This IP address has been reported a total of 392
times from 228 distinct
sources.
66.179.249.31 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 27 11:23:41 athena sshd[726041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreDec 27 11:23:41 athena sshd[726041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.179.249.31 user=root
Dec 27 11:23:43 athena sshd[726041]: Failed password for root from 66.179.249.31 port 37184 ssh2
Dec 27 11:23:44 athena sshd[726049]: Invalid user hive from 66.179.249.31 port 37208
Dec 27 11:23:43 athena sshd[726046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.179.249.31
Dec 27 11:23:45 athena sshd[726046]: Failed password for invalid user pi from 66.179.249.31 port 37192 ssh2
... show less
2024-12-27T13:13:44.538093pantelemone.ru sshd[2125253]: Invalid user pi from 66.179.249.31 port 4561 ... show more2024-12-27T13:13:44.538093pantelemone.ru sshd[2125253]: Invalid user pi from 66.179.249.31 port 45618
2024-12-27T13:13:45.760621pantelemone.ru sshd[2125269]: Invalid user hive from 66.179.249.31 port 45620
2024-12-27T13:13:43.678181pantelemone.ru sshd[2125242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.179.249.31 user=root
2024-12-27T13:13:45.904167pantelemone.ru sshd[2125242]: Failed password for root from 66.179.249.31 port 45604 ssh2
2024-12-27T13:13:46.793306pantelemone.ru sshd[2125273]: Invalid user git from 66.179.249.31 port 45634
... show less
Dec 27 04:27:41 124388 sshd[298364]: Invalid user pi from 66.179.249.31 port 43910
Dec 27 04:2 ... show moreDec 27 04:27:41 124388 sshd[298364]: Invalid user pi from 66.179.249.31 port 43910
Dec 27 04:27:42 124388 sshd[298366]: Invalid user hive from 66.179.249.31 port 43918
Dec 27 04:27:42 124388 sshd[298368]: Invalid user git from 66.179.249.31 port 43922
Dec 27 04:27:41 124388 sshd[298362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.179.249.31 user=root
Dec 27 04:27:43 124388 sshd[298362]: Failed password for root from 66.179.249.31 port 43894 ssh2
... show less
Dec 27 01:14:24 server01 sshd[2485]: Failed password for root from 66.179.249.31 port 35626 ssh2<br ... show moreDec 27 01:14:24 server01 sshd[2485]: Failed password for root from 66.179.249.31 port 35626 ssh2
Dec 27 01:16:42 server01 sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.179.249.31
... show less
[rede-164-29] (sshd) Failed SSH login from 66.179.249.31 (US/United States/ip66-179-249-31.pbiaas.co ... show more[rede-164-29] (sshd) Failed SSH login from 66.179.249.31 (US/United States/ip66-179-249-31.pbiaas.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 27 05:46:15 sshd[18466]: Failed password for [USERNAME] from 66.179.249.31 port 55498 ssh2
Dec 27 05:46:16 sshd[18462]: Failed password for [USERNAME] from 66.179.249.31 port 52070 ssh2
Dec 27 05:46:16 sshd[18463]: Failed password for [USERNAME] from 66.179.249.31 port 56176 ssh2
Dec 27 05:48:43 sshd[18520]: Invalid user [USERNAME] from 66.179.249.31 port 42562
Dec 27 05:48:43 sshd[18516]: Invalid user [USERNAME] from 66.179.249.31 port 54380 show less