This IP address has been reported a total of 570
times from 233 distinct
sources.
61.136.162.242 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Jan 22 23:12:55 us1-bms-f7b96252 sshd[2677891]: pam_unix(sshd:auth): authentication failure; logname ... show moreJan 22 23:12:55 us1-bms-f7b96252 sshd[2677891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.136.162.242 user=root
Jan 22 23:12:57 us1-bms-f7b96252 sshd[2677891]: Failed password for root from 61.136.162.242 port 47220 ssh2
Jan 22 23:13:00 us1-bms-f7b96252 sshd[2678102]: Invalid user pi from 61.136.162.242 port 47236
... show less
Brute-ForceSSH
Anonymous
Jan 22 22:26:28 mx1 sshd[1404329]: User root from 61.136.162.242 not allowed because not listed in A ... show moreJan 22 22:26:28 mx1 sshd[1404329]: User root from 61.136.162.242 not allowed because not listed in AllowUsers show less
Jan 22 14:46:29 vps-d7931dc8 sshd[1479971]: Failed password for root from 61.136.162.242 port 48284 ... show moreJan 22 14:46:29 vps-d7931dc8 sshd[1479971]: Failed password for root from 61.136.162.242 port 48284 ssh2
Jan 22 14:46:31 vps-d7931dc8 sshd[1479971]: Connection closed by authenticating user root 61.136.162.242 port 48284 [preauth]
Jan 22 14:47:17 vps-d7931dc8 sshd[1479991]: Connection closed by 61.136.162.242 port 41008 [preauth]
Jan 22 14:47:23 vps-d7931dc8 sshd[1479987]: Connection reset by 61.136.162.242 port 40986 [preauth]
Jan 22 14:47:26 vps-d7931dc8 sshd[1479985]: Connection reset by 61.136.162.242 port 40980 [preauth] show less
2025-01-22T17:33:46.769760+08:00 VM-8-9-debian sshd[994839]: pam_unix(sshd:auth): authentication fai ... show more2025-01-22T17:33:46.769760+08:00 VM-8-9-debian sshd[994839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.136.162.242 user=root
2025-01-22T17:33:49.523827+08:00 VM-8-9-debian sshd[994839]: Failed password for root from 61.136.162.242 port 50020 ssh2
2025-01-22T17:33:51.908026+08:00 VM-8-9-debian sshd[994841]: Invalid user hive from 61.136.162.242 port 50038
... show less
Jan 22 06:32:23 mail sshd[2630408]: Failed password for root from 61.136.162.242 port 48758 ssh2<br ... show moreJan 22 06:32:23 mail sshd[2630408]: Failed password for root from 61.136.162.242 port 48758 ssh2
Jan 22 06:32:42 mail sshd[2630552]: Invalid user pi from 61.136.162.242 port 60922
Jan 22 06:32:42 mail sshd[2630554]: Invalid user hive from 61.136.162.242 port 60928
... show less
2025-01-17 04:18:02,700 fail2ban.actions [901]: NOTICE [pam-generic] Ban 61.136.162.242<br / ... show more2025-01-17 04:18:02,700 fail2ban.actions [901]: NOTICE [pam-generic] Ban 61.136.162.242
2025-01-17 04:18:04,043 fail2ban.actions [901]: NOTICE [sshd] Ban 61.136.162.242 show less
2025-01-21T19:04:57.042989 vps sshd[425273]: Failed password for root from 61.136.162.242 port 37210 ... show more2025-01-21T19:04:57.042989 vps sshd[425273]: Failed password for root from 61.136.162.242 port 37210 ssh2
2025-01-21T19:05:00.684739 vps sshd[425278]: Invalid user pi from 61.136.162.242 port 37214
2025-01-21T19:05:01.632860 vps sshd[425285]: Invalid user hive from 61.136.162.242 port 37230
2025-01-21T19:05:03.513256 vps sshd[425278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.136.162.242
2025-01-21T19:05:05.774636 vps sshd[425278]: Failed password for invalid user pi from 61.136.162.242 port 37214 ssh2
... show less