This IP address has been reported a total of 1,133
times from 366 distinct
sources.
64.31.49.50 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Apr 28 14:24:11 wiki.dolphin-it.de sshd[44362]: Unable to negotiate with 64.31.49.50 port 55890: no ... show moreApr 28 14:24:11 wiki.dolphin-it.de sshd[44362]: Unable to negotiate with 64.31.49.50 port 55890: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Apr 28 14:24:16 wiki.dolphin-it.de sshd[44365]: Unable to negotiate with 64.31.49.50 port 47790: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Apr 28 14:24:22 wiki.dolphin-it.de sshd[44370]: Unable to negotiate with 64.31.49.50 port 39694: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Apr 28 14:24:27 wiki.dolphin-it.de sshd[44374]: Unable to negotiate with 64.31.49.50 port 59822: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Apr 28 14:24:33 wiki.dolphi show less
2022-04-28T17:56:20.316445+0300
ET COMPROMISED Known Compromised or Hostile Host Traffic group ... show more2022-04-28T17:56:20.316445+0300
ET COMPROMISED Known Compromised or Hostile Host Traffic group 21 show less
2022-04-28T19:03:13.813195correo.[domain] sshd[16194]: Failed password for root from 64.31.49.50 por ... show more2022-04-28T19:03:13.813195correo.[domain] sshd[16194]: Failed password for root from 64.31.49.50 port 55520 ssh2 2022-04-28T19:03:17.549658correo.[domain] sshd[16197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.31.49.50 user=root 2022-04-28T19:03:20.420126correo.[domain] sshd[16197]: Failed password for root from 64.31.49.50 port 47706 ssh2 ... show less
Apr 28 22:39:58 lnxweb62 sshd[10354]: Failed password for root from 64.31.49.50 port 46706 ssh2<br / ... show moreApr 28 22:39:58 lnxweb62 sshd[10354]: Failed password for root from 64.31.49.50 port 46706 ssh2
Apr 28 22:40:00 lnxweb62 sshd[10354]: Disconnected from authenticating user root 64.31.49.50 port 46706 [preauth]
Apr 28 22:40:00 lnxweb62 sshd[10380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.31.49.50 user=root
Apr 28 22:40:02 lnxweb62 sshd[10380]: Failed password for root from 64.31.49.50 port 54352 ssh2
Apr 28 22:40:04 lnxweb62 sshd[10692]: Invalid user admin from 64.31.49.50 port 33770
... show less
Apr 29 03:39:56 hokage sshd[166914]: Unable to negotiate with 64.31.49.50 port 48508: no matching ke ... show moreApr 29 03:39:56 hokage sshd[166914]: Unable to negotiate with 64.31.49.50 port 48508: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Apr 29 03:39:59 hokage sshd[166916]: Unable to negotiate with 64.31.49.50 port 56134: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Apr 29 03:40:03 hokage sshd[166918]: Unable to negotiate with 64.31.49.50 port 35556: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] show less