This IP address has been reported a total of 2,908
times from 806 distinct
sources.
81.70.55.204 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
2024-05-27T02:50:38.979453+02:00 aganip sshd[1792198]: Invalid user elastic from 81.70.55.204 port 3 ... show more2024-05-27T02:50:38.979453+02:00 aganip sshd[1792198]: Invalid user elastic from 81.70.55.204 port 33420
2024-05-27T02:55:45.626832+02:00 aganip sshd[1805046]: Invalid user verdaccio from 81.70.55.204 port 38818
... show less
Bad SSHAUTH 2024.05.21 10:10:49
blocked until 2024.05.28 10:10:49
by HoneyPot DE_Baden-W ... show moreBad SSHAUTH 2024.05.21 10:10:49
blocked until 2024.05.28 10:10:49
by HoneyPot DE_Baden-Wurttemberg01 show less
May 21 09:18:59 bla016-truserv-jhb1-001 sshd[3927577]: Failed password for root from 81.70.55.204 po ... show moreMay 21 09:18:59 bla016-truserv-jhb1-001 sshd[3927577]: Failed password for root from 81.70.55.204 port 54628 ssh2
May 21 09:40:36 bla016-truserv-jhb1-001 sshd[3963140]: Invalid user bravo from 81.70.55.204 port 51852
May 21 09:40:36 bla016-truserv-jhb1-001 sshd[3963140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.55.204
May 21 09:40:36 bla016-truserv-jhb1-001 sshd[3963140]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.55.204 user=bravo
May 21 09:40:38 bla016-truserv-jhb1-001 sshd[3963140]: Failed password for invalid user bravo from 81.70.55.204 port 51852 ssh2
... show less
2024-05-20T01:43:48.521749+02:00 debv1 sshd[23835]: Failed password for invalid user elasticsearch f ... show more2024-05-20T01:43:48.521749+02:00 debv1 sshd[23835]: Failed password for invalid user elasticsearch from 81.70.55.204 port 45020 ssh2
2024-05-20T01:44:26.743992+02:00 debv1 sshd[23842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.55.204 user=root
2024-05-20T01:44:28.700839+02:00 debv1 sshd[23842]: Failed password for root from 81.70.55.204 port 54706 ssh2
... show less
2024-05-20T01:26:56.901755+02:00 debv1 sshd[23652]: Failed password for invalid user dev1 from 81.70 ... show more2024-05-20T01:26:56.901755+02:00 debv1 sshd[23652]: Failed password for invalid user dev1 from 81.70.55.204 port 49902 ssh2
2024-05-20T01:28:00.325597+02:00 debv1 sshd[23656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.55.204 user=root
2024-05-20T01:28:02.918150+02:00 debv1 sshd[23656]: Failed password for root from 81.70.55.204 port 59756 ssh2
... show less
May 19 21:38:21 sneaky sshd[3384872]: Invalid user git from 81.70.55.204 port 56982
May 19 21: ... show moreMay 19 21:38:21 sneaky sshd[3384872]: Invalid user git from 81.70.55.204 port 56982
May 19 21:39:06 sneaky sshd[3384922]: Invalid user mysftp from 81.70.55.204 port 41452
May 19 21:39:52 sneaky sshd[3384969]: Invalid user mf from 81.70.55.204 port 54162
May 19 21:40:37 sneaky sshd[3385002]: Invalid user admin from 81.70.55.204 port 38628
May 19 21:42:05 sneaky sshd[3385042]: Invalid user alex from 81.70.55.204 port 35808
... show less