This IP address has been reported a total of 710
times from 362 distinct
sources.
81.19.137.94 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Sep 19 17:33:24 dagasistemas sshd[17763]: Invalid user username from 81.19.137.94 port 40012
S ... show moreSep 19 17:33:24 dagasistemas sshd[17763]: Invalid user username from 81.19.137.94 port 40012
Sep 19 17:33:24 dagasistemas sshd[17763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94
Sep 19 17:33:26 dagasistemas sshd[17763]: Failed password for invalid user username from 81.19.137.94 port 40012 ssh2
... show less
Sep 19 19:06:35 lnxweb62 sshd[16579]: Failed password for invalid user csgoserver from 81.19.137.94 ... show moreSep 19 19:06:35 lnxweb62 sshd[16579]: Failed password for invalid user csgoserver from 81.19.137.94 port 48034 ssh2
Sep 19 19:06:37 lnxweb62 sshd[16579]: Disconnected from invalid user csgoserver 81.19.137.94 port 48034 [preauth]
Sep 19 19:08:38 lnxweb62 sshd[17622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94 user=root
Sep 19 19:08:40 lnxweb62 sshd[17622]: Failed password for root from 81.19.137.94 port 44110 ssh2
Sep 19 19:08:42 lnxweb62 sshd[17622]: Disconnected from authenticating user root 81.19.137.94 port 44110 [preauth]
... show less
Sep 19 18:53:38 v22019038103785759 sshd\[25729\]: Invalid user fox from 81.19.137.94 port 55572<br / ... show moreSep 19 18:53:38 v22019038103785759 sshd\[25729\]: Invalid user fox from 81.19.137.94 port 55572
Sep 19 18:53:38 v22019038103785759 sshd\[25729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94
Sep 19 18:53:40 v22019038103785759 sshd\[25729\]: Failed password for invalid user fox from 81.19.137.94 port 55572 ssh2
Sep 19 18:58:12 v22019038103785759 sshd\[26095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94 user=root
Sep 19 18:58:14 v22019038103785759 sshd\[26095\]: Failed password for root from 81.19.137.94 port 42640 ssh2
... show less
Illegal access attempt:2024-09-19T18:33:02.738291+02:00 xn--kster-juait sshd[790836]: Failed passwor ... show moreIllegal access attempt:2024-09-19T18:33:02.738291+02:00 xn--kster-juait sshd[790836]: Failed password for root from 81.19.137.94 port 56410 ssh2
2024-09-19T18:33:04.421824+02:00 xn--kster-juait sshd[790836]: error: maximum authentication attempts exceeded for root from 81.19.137.94 port 56410 ssh2 [preauth]
... show less
Sep 20 00:02:22 doubuntu sshd[1176193]: Invalid user ts3server from 81.19.137.94 port 53748
Se ... show moreSep 20 00:02:22 doubuntu sshd[1176193]: Invalid user ts3server from 81.19.137.94 port 53748
Sep 20 00:02:23 doubuntu sshd[1176193]: Disconnected from invalid user ts3server 81.19.137.94 port 53748 [preauth]
Sep 20 00:08:13 doubuntu sshd[1176357]: Disconnected from authenticating user root 81.19.137.94 port 54124 [preauth]
... show less
Attempted SSH connection from 81.19.137.94 port 33316 in ripe; no valid users in that region
Port ScanSSH
Anonymous
Sep 19 11:05:38 v sshd\[5295\]: Invalid user pedro from 81.19.137.94 port 38986
Sep 19 11:05:3 ... show moreSep 19 11:05:38 v sshd\[5295\]: Invalid user pedro from 81.19.137.94 port 38986
Sep 19 11:05:38 v sshd\[5295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94
Sep 19 11:05:40 v sshd\[5295\]: Failed password for invalid user pedro from 81.19.137.94 port 38986 ssh2
... show less
2024-09-19T14:39:30.909696+00:00 arch.xny sshd[511427]: Invalid user ftpuser1 from 81.19.137.94 port ... show more2024-09-19T14:39:30.909696+00:00 arch.xny sshd[511427]: Invalid user ftpuser1 from 81.19.137.94 port 36266
2024-09-19T14:39:30.920862+00:00 arch.xny sshd[511427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94
2024-09-19T14:39:32.753413+00:00 arch.xny sshd[511427]: Failed password for invalid user ftpuser1 from 81.19.137.94 port 36266 ssh2
2024-09-19T14:40:11.437224+00:00 arch.xny sshd[511433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94 user=root
2024-09-19T14:40:13.565915+00:00 arch.xny sshd[511433]: Failed password for root from 81.19.137.94 port 51844 ssh2
... show less
Sep 19 14:20:02 eltispisrv01 sshd[3521993]: Failed password for root from 81.19.137.94 port 33882 ss ... show moreSep 19 14:20:02 eltispisrv01 sshd[3521993]: Failed password for root from 81.19.137.94 port 33882 ssh2
Sep 19 14:20:41 eltispisrv01 sshd[3522137]: Invalid user teste from 81.19.137.94 port 52034
Sep 19 14:20:41 eltispisrv01 sshd[3522137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.137.94
Sep 19 14:20:41 eltispisrv01 sshd[3522137]: Invalid user teste from 81.19.137.94 port 52034
Sep 19 14:20:42 eltispisrv01 sshd[3522137]: Failed password for invalid user teste from 81.19.137.94 port 52034 ssh2
... show less