Enter an IP Address, Domain Name, or Subnet:

e.g.   34.204.173.45, microsoft.com, or 5.188.10.0/24


User sasbau joined AbuseIPDB in January 2019 and has reported 115,732* IP addresses.

*Cached value. Updated daily.

10,000+ REPORTED IPS ACTIVE USER WEBMASTER
IP Date Comment Categories
183.103.35.202
Brute-Force SSH
94.191.99.114
Brute-Force SSH
144.217.79.233
Brute-Force SSH
50.67.178.164
Brute-Force SSH
182.72.124.6
Oct 17 18:00:08 * sshd[18886]: Failed password for root from 182.72.124.6 port 56910 ssh2
Brute-Force SSH
139.215.217.181
Oct 17 17:53:37 * sshd[18073]: Failed password for root from 139.215.217.181 port 42800 ssh2
Brute-Force SSH
104.175.32.206
Brute-Force SSH
188.173.80.134
Brute-Force SSH
201.198.151.8
Brute-Force SSH
211.103.82.194
Brute-Force SSH
49.235.88.104
Oct 17 17:47:29 * sshd[17378]: Failed password for root from 49.235.88.104 port 41312 ssh2
Brute-Force SSH
121.160.198.198
Brute-Force SSH
217.113.28.5
Oct 17 17:34:34 * sshd[15813]: Failed password for root from 217.113.28.5 port 52026 ssh2
Brute-Force SSH
193.70.2.117
Brute-Force SSH
203.129.226.99
Brute-Force SSH
128.199.212.82
Brute-Force SSH
144.217.79.233
Oct 17 17:28:21 * sshd[15086]: Failed password for root from 144.217.79.233 port 43824 ssh2
Brute-Force SSH
94.191.99.114
Brute-Force SSH
183.103.35.202
Brute-Force SSH
50.67.178.164
Oct 17 17:03:08 * sshd[12120]: Failed password for root from 50.67.178.164 port 38250 ssh2
Brute-Force SSH
222.186.52.78
Oct 17 17:08:51 * sshd[12765]: Failed password for root from 222.186.52.78 port 12451 ssh2
Brute-Force SSH
177.125.164.225
Brute-Force SSH
188.173.80.134
Brute-Force SSH
211.103.82.194
Brute-Force SSH
104.175.32.206
Oct 17 16:45:24 * sshd[10073]: Failed password for root from 104.175.32.206 port 60862 ssh2
Brute-Force SSH
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/user/26233