This IP address has been reported a total of 259
times from 44 distinct
sources.
82.196.4.129 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Cluster member (Omitted) (FR/France/-) said, DENY 82.196.4.129, Reason:[(sshd) Failed SSH login from ... show moreCluster member (Omitted) (FR/France/-) said, DENY 82.196.4.129, Reason:[(sshd) Failed SSH login from 82.196.4.129 (NL/The Netherlands/-): 2 in the last (Omitted)] show less
2024-11-28T17:01:40.236964 host sshd[1495623]: Failed password for invalid user XXXX from 82.196.4.1 ... show more2024-11-28T17:01:40.236964 host sshd[1495623]: Failed password for invalid user XXXX from 82.196.4.129 port 36148 ssh2
2024-11-28T17:01:40.631286 host sshd[1495623]: Connection closed by invalid user root 82.196.4.129 port 36148 [preauth]
2024-11-28T17:23:10.746700 host sshd[1495814]: user XXXX from 82.196.4.129 not allowed because not listed in AllowUsers
2024-11-28T17:23:12.405166 host sshd[1495814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.129 user=root
2024-11-28T17:23:14.358101 host sshd[1495814]: Failed password for invalid user XXXX from 82.196.4.129 port 44678 ssh2
... show less
Brute-ForceSSH
Anonymous
Nov 28 13:49:04 web8 sshd\[7072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 eu ... show moreNov 28 13:49:04 web8 sshd\[7072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.129 user=root
Nov 28 13:49:05 web8 sshd\[7072\]: Failed password for root from 82.196.4.129 port 53878 ssh2
Nov 28 13:53:57 web8 sshd\[8522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.129 user=root
Nov 28 13:53:58 web8 sshd\[8522\]: Failed password for root from 82.196.4.129 port 35462 ssh2
Nov 28 13:58:55 web8 sshd\[9862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.129 user=root show less
Report 1475087 with IP 2522637 for SSH brute-force attack by source 2517312 via ssh-honeypot/0.2.0+h ... show moreReport 1475087 with IP 2522637 for SSH brute-force attack by source 2517312 via ssh-honeypot/0.2.0+http show less
2024-11-27T11:49:40.055594+00:00 mail-backup sshd[131445]: User root from 82.196.4.129 not allowed b ... show more2024-11-27T11:49:40.055594+00:00 mail-backup sshd[131445]: User root from 82.196.4.129 not allowed because not listed in AllowUsers
2024-11-27T11:49:40.559774+00:00 mail-backup sshd[131445]: error: maximum authentication attempts exceeded for invalid user root from 82.196.4.129 port 56252 ssh2 [preauth]
2024-11-27T11:58:02.472026+00:00 mail-backup sshd[131507]: User root from 82.196.4.129 not allowed because not listed in AllowUsers show less
Brute-ForceSSH
Anonymous
Detected denied connection attempts from IP 82.196.4.129 on 2024-11-27T07:06:38Z UTC targeting port( ... show moreDetected denied connection attempts from IP 82.196.4.129 on 2024-11-27T07:06:38Z UTC targeting port(s) 22. Action taken: deny. Categories: Brute-Force, SSH. ASN: AS14061, Proxy/VPN: yes show less