This IP address has been reported a total of 22,243
times from 1,593 distinct
sources.
82.207.8.242 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Mar 16 05:31:18 setebos sshd[890879]: Failed password for root from 82.207.8.242 port 31510 ssh2<br ... show moreMar 16 05:31:18 setebos sshd[890879]: Failed password for root from 82.207.8.242 port 31510 ssh2
Mar 16 05:34:09 setebos sshd[891226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 16 05:34:12 setebos sshd[891226]: Failed password for root from 82.207.8.242 port 49991 ssh2
Mar 16 05:35:16 setebos sshd[891373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 16 05:35:17 setebos sshd[891373]: Failed password for root from 82.207.8.242 port 61076 ssh2
... show less
Mar 13 13:16:43 SH-VS-DV sshd[713974]: Failed password for root from 82.207.8.242 port 35579 ssh2<br ... show moreMar 13 13:16:43 SH-VS-DV sshd[713974]: Failed password for root from 82.207.8.242 port 35579 ssh2
Mar 13 13:17:41 SH-VS-DV sshd[714015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 13 13:17:43 SH-VS-DV sshd[714015]: Failed password for root from 82.207.8.242 port 46803 ssh2
Mar 13 13:18:44 SH-VS-DV sshd[714053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 13 13:18:47 SH-VS-DV sshd[714053]: Failed password for root from 82.207.8.242 port 58034 ssh2
Mar 13 13:19:48 SH-VS-DV sshd[714101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 13 13:19:50 SH-VS-DV sshd[714101]: Failed password for root from 82.207.8.242 port 4763 ssh2
... show less
Mar 16 04:10:11 b146-04 sshd[3303783]: Failed password for root from 82.207.8.242 port 54800 ssh2<br ... show moreMar 16 04:10:11 b146-04 sshd[3303783]: Failed password for root from 82.207.8.242 port 54800 ssh2
Mar 16 04:11:22 b146-04 sshd[3303836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 16 04:11:24 b146-04 sshd[3303836]: Failed password for root from 82.207.8.242 port 3384 ssh2
... show less
Mar 16 09:55:12 plesk sshd[17445]: Failed password for root from 82.207.8.242 port 5359 ssh2
M ... show moreMar 16 09:55:12 plesk sshd[17445]: Failed password for root from 82.207.8.242 port 5359 ssh2
Mar 16 09:56:17 plesk sshd[17679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 16 09:56:20 plesk sshd[17679]: Failed password for root from 82.207.8.242 port 16401 ssh2
Mar 16 09:57:23 plesk sshd[17879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 16 09:57:25 plesk sshd[17879]: Failed password for root from 82.207.8.242 port 27443 ssh2 show less
Mar 16 15:36:20 ftp sshd[293012]: Failed password for root from 82.207.8.242 port 50279 ssh2
M ... show moreMar 16 15:36:20 ftp sshd[293012]: Failed password for root from 82.207.8.242 port 50279 ssh2
Mar 16 15:37:28 ftp sshd[293019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 16 15:37:30 ftp sshd[293019]: Failed password for root from 82.207.8.242 port 61688 ssh2
... show less
Mar 16 08:33:27 zurich-2 sshd[143262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreMar 16 08:33:27 zurich-2 sshd[143262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
Mar 16 08:33:30 zurich-2 sshd[143262]: Failed password for root from 82.207.8.242 port 34716 ssh2
Mar 16 08:36:42 zurich-2 sshd[143284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.8.242 user=root
... show less
Brute-ForceSSH
Anonymous
Mar 16 08:32:44 *host* sshd\[30705\]: User *user* from 82.207.8.242 not allowed because none of user ... show moreMar 16 08:32:44 *host* sshd\[30705\]: User *user* from 82.207.8.242 not allowed because none of user\'s groups are listed in AllowGroups show less