more2023-03-14T03:31:58.020649hz01.yumiweb.com sshd[32008]: Invalid user admin from 60.50.99.134 port 44476
2023-03-14T03:36:08.194719hz01.yumiweb.com sshd[32072]: Invalid user svnuser from 60.50.99.134 port 35730
2023-03-14T03:37:41.078865hz01.yumiweb.com sshd[32096]: Invalid user sshvpn from 60.50.99.134 port 36910
... show less
Mar 14 02:32:46 vpnpi sshd[1270434]: Invalid user admin from 60.50.99.134 port 38904
Mar 14 02 ... show moreMar 14 02:32:46 vpnpi sshd[1270434]: Invalid user admin from 60.50.99.134 port 38904
Mar 14 02:36:20 vpnpi sshd[1270478]: Invalid user svnuser from 60.50.99.134 port 54044
... show less