This IP address has been reported a total of 14,442
times from 1,237 distinct
sources.
80.66.75.57 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
80.66.75.57 (RU/Russia/-), 7 distributed sshd attacks on account [root] in the last 3600 secs; Ports ... show more80.66.75.57 (RU/Russia/-), 7 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Mar 29 02:41:44 server5 sshd[19268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.57 user=root
Mar 29 02:32:15 server5 sshd[18013]: Failed password for root from 23.126.62.36 port 35048 ssh2
Mar 29 02:38:50 server5 sshd[18896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.20.249.189 user=root
Mar 29 02:41:46 server5 sshd[19268]: Failed password for root from 80.66.75.57 port 35810 ssh2
Mar 29 02:41:48 server5 sshd[19280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.249.47 user=root
Mar 29 02:30:21 server5 sshd[17818]: Failed password for root from 23.126.62.36 port 47796 ssh2
Mar 29 02:38:52 server5 sshd[18896]: Failed password for root from 198.20.249.189 port 55774 ssh2
Mar 29 00:35:44 corp sshd[17584]: Failed password for invalid user kafka from 80.66.75.57 port 58364 ... show moreMar 29 00:35:44 corp sshd[17584]: Failed password for invalid user kafka from 80.66.75.57 port 58364 ssh2
Mar 29 00:41:38 corp sshd[17910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.57 user=root
Mar 29 00:41:41 corp sshd[17910]: Failed password for root from 80.66.75.57 port 60800 ssh2
... show less
Mar 28 23:58:47 www4 sshd[2381685]: Failed password for invalid user sherkat from 80.66.75.57 port 3 ... show moreMar 28 23:58:47 www4 sshd[2381685]: Failed password for invalid user sherkat from 80.66.75.57 port 33330 ssh2
Mar 29 00:01:20 www4 sshd[2381871]: Invalid user dyblind from 80.66.75.57 port 34604
Mar 29 00:01:20 www4 sshd[2381871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.57
Mar 29 00:01:22 www4 sshd[2381871]: Failed password for invalid user dyblind from 80.66.75.57 port 34604 ssh2
Mar 29 00:02:26 www4 sshd[2381957]: Invalid user jamshid from 80.66.75.57 port 51472
... show less
2024-03-29T04:21:41.403473+01:00 bbb8 sshd[2996111]: Failed password for invalid user lsy from 80.66 ... show more2024-03-29T04:21:41.403473+01:00 bbb8 sshd[2996111]: Failed password for invalid user lsy from 80.66.75.57 port 58780 ssh2
2024-03-29T04:22:43.695442+01:00 bbb8 sshd[2997404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.57 user=root
2024-03-29T04:22:46.115718+01:00 bbb8 sshd[2997404]: Failed password for root from 80.66.75.57 port 39046 ssh2
... show less
2024-03-29T01:17:07.112862+01:00 earnapp sshd[4113357]: Failed password for root from 80.66.75.57 po ... show more2024-03-29T01:17:07.112862+01:00 earnapp sshd[4113357]: Failed password for root from 80.66.75.57 port 52728 ssh2
2024-03-29T01:21:12.243122+01:00 earnapp sshd[4118774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.57 user=root
2024-03-29T01:21:14.520587+01:00 earnapp sshd[4118774]: Failed password for root from 80.66.75.57 port 50268 ssh2
... show less
2024-03-28T18:23:18.450860server2.ebullit.com sshd[13479]: pam_unix(sshd:auth): authentication failu ... show more2024-03-28T18:23:18.450860server2.ebullit.com sshd[13479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.57
2024-03-28T18:23:20.140302server2.ebullit.com sshd[13479]: Failed password for invalid user exim from 80.66.75.57 port 51896 ssh2
2024-03-28T18:24:20.490375server2.ebullit.com sshd[13745]: Invalid user best from 80.66.75.57 port 59604
2024-03-28T18:24:20.495233server2.ebullit.com sshd[13745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.57
2024-03-28T18:24:22.029150server2.ebullit.com sshd[13745]: Failed password for invalid user best from 80.66.75.57 port 59604 ssh2
... show less
Brute-ForceSSH
Anonymous
Mar 28 22:34:35 instance-20210901-2146 sshd[169346]: Invalid user pessoal from 80.66.75.57 port 5369 ... show moreMar 28 22:34:35 instance-20210901-2146 sshd[169346]: Invalid user pessoal from 80.66.75.57 port 53698
Mar 28 22:35:44 instance-20210901-2146 sshd[169406]: Invalid user odoo from 80.66.75.57 port 44310
Mar 28 22:36:54 instance-20210901-2146 sshd[169445]: Invalid user upload from 80.66.75.57 port 56232
... show less
Mar 28 15:33:36 node sshd[2332863]: Failed password for root from 80.66.75.57 port 38860 ssh2
... show moreMar 28 15:33:36 node sshd[2332863]: Failed password for root from 80.66.75.57 port 38860 ssh2
Mar 28 15:34:43 node sshd[2332889]: Invalid user pessoal from 80.66.75.57 port 47530
Mar 28 15:34:43 node sshd[2332889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.57
Mar 28 15:34:45 node sshd[2332889]: Failed password for invalid user pessoal from 80.66.75.57 port 47530 ssh2
Mar 28 15:35:51 node sshd[2332980]: Invalid user odoo from 80.66.75.57 port 41652 show less
Mar 28 21:40:12 s1-4-gra7 sshd[1998808]: Invalid user sftpuser from 80.66.75.57 port 33342
Mar ... show moreMar 28 21:40:12 s1-4-gra7 sshd[1998808]: Invalid user sftpuser from 80.66.75.57 port 33342
Mar 28 21:41:20 s1-4-gra7 sshd[1998839]: Invalid user sr from 80.66.75.57 port 47590 show less