This IP address has been reported a total of 19 times from 12 distinct sources.
91.219.238.43 was first reported on , and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Feb 22 23:20:26 c220-vlx sshd[165132]: User root from 91.219.238.43 not allowed because listed in De ... show moreFeb 22 23:20:26 c220-vlx sshd[165132]: User root from 91.219.238.43 not allowed because listed in DenyUsers
Feb 22 23:20:28 c220-vlx sshd[165132]: Failed password for invalid user root from 91.219.238.43 port 39678 ssh2
... show less
Feb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does ... show moreFeb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:18:15 h2040555 sshd[12134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:18:16 h2040555 sshd[12134]: Failed password for r.r from 91.219.238.43 port 41858 ssh2
Feb 22 18:18:16 h2040555 sshd[12134]: Received disconnect from 91.219.238.43: 11: Bye Bye [preauth]
Feb 22 18:29:47 h2040555 sshd[12251]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:29:47 h2040555 sshd[12251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:29:49 h2040555 sshd[12251]: Failed password for r.r from 91.219.238.43 port 57604 ssh2
Feb 22 18:29:49 h2040555 sshd[12251]: Received disconnect from 91.219.238.........
------------------------------- show less
Feb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does ... show moreFeb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:18:15 h2040555 sshd[12134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:18:16 h2040555 sshd[12134]: Failed password for r.r from 91.219.238.43 port 41858 ssh2
Feb 22 18:18:16 h2040555 sshd[12134]: Received disconnect from 91.219.238.43: 11: Bye Bye [preauth]
Feb 22 18:29:47 h2040555 sshd[12251]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:29:47 h2040555 sshd[12251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:29:49 h2040555 sshd[12251]: Failed password for r.r from 91.219.238.43 port 57604 ssh2
Feb 22 18:29:49 h2040555 sshd[12251]: Received disconnect from 91.219.238.........
------------------------------- show less
Feb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does ... show moreFeb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:18:15 h2040555 sshd[12134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:18:16 h2040555 sshd[12134]: Failed password for r.r from 91.219.238.43 port 41858 ssh2
Feb 22 18:18:16 h2040555 sshd[12134]: Received disconnect from 91.219.238.43: 11: Bye Bye [preauth]
Feb 22 18:29:47 h2040555 sshd[12251]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:29:47 h2040555 sshd[12251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:29:49 h2040555 sshd[12251]: Failed password for r.r from 91.219.238.43 port 57604 ssh2
Feb 22 18:29:49 h2040555 sshd[12251]: Received disconnect from 91.219.238.........
------------------------------- show less
Feb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does ... show moreFeb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:18:15 h2040555 sshd[12134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:18:16 h2040555 sshd[12134]: Failed password for r.r from 91.219.238.43 port 41858 ssh2
Feb 22 18:18:16 h2040555 sshd[12134]: Received disconnect from 91.219.238.43: 11: Bye Bye [preauth]
Feb 22 18:29:47 h2040555 sshd[12251]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:29:47 h2040555 sshd[12251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:29:49 h2040555 sshd[12251]: Failed password for r.r from 91.219.238.43 port 57604 ssh2
Feb 22 18:29:49 h2040555 sshd[12251]: Received disconnect from 91.219.238.........
------------------------------- show less
Feb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does ... show moreFeb 22 18:18:15 h2040555 sshd[12134]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:18:15 h2040555 sshd[12134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:18:16 h2040555 sshd[12134]: Failed password for r.r from 91.219.238.43 port 41858 ssh2
Feb 22 18:18:16 h2040555 sshd[12134]: Received disconnect from 91.219.238.43: 11: Bye Bye [preauth]
Feb 22 18:29:47 h2040555 sshd[12251]: Address 91.219.238.43 maps to sa0012.azar-a.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:29:47 h2040555 sshd[12251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=r.r
Feb 22 18:29:49 h2040555 sshd[12251]: Failed password for r.r from 91.219.238.43 port 57604 ssh2
Feb 22 18:29:49 h2040555 sshd[12251]: Received disconnect from 91.219.238.........
------------------------------- show less
2021-02-22T22:40:47.292154ARCHHOST sshd[4821]: Failed password for root from 91.219.238.43 port 5953 ... show more2021-02-22T22:40:47.292154ARCHHOST sshd[4821]: Failed password for root from 91.219.238.43 port 59530 ssh2
2021-02-22T22:43:37.450033ARCHHOST sshd[4824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=root
2021-02-22T22:43:39.212207ARCHHOST sshd[4824]: Failed password for root from 91.219.238.43 port 43568 ssh2
2021-02-22T22:46:22.660124ARCHHOST sshd[4827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=root
2021-02-22T22:46:25.075616ARCHHOST sshd[4827]: Failed password for root from 91.219.238.43 port 55838 ssh2
... show less
Feb 22 22:38:12 web sshd[700986]: Failed password for root from 91.219.238.43 port 36686 ssh2
... show moreFeb 22 22:38:12 web sshd[700986]: Failed password for root from 91.219.238.43 port 36686 ssh2
Feb 22 22:41:08 web sshd[701208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.238.43 user=root
Feb 22 22:41:10 web sshd[701208]: Failed password for root from 91.219.238.43 port 48958 ssh2
... show less