This IP address has been reported a total of 535
times from 286 distinct
sources.
92.99.248.53 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-07T14:59:44.831298 socky.stom66.co.uk sshd[1806877]: Invalid user test from 92.99.248.53 por ... show more2024-11-07T14:59:44.831298 socky.stom66.co.uk sshd[1806877]: Invalid user test from 92.99.248.53 port 53572
2024-11-07T15:03:33.016189 socky.stom66.co.uk sshd[1808678]: Invalid user it from 92.99.248.53 port 48628
... show less
Brute-ForceSSH
Anonymous
Nov 7 15:01:58 database sshd[1764051]: Invalid user test from 92.99.248.53 port 59284
...
Nov 7 16:01:12 centrum sshd-session[28275]: Invalid user test from 92.99.248.53 port 40942
No ... show moreNov 7 16:01:12 centrum sshd-session[28275]: Invalid user test from 92.99.248.53 port 40942
Nov 7 16:01:12 centrum sshd-session[28275]: Disconnected from invalid user test 92.99.248.53 port 40942 [preauth]
... show less
Nov 7 13:29:48 dev sshd[1329266]: Failed password for invalid user deployer from 92.99.248.53 port ... show moreNov 7 13:29:48 dev sshd[1329266]: Failed password for invalid user deployer from 92.99.248.53 port 35558 ssh2
Nov 7 13:33:21 dev sshd[1329468]: Invalid user test from 92.99.248.53 port 34236
Nov 7 13:33:21 dev sshd[1329468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.99.248.53
Nov 7 13:33:23 dev sshd[1329468]: Failed password for invalid user test from 92.99.248.53 port 34236 ssh2
Nov 7 13:36:09 dev sshd[1329506]: Invalid user egadmin from 92.99.248.53 port 39132
... show less
Nov 7 12:48:46 hms97855 sshd[224080]: Failed password for invalid user ch from 92.99.248.53 port 38 ... show moreNov 7 12:48:46 hms97855 sshd[224080]: Failed password for invalid user ch from 92.99.248.53 port 38976 ssh2
Nov 7 12:51:48 hms97855 sshd[224089]: Invalid user gz from 92.99.248.53 port 33956
Nov 7 12:51:48 hms97855 sshd[224089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.99.248.53
Nov 7 12:51:50 hms97855 sshd[224089]: Failed password for invalid user gz from 92.99.248.53 port 33956 ssh2
Nov 7 12:54:39 hms97855 sshd[224106]: Invalid user dc from 92.99.248.53 port 43936
... show less
Nov 7 12:37:06 backup sshd[860124]: Failed password for invalid user v from 92.99.248.53 port 54698 ... show moreNov 7 12:37:06 backup sshd[860124]: Failed password for invalid user v from 92.99.248.53 port 54698 ssh2
Nov 7 12:39:43 backup sshd[860611]: Invalid user user_1 from 92.99.248.53 port 40126
Nov 7 12:39:43 backup sshd[860611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.99.248.53
Nov 7 12:39:45 backup sshd[860611]: Failed password for invalid user user_1 from 92.99.248.53 port 40126 ssh2
Nov 7 12:42:26 backup sshd[861057]: Invalid user mh from 92.99.248.53 port 55748
... show less
Nov 7 12:23:42 backup sshd[857744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreNov 7 12:23:42 backup sshd[857744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.99.248.53
Nov 7 12:23:44 backup sshd[857744]: Failed password for invalid user test from 92.99.248.53 port 45868 ssh2
Nov 7 12:26:23 backup sshd[858262]: Invalid user registry from 92.99.248.53 port 59244
Nov 7 12:26:23 backup sshd[858262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.99.248.53
Nov 7 12:26:24 backup sshd[858262]: Failed password for invalid user registry from 92.99.248.53 port 59244 ssh2
... show less
Nov 7 12:05:06 backup sshd[854349]: Failed password for invalid user n from 92.99.248.53 port 53340 ... show moreNov 7 12:05:06 backup sshd[854349]: Failed password for invalid user n from 92.99.248.53 port 53340 ssh2
Nov 7 12:07:41 backup sshd[854833]: Invalid user mg from 92.99.248.53 port 37526
Nov 7 12:07:41 backup sshd[854833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.99.248.53
Nov 7 12:07:43 backup sshd[854833]: Failed password for invalid user mg from 92.99.248.53 port 37526 ssh2
Nov 7 12:10:25 backup sshd[855335]: Invalid user thomas from 92.99.248.53 port 43188
... show less
Nov 7 11:47:49 backup sshd[851376]: Failed password for invalid user ti from 92.99.248.53 port 4083 ... show moreNov 7 11:47:49 backup sshd[851376]: Failed password for invalid user ti from 92.99.248.53 port 40834 ssh2
Nov 7 11:51:22 backup sshd[852023]: Invalid user uz from 92.99.248.53 port 59408
Nov 7 11:51:22 backup sshd[852023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.99.248.53
Nov 7 11:51:24 backup sshd[852023]: Failed password for invalid user uz from 92.99.248.53 port 59408 ssh2
Nov 7 11:54:10 backup sshd[852460]: Invalid user ru from 92.99.248.53 port 35064
... show less
[fail2ban Auto Report] 2024-11-07T06:48:01.009771-05:00 caninetools sshd[1167977]: Invalid user ti f ... show more[fail2ban Auto Report] 2024-11-07T06:48:01.009771-05:00 caninetools sshd[1167977]: Invalid user ti from 92.99.248.53 port 48038
... show less
Nov 7 10:57:34 web3 sshd[2612113]: Failed password for invalid user ftpuser from 92.99.248.53 port ... show moreNov 7 10:57:34 web3 sshd[2612113]: Failed password for invalid user ftpuser from 92.99.248.53 port 36376 ssh2
Nov 7 11:01:13 web3 sshd[2612179]: Invalid user fdadmin from 92.99.248.53 port 41498
Nov 7 11:01:13 web3 sshd[2612179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.99.248.53
Nov 7 11:01:15 web3 sshd[2612179]: Failed password for invalid user fdadmin from 92.99.248.53 port 41498 ssh2
Nov 7 11:06:37 web3 sshd[2612348]: Invalid user thomas from 92.99.248.53 port 34564 show less