This IP address has been reported a total of 439
times from 264 distinct
sources.
66.70.203.223 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-16T17:39:00.879925shield sshd\[12038\]: Invalid user user from 66.70.203.223 port 48966<br / ... show more2024-11-16T17:39:00.879925shield sshd\[12038\]: Invalid user user from 66.70.203.223 port 48966
2024-11-16T17:39:00.886060shield sshd\[12038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.203.223
2024-11-16T17:39:02.398142shield sshd\[12038\]: Failed password for invalid user user from 66.70.203.223 port 48966 ssh2
2024-11-16T17:40:50.284432shield sshd\[12541\]: Invalid user deployer from 66.70.203.223 port 33092
2024-11-16T17:40:50.292803shield sshd\[12541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.203.223 show less
2024-11-16T17:25:47.090481shield sshd\[8251\]: Invalid user odoo from 66.70.203.223 port 44432 ... show more2024-11-16T17:25:47.090481shield sshd\[8251\]: Invalid user odoo from 66.70.203.223 port 44432
2024-11-16T17:25:47.095631shield sshd\[8251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.203.223
2024-11-16T17:25:49.073792shield sshd\[8251\]: Failed password for invalid user odoo from 66.70.203.223 port 44432 ssh2
2024-11-16T17:27:58.002024shield sshd\[8884\]: Invalid user hadoop from 66.70.203.223 port 59506
2024-11-16T17:27:58.008952shield sshd\[8884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.203.223 show less
2024-11-16T18:26:17.060338+01:00 neo sshd[656735]: Invalid user odoo from 66.70.203.223 port 51754<b ... show more2024-11-16T18:26:17.060338+01:00 neo sshd[656735]: Invalid user odoo from 66.70.203.223 port 51754
... show less
Brute-ForceSSH
Anonymous
2024-11-16T17:57:55+01:00 lb-1 sshd[650669]: pam_unix(sshd:auth): authentication failure; logname= u ... show more2024-11-16T17:57:55+01:00 lb-1 sshd[650669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.203.223 user=root
2024-11-16T17:57:57+01:00 lb-1 sshd[650669]: Failed password for root from 66.70.203.223 port 59698 ssh2
2024-11-16T18:00:00+01:00 lb-1 sshd[650921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.203.223 user=root
2024-11-16T18:00:02+01:00 lb-1 sshd[650921]: Failed password for root from 66.70.203.223 port 45472 ssh2
... show less
Brute-ForceSSH
Anonymous
66.70.203.223 (CA/Canada/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Por ... show more66.70.203.223 (CA/Canada/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Nov 16 11:52:14 server2 sshd[26592]: Failed password for root from 66.70.203.223 port 41758 ssh2
Nov 16 11:52:17 server2 sshd[26601]: Failed password for root from 210.107.64.243 port 36408 ssh2
Nov 16 11:52:40 server2 sshd[26733]: Failed password for root from 142.93.222.12 port 48746 ssh2
Nov 16 11:47:35 server2 sshd[24700]: Failed password for root from 92.204.144.151 port 33936 ssh2
Nov 16 11:51:20 server2 sshd[26160]: Failed password for root from 119.41.148.119 port 48964 ssh2
2024-11-16T17:21:53.743257+01:00 v2202410121788293376.supersrv.de sshd[92849]: User root from 66.70. ... show more2024-11-16T17:21:53.743257+01:00 v2202410121788293376.supersrv.de sshd[92849]: User root from 66.70.203.223 not allowed because not listed in AllowUsers
2024-11-16T17:24:01.166761+01:00 v2202410121788293376.supersrv.de sshd[92858]: User root from 66.70.203.223 not allowed because not listed in AllowUsers
2024-11-16T17:26:00.942510+01:00 v2202410121788293376.supersrv.de sshd[92866]: Invalid user ftpuser from 66.70.203.223 port 53640
... show less
Brute-ForceSSH
Anonymous
Nov 16 16:19:56 f2b auth.info sshd[204851]: Failed password for root from 66.70.203.223 port 51500 s ... show moreNov 16 16:19:56 f2b auth.info sshd[204851]: Failed password for root from 66.70.203.223 port 51500 ssh2
Nov 16 16:23:00 f2b auth.info sshd[204857]: Failed password for root from 66.70.203.223 port 47710 ssh2
Nov 16 16:24:58 f2b auth.info sshd[204870]: Invalid user ftpuser from 66.70.203.223 port 33644
... show less
2024-11-16T16:48:58.118852+01:00 sshd[1804239]: Disconnected from authenticating user root 66.70.20 ... show more2024-11-16T16:48:58.118852+01:00 sshd[1804239]: Disconnected from authenticating user root 66.70.203.223 port 60006 [preauth]
2024-11-16T16:51:19.421940+01:00 sshd[1806068]: Disconnected from authenticating user root 66.70.203.223 port 48658 [preauth]
2024-11-16T16:53:19.520328+01:00 sshd[1807533]: Disconnected from authenticating user root 66.70.203.223 port 34532 [preauth] show less