This IP address has been reported a total of 181
times from 138 distinct
sources.
80.104.209.141 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 2 17:42:53 Host-KEWR-E sshd[134621]: User root from 80.104.209.141 not allowed because not list ... show moreOct 2 17:42:53 Host-KEWR-E sshd[134621]: User root from 80.104.209.141 not allowed because not listed in AllowUsers
... show less
(sshd) Failed SSH login from 80.104.209.141 (IT/Italy/host-80-104-209-141.retail.telecomitalia.it): ... show more(sshd) Failed SSH login from 80.104.209.141 (IT/Italy/host-80-104-209-141.retail.telecomitalia.it): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 2 16:14:35 14484 sshd[27281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root
Oct 2 16:14:37 14484 sshd[27281]: Failed password for root from 80.104.209.141 port 44614 ssh2
Oct 2 16:17:27 14484 sshd[27495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root
Oct 2 16:17:29 14484 sshd[27495]: Failed password for root from 80.104.209.141 port 59966 ssh2
Oct 2 16:18:08 14484 sshd[27556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root show less
Brute-ForceSSH
Anonymous
Oct 2 21:04:54 ns5024002 sshd[1717445]: Failed password for root from 80.104.209.141 port 57437 ssh ... show moreOct 2 21:04:54 ns5024002 sshd[1717445]: Failed password for root from 80.104.209.141 port 57437 ssh2
Oct 2 21:05:37 ns5024002 sshd[1718613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root
Oct 2 21:05:38 ns5024002 sshd[1718613]: Failed password for root from 80.104.209.141 port 35594 ssh2
Oct 2 21:06:19 ns5024002 sshd[1719846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=ubuntu
Oct 2 21:06:21 ns5024002 sshd[1719846]: Failed password for ubuntu from 80.104.209.141 port 41982 ssh2
... show less
(sshd) Failed SSH login from 80.104.209.141 (IT/Italy/host-80-104-209-141.retail.telecomitalia.it): ... show more(sshd) Failed SSH login from 80.104.209.141 (IT/Italy/host-80-104-209-141.retail.telecomitalia.it): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 2 15:46:35 16775 sshd[14765]: Invalid user mc from 80.104.209.141 port 57788
Oct 2 15:46:37 16775 sshd[14765]: Failed password for invalid user mc from 80.104.209.141 port 57788 ssh2
Oct 2 15:50:44 16775 sshd[15052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root
Oct 2 15:50:46 16775 sshd[15052]: Failed password for root from 80.104.209.141 port 50359 ssh2
Oct 2 15:51:25 16775 sshd[15123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root show less
2024-10-02T22:23:52.562363+02:00 fusco sshd[1667402]: pam_unix(sshd:auth): authentication failure; l ... show more2024-10-02T22:23:52.562363+02:00 fusco sshd[1667402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root
2024-10-02T22:23:54.057810+02:00 fusco sshd[1667402]: Failed password for root from 80.104.209.141 port 43848 ssh2
2024-10-02T22:24:35.360264+02:00 fusco sshd[1668421]: Invalid user ubuntu from 80.104.209.141 port 50329
... show less
2024-10-02T20:23:45.748962+00:00 taurus sshd[72611]: pam_unix(sshd:auth): authentication failure; lo ... show more2024-10-02T20:23:45.748962+00:00 taurus sshd[72611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root
2024-10-02T20:23:47.616951+00:00 taurus sshd[72611]: Failed password for root from 80.104.209.141 port 34588 ssh2
2024-10-02T20:24:28.992515+00:00 taurus sshd[72615]: Invalid user ubuntu from 80.104.209.141 port 41069
... show less
SSH Brute force: 5 attempts were recorded from 80.104.209.141
2024-10-02T21:37:07+02:00 Discon ... show moreSSH Brute force: 5 attempts were recorded from 80.104.209.141
2024-10-02T21:37:07+02:00 Disconnected from authenticating user root 80.104.209.141 port 49194 [preauth]
2024-10-02T21:42:27+02:00 Disconnected from authenticating user root 80.104.209.141 port 46796 [preauth]
2024-10-02T21:43:12+02:00 Disconnected from authenticating user root 80.104.209.141 port 53437 [preauth]
2024-10-02T21:43:56+02:00 Disconnected from authenticating user root 80.104.209.141 port 60080 [preauth]
2024-10-02T21:44:37+02:00 Disconnected from authenticating user root 80.104.209.141 port 38491 [preauth] show less
Report 1359271 with IP 2406821 for SSH brute-force attack by source 2401496 via ssh-honeypot/0.2.0+h ... show moreReport 1359271 with IP 2406821 for SSH brute-force attack by source 2401496 via ssh-honeypot/0.2.0+http show less
Oct 3 05:47:51 samba sshd[66442]: Failed password for root from 80.104.209.141 port 40170 ssh2<br / ... show moreOct 3 05:47:51 samba sshd[66442]: Failed password for root from 80.104.209.141 port 40170 ssh2
Oct 3 05:48:47 samba sshd[66514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root
Oct 3 05:48:49 samba sshd[66514]: Failed password for root from 80.104.209.141 port 47956 ssh2
Oct 3 05:49:41 samba sshd[66678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.104.209.141 user=root
Oct 3 05:49:43 samba sshd[66678]: Failed password for root from 80.104.209.141 port 55741 ssh2 show less