This IP address has been reported a total of 710
times from 362 distinct
sources.
81.19.137.94 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-19T15:34:58.795277+02:00 backend sshd[363861]: Disconnected from authenticating user root 81 ... show more2024-09-19T15:34:58.795277+02:00 backend sshd[363861]: Disconnected from authenticating user root 81.19.137.94 port 34764 [preauth]
2024-09-19T15:38:34.594148+02:00 backend sshd[365134]: Invalid user minecraft from 81.19.137.94 port 38652
2024-09-19T15:38:34.608982+02:00 backend sshd[365134]: Disconnected from invalid user minecraft 81.19.137.94 port 38652 [preauth] show less
Sep 19 15:18:43 LuxCars sshd[1109650]: Failed password for invalid user deluge from 81.19.137.94 por ... show moreSep 19 15:18:43 LuxCars sshd[1109650]: Failed password for invalid user deluge from 81.19.137.94 port 47756 ssh2
Sep 19 15:19:22 LuxCars sshd[1109693]: Invalid user intel from 81.19.137.94 port 44808
Sep 19 15:19:22 LuxCars sshd[1109693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94
Sep 19 15:19:22 LuxCars sshd[1109693]: Invalid user intel from 81.19.137.94 port 44808
Sep 19 15:19:24 LuxCars sshd[1109693]: Failed password for invalid user intel from 81.19.137.94 port 44808 ssh2
Sep 19 15:20:01 LuxCars sshd[1109742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94 user=root
Sep 19 15:20:04 LuxCars sshd[1109742]: Failed password for root from 81.19.137.94 port 56728 ssh2
... show less
Sep 19 10:08:17 lasmivm01 sshd[1607413]: Invalid user ftp2 from 81.19.137.94 port 36988
Sep 19 ... show moreSep 19 10:08:17 lasmivm01 sshd[1607413]: Invalid user ftp2 from 81.19.137.94 port 36988
Sep 19 10:08:17 lasmivm01 sshd[1607413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94
Sep 19 10:08:19 lasmivm01 sshd[1607413]: Failed password for invalid user ftp2 from 81.19.137.94 port 36988 ssh2
... show less
2024-09-19T13:53:23.845629+02:00 GTS1 sshd[2462011]: Failed password for root from 81.19.137.94 port ... show more2024-09-19T13:53:23.845629+02:00 GTS1 sshd[2462011]: Failed password for root from 81.19.137.94 port 33782 ssh2
2024-09-19T13:57:39.496945+02:00 GTS1 sshd[2465091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94 user=root
2024-09-19T13:57:41.178569+02:00 GTS1 sshd[2465091]: Failed password for root from 81.19.137.94 port 48900 ssh2
... show less
Sep 19 12:27:51 accessallareas sshd[580799]: Invalid user chris from 81.19.137.94 port 60480
S ... show moreSep 19 12:27:51 accessallareas sshd[580799]: Invalid user chris from 81.19.137.94 port 60480
Sep 19 12:29:06 accessallareas sshd[581055]: Invalid user root2 from 81.19.137.94 port 40084
Sep 19 12:29:43 accessallareas sshd[581067]: Invalid user p from 81.19.137.94 port 53498
... show less
Sep 19 10:32:30 hecnet-us-east-gw sshd[333032]: User root from 81.19.137.94 not allowed because not ... show moreSep 19 10:32:30 hecnet-us-east-gw sshd[333032]: User root from 81.19.137.94 not allowed because not listed in AllowUsers
Sep 19 10:32:32 hecnet-us-east-gw sshd[333032]: Failed password for invalid user root from 81.19.137.94 port 49298 ssh2
Sep 19 10:32:34 hecnet-us-east-gw sshd[333032]: Disconnected from invalid user root 81.19.137.94 port 49298 [preauth]
... show less