This IP address has been reported a total of 346
times from 206 distinct
sources.
94.159.104.104 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Feb 27 10:10:27 node106710-www2-cepv-ch sshd[994140]: Failed password for invalid user jenkins from ... show moreFeb 27 10:10:27 node106710-www2-cepv-ch sshd[994140]: Failed password for invalid user jenkins from 94.159.104.104 port 52678 ssh2
Feb 27 10:10:39 node106710-www2-cepv-ch sshd[994142]: Invalid user rust from 94.159.104.104 port 37792
Feb 27 10:10:39 node106710-www2-cepv-ch sshd[994142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.159.104.104
Feb 27 10:10:41 node106710-www2-cepv-ch sshd[994142]: Failed password for invalid user rust from 94.159.104.104 port 37792 ssh2
Feb 27 10:10:54 node106710-www2-cepv-ch sshd[994148]: Invalid user user06 from 94.159.104.104 port 36636
... show less
Feb 27 03:05:57 debian-gitlab sshd[3992277]: Invalid user sa from 94.159.104.104 port 46234
Fe ... show moreFeb 27 03:05:57 debian-gitlab sshd[3992277]: Invalid user sa from 94.159.104.104 port 46234
Feb 27 03:06:11 debian-gitlab sshd[3992285]: Invalid user robert from 94.159.104.104 port 42904
Feb 27 03:07:20 debian-gitlab sshd[3992311]: Invalid user peertube from 94.159.104.104 port 57302
... show less
Honeypot hit from 94.159.104.104 targeting a server in Germany. Unauthorized HTTP access attempt to ... show moreHoneypot hit from 94.159.104.104 targeting a server in Germany. Unauthorized HTTP access attempt to path "/cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/bin/sh", "/cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/bin/sh", "/hello.world?%ADd+allow_url_include%3d1+%ADd+auto_prepend_file%3dphp://input", "/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php", "/vendor/phpunit/phpunit/Util/PHP/eval-stdin.php" show less
Feb 27 06:10:38 : pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= ... show moreFeb 27 06:10:38 : pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.159.104.104 user=root Feb 27 06:10:40 : Failed password for root from 94.159.104.104 port 38570 ssh2 Feb 27 06:10:54 : Invalid user scp from show less
2025-02-27T05:49:41.480587+01:00 cloud1 sshd[354518]: pam_unix(sshd:auth): authentication failure; l ... show more2025-02-27T05:49:41.480587+01:00 cloud1 sshd[354518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.159.104.104
2025-02-27T05:49:43.334468+01:00 cloud1 sshd[354518]: Failed password for invalid user fo from 94.159.104.104 port 34730 ssh2
... show less
Report 1622975 with IP 2670527 for SSH brute-force attack by source 2665200 via ssh-honeypot/0.2.0+h ... show moreReport 1622975 with IP 2670527 for SSH brute-force attack by source 2665200 via ssh-honeypot/0.2.0+http show less