The webmaster of miquelruiz.net joined AbuseIPDB in October 2024 and has reported 7,739 IP addresses.
Standing (weight) is good.
ACTIVE USER
WEBMASTER
- « Previous
- Next »
IP | Date | Comment | Categories |
---|---|---|---|
117.160.3.137 |
2024-12-04T03:22:06.278167+00:00 ns375825 sshd[2483179]: error: kex_exchange_identification: Connect ... show more2024-12-04T03:22:06.278167+00:00 ns375825 sshd[2483179]: error: kex_exchange_identification: Connection closed by remote host
2024-12-04T03:22:06.278713+00:00 ns375825 sshd[2483179]: Connection closed by 117.160.3.137 port 59401 ... show less |
Brute-Force SSH | |
80.82.77.202 |
2024-12-04T01:24:41.796051+00:00 ns375825 sshd[2481487]: Connection closed by 80.82.77.202 port 4481 ... show more2024-12-04T01:24:41.796051+00:00 ns375825 sshd[2481487]: Connection closed by 80.82.77.202 port 44819
2024-12-04T01:24:41.953966+00:00 ns375825 sshd[2481488]: Connection closed by 80.82.77.202 port 17164 [preauth] ... show less |
Brute-Force SSH | |
178.128.151.58 |
2024-12-03T21:45:17.339614+00:00 ns375825 sshd[2478646]: pam_unix(sshd:auth): authentication failure ... show more2024-12-03T21:45:17.339614+00:00 ns375825 sshd[2478646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.151.58 user=root
2024-12-03T21:45:19.137357+00:00 ns375825 sshd[2478646]: Failed password for root from 178.128.151.58 port 35538 ssh2 ... show less |
Brute-Force SSH | |
218.15.166.202 |
2024-12-03T18:41:44.257501+00:00 ns375825 sshd[2476349]: pam_unix(sshd:auth): authentication failure ... show more2024-12-03T18:41:44.257501+00:00 ns375825 sshd[2476349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.15.166.202 user=root
2024-12-03T18:41:46.493613+00:00 ns375825 sshd[2476349]: Failed password for root from 218.15.166.202 port 35612 ssh2 ... show less |
Brute-Force SSH | |
116.198.224.110 |
2024-12-03T15:59:56.421564+00:00 ns375825 sshd[2474327]: Unable to negotiate with 116.198.224.110 po ... show more2024-12-03T15:59:56.421564+00:00 ns375825 sshd[2474327]: Unable to negotiate with 116.198.224.110 port 43712: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2024-12-03T16:01:50.519235+00:00 ns375825 sshd[2474355]: Unable to negotiate with 116.198.224.110 port 42460: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... show less |
Brute-Force SSH | |
47.251.107.129 |
2024-12-03T14:44:29.878352+00:00 ns375825 sshd[2473416]: pam_unix(sshd:auth): authentication failure ... show more2024-12-03T14:44:29.878352+00:00 ns375825 sshd[2473416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.251.107.129 user=root
2024-12-03T14:44:31.564083+00:00 ns375825 sshd[2473416]: Failed password for root from 47.251.107.129 port 49054 ssh2 ... show less |
Brute-Force SSH | |
116.198.224.110 |
2024-12-03T03:56:55.205842+00:00 ns375825 sshd[2465062]: Unable to negotiate with 116.198.224.110 po ... show more2024-12-03T03:56:55.205842+00:00 ns375825 sshd[2465062]: Unable to negotiate with 116.198.224.110 port 32982: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2024-12-03T03:59:44.300507+00:00 ns375825 sshd[2465093]: Unable to negotiate with 116.198.224.110 port 60096: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... show less |
Brute-Force SSH | |
2a06:4880:9000::af |
2024-12-02T20:37:50.141386+00:00 ns375825 sshd[2459332]: Connection closed by 2a06:4880:9000::af por ... show more2024-12-02T20:37:50.141386+00:00 ns375825 sshd[2459332]: Connection closed by 2a06:4880:9000::af port 39467
2024-12-02T20:37:50.250526+00:00 ns375825 sshd[2459333]: Connection closed by 2a06:4880:9000::af port 34651 [preauth] ... show less |
Brute-Force SSH | |
182.92.237.4 |
2024-12-02T19:54:22.920080+00:00 ns375825 sshd[2458839]: pam_unix(sshd:auth): authentication failure ... show more2024-12-02T19:54:22.920080+00:00 ns375825 sshd[2458839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.92.237.4 user=root
2024-12-02T19:54:24.553799+00:00 ns375825 sshd[2458839]: Failed password for root from 182.92.237.4 port 37910 ssh2 ... show less |
Brute-Force SSH | |
87.236.176.78 |
2024-12-02T15:57:24.730969+00:00 ns375825 sshd[2455837]: Connection closed by 87.236.176.78 port 395 ... show more2024-12-02T15:57:24.730969+00:00 ns375825 sshd[2455837]: Connection closed by 87.236.176.78 port 39575
2024-12-02T15:57:24.827462+00:00 ns375825 sshd[2455838]: Connection closed by 87.236.176.78 port 40203 [preauth] ... show less |
Brute-Force SSH | |
172.105.246.139 |
2024-12-02T15:40:58.614084+00:00 ns375825 sshd[2455542]: Connection closed by 172.105.246.139 port 3 ... show more2024-12-02T15:40:58.614084+00:00 ns375825 sshd[2455542]: Connection closed by 172.105.246.139 port 35322
2024-12-02T15:41:10.750493+00:00 ns375825 sshd[2455570]: banner exchange: Connection from 172.105.246.139 port 43006: invalid format ... show less |
Brute-Force SSH | |
206.168.34.55 |
2024-12-02T13:38:25.394490+00:00 ns375825 sshd[2453600]: Connection reset by 206.168.34.55 port 5224 ... show more2024-12-02T13:38:25.394490+00:00 ns375825 sshd[2453600]: Connection reset by 206.168.34.55 port 52244
2024-12-02T13:38:44.011541+00:00 ns375825 sshd[2453602]: Connection closed by 206.168.34.55 port 57752 [preauth] ... show less |
Brute-Force SSH | |
47.251.89.155 |
2024-12-02T07:13:07.355071+00:00 ns375825 sshd[2449019]: pam_unix(sshd:auth): authentication failure ... show more2024-12-02T07:13:07.355071+00:00 ns375825 sshd[2449019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.251.89.155 user=root
2024-12-02T07:13:09.606397+00:00 ns375825 sshd[2449019]: Failed password for root from 47.251.89.155 port 51594 ssh2 ... show less |
Brute-Force SSH | |
39.109.126.42 |
2024-12-02T01:43:04.712635+00:00 ns375825 sshd[2444649]: pam_unix(sshd:auth): authentication failure ... show more2024-12-02T01:43:04.712635+00:00 ns375825 sshd[2444649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.109.126.42 user=root
2024-12-02T01:43:06.354725+00:00 ns375825 sshd[2444649]: Failed password for root from 39.109.126.42 port 43270 ssh2 ... show less |
Brute-Force SSH | |
178.128.151.58 |
2024-12-01T23:27:20.285104+00:00 ns375825 sshd[2442890]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T23:27:20.285104+00:00 ns375825 sshd[2442890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.151.58 user=root
2024-12-01T23:27:22.233674+00:00 ns375825 sshd[2442890]: Failed password for root from 178.128.151.58 port 58024 ssh2 ... show less |
Brute-Force SSH | |
116.1.149.196 |
2024-12-01T17:14:39.296914+00:00 ns375825 sshd[2438269]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T17:14:39.296914+00:00 ns375825 sshd[2438269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.149.196
2024-12-01T17:14:41.133726+00:00 ns375825 sshd[2438269]: Failed password for invalid user elephant from 116.1.149.196 port 37988 ssh2 ... show less |
Brute-Force SSH | |
125.72.54.179 |
2024-12-01T16:37:39.263217+00:00 ns375825 sshd[2437734]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T16:37:39.263217+00:00 ns375825 sshd[2437734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.72.54.179 user=root
2024-12-01T16:37:41.335402+00:00 ns375825 sshd[2437734]: Failed password for root from 125.72.54.179 port 47798 ssh2 ... show less |
Brute-Force SSH | |
4.197.106.54 |
2024-12-01T15:45:25.662694+00:00 ns375825 sshd[2437147]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T15:45:25.662694+00:00 ns375825 sshd[2437147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.197.106.54
2024-12-01T15:45:27.489929+00:00 ns375825 sshd[2437147]: Failed password for invalid user berlin from 4.197.106.54 port 44376 ssh2 ... show less |
Brute-Force SSH | |
120.27.146.94 |
2024-12-01T14:11:54.827951+00:00 ns375825 sshd[2435983]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T14:11:54.827951+00:00 ns375825 sshd[2435983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.27.146.94 user=root
2024-12-01T14:11:57.363096+00:00 ns375825 sshd[2435983]: Failed password for root from 120.27.146.94 port 31644 ssh2 ... show less |
Brute-Force SSH | |
111.53.87.28 |
2024-12-01T14:04:44.831031+00:00 ns375825 sshd[2435832]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T14:04:44.831031+00:00 ns375825 sshd[2435832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.53.87.28
2024-12-01T14:04:46.668820+00:00 ns375825 sshd[2435832]: Failed password for invalid user wangq from 111.53.87.28 port 34033 ssh2 ... show less |
Brute-Force SSH | |
210.172.173.61 |
2024-12-01T14:03:55.618863+00:00 ns375825 sshd[2435817]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T14:03:55.618863+00:00 ns375825 sshd[2435817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.172.173.61
2024-12-01T14:03:57.060620+00:00 ns375825 sshd[2435817]: Failed password for invalid user fateme from 210.172.173.61 port 43032 ssh2 ... show less |
Brute-Force SSH | |
125.91.34.106 |
2024-12-01T13:24:18.546637+00:00 ns375825 sshd[2435352]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T13:24:18.546637+00:00 ns375825 sshd[2435352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.34.106 user=root
2024-12-01T13:24:20.670260+00:00 ns375825 sshd[2435352]: Failed password for root from 125.91.34.106 port 35248 ssh2 ... show less |
Brute-Force SSH | |
143.110.233.79 |
2024-12-01T12:58:39.716534+00:00 ns375825 sshd[2435015]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T12:58:39.716534+00:00 ns375825 sshd[2435015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.233.79
2024-12-01T12:58:41.895028+00:00 ns375825 sshd[2435015]: Failed password for invalid user phillip from 143.110.233.79 port 34154 ssh2 ... show less |
Brute-Force SSH | |
51.68.226.87 |
2024-12-01T12:58:01.154188+00:00 ns375825 sshd[2435001]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T12:58:01.154188+00:00 ns375825 sshd[2435001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.226.87
2024-12-01T12:58:03.116142+00:00 ns375825 sshd[2435001]: Failed password for invalid user iss from 51.68.226.87 port 52638 ssh2 ... show less |
Brute-Force SSH | |
180.76.202.69 |
2024-12-01T12:57:04.063183+00:00 ns375825 sshd[2434982]: pam_unix(sshd:auth): authentication failure ... show more2024-12-01T12:57:04.063183+00:00 ns375825 sshd[2434982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.202.69
2024-12-01T12:57:06.202153+00:00 ns375825 sshd[2434982]: Failed password for invalid user seedbox from 180.76.202.69 port 33874 ssh2 ... show less |
Brute-Force SSH |
- « Previous
- Next »