The webmaster of cma.pl joined AbuseIPDB in February 2023 and has reported 7,190 IP addresses.

Standing (weight) is good.

ACTIVE USER WEBMASTER
IP Date Comment Categories
194.169.175.106
Oct 3 18:46:56 serv248043 sshd[1817625]: Invalid user from 194.169.175.106 port 36488
...
Brute-Force SSH
193.106.245.20
Brute-Force SSH
65.49.1.56
Oct 3 18:19:43 serv248043 sshd[1810372]: Invalid user from 65.49.1.56 port 37231
...
Brute-Force SSH
171.244.37.103
Brute-Force SSH
123.127.222.18
Brute-Force SSH
45.192.176.21
Oct 3 18:08:13 serv248043 sshd[1807189]: Invalid user sammy from 45.192.176.21 port 38988
...
Brute-Force SSH
64.227.74.69
Oct 3 18:07:21 serv248043 sshd[1807013]: Invalid user test from 64.227.74.69 port 58558
...
Brute-Force SSH
34.96.239.88
Brute-Force SSH
181.62.251.76
Oct 3 18:06:50 serv248043 sshd[1806834]: Invalid user test from 181.62.251.76 port 60585
...
Brute-Force SSH
104.168.30.102
Brute-Force SSH
81.70.166.44
Oct 3 18:05:53 serv248043 sshd[1806567]: Invalid user deploy from 81.70.166.44 port 49788
...
Brute-Force SSH
198.12.107.228
Brute-Force SSH
59.36.78.190
Oct 3 18:04:49 serv248043 sshd[1806110]: Invalid user git from 59.36.78.190 port 34162
...
Brute-Force SSH
77.82.84.12
Oct 3 18:04:47 serv248043 sshd[1806108]: Invalid user frappe from 77.82.84.12 port 43436
...
Brute-Force SSH
201.6.100.191
Brute-Force SSH
52.161.12.33
Oct 3 18:02:54 serv248043 sshd[1805620]: Invalid user test from 52.161.12.33 port 54024
...
Brute-Force SSH
120.48.179.33
Brute-Force SSH
43.134.237.227
Brute-Force SSH
103.156.224.210
Brute-Force SSH
82.140.0.119
Oct 3 17:05:04 serv248043 sshd[1786236]: Invalid user from 82.140.0.119 port 55644
...
Brute-Force SSH
35.224.42.65
Oct 3 17:01:27 serv248043 sshd[1785328]: Invalid user odoo from 35.224.42.65 port 36528
...
Brute-Force SSH
5.199.138.120
Brute-Force SSH
117.50.50.106
Brute-Force SSH
185.168.118.122
Brute-Force SSH
43.138.115.98
Oct 3 16:56:42 serv248043 sshd[1784072]: Invalid user sammy from 43.138.115.98 port 38190
...
Brute-Force SSH