Check an IP Address, Domain Name, or Subnet
e.g. 3.239.59.31, microsoft.com, or 5.188.10.0/24
The webmaster of ufn.edu.br joined AbuseIPDB in August 2019 and has reported 983,979 IP addresses.
Standing (weight) is good.
ACTIVE USER
WEBMASTER
SUPPORTER
- « Previous
- Next »
IP | Date | Comment | Categories |
---|---|---|---|
![]() |
Oct 4 23:45:21 ws12vmsma01 sshd[21703]: Invalid user vbox from 185.254.96.47
Oct 4 23:45:23 ... show moreOct 4 23:45:21 ws12vmsma01 sshd[21703]: Invalid user vbox from 185.254.96.47
Oct 4 23:45:23 ws12vmsma01 sshd[21703]: Failed password for invalid user vbox from 185.254.96.47 port 57530 ssh2 Oct 4 23:49:51 ws12vmsma01 sshd[22344]: Invalid user ass from 185.254.96.47 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:42:48 ws22vmsma01 sshd[14934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:42:48 ws22vmsma01 sshd[14934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.216.172.202
Oct 4 23:42:51 ws22vmsma01 sshd[14934]: Failed password for invalid user ubnt from 200.216.172.202 port 58523 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:41:33 ws12vmsma01 sshd[21123]: Failed password for root from 212.125.27.89 port 40869 ssh2 ... show moreOct 4 23:41:33 ws12vmsma01 sshd[21123]: Failed password for root from 212.125.27.89 port 40869 ssh2
Oct 4 23:41:43 ws12vmsma01 sshd[21123]: error: maximum authentication attempts exceeded for root from 212.125.27.89 port 40869 ssh2 [preauth] Oct 4 23:41:43 ws12vmsma01 sshd[21123]: Disconnecting: Too many authentication failures for root [preauth] ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:32:07 ws12vmsma01 sshd[19771]: Invalid user dani from 14.139.114.194
Oct 4 23:32:10 ... show moreOct 4 23:32:07 ws12vmsma01 sshd[19771]: Invalid user dani from 14.139.114.194
Oct 4 23:32:10 ws12vmsma01 sshd[19771]: Failed password for invalid user dani from 14.139.114.194 port 35914 ssh2 Oct 4 23:36:17 ws12vmsma01 sshd[20413]: Invalid user huawei from 14.139.114.194 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:32:24 ws12vmsma01 sshd[19809]: Invalid user marek from 99.150.199.10
Oct 4 23:32:27 ... show moreOct 4 23:32:24 ws12vmsma01 sshd[19809]: Invalid user marek from 99.150.199.10
Oct 4 23:32:27 ws12vmsma01 sshd[19809]: Failed password for invalid user marek from 99.150.199.10 port 22024 ssh2 Oct 4 23:36:07 ws12vmsma01 sshd[20353]: Invalid user dert from 99.150.199.10 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:30:30 ws12vmsma01 sshd[19565]: Failed password for invalid user branch from 43.156.124.108 ... show moreOct 4 23:30:30 ws12vmsma01 sshd[19565]: Failed password for invalid user branch from 43.156.124.108 port 56180 ssh2
Oct 4 23:35:38 ws12vmsma01 sshd[20252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.124.108 user=root Oct 4 23:35:40 ws12vmsma01 sshd[20252]: Failed password for root from 43.156.124.108 port 56868 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:35:27 ws22vmsma01 sshd[12951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:35:27 ws22vmsma01 sshd[12951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.24.229
Oct 4 23:35:29 ws22vmsma01 sshd[12951]: Failed password for invalid user vyos from 42.51.24.229 port 33646 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:32:55 ws22vmsma01 sshd[12323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:32:55 ws22vmsma01 sshd[12323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.237.24
Oct 4 23:32:58 ws22vmsma01 sshd[12323]: Failed password for invalid user lang from 119.29.237.24 port 49562 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:27:39 ws12vmsma01 sshd[19113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:27:39 ws12vmsma01 sshd[19113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.232.98.230
Oct 4 23:27:39 ws12vmsma01 sshd[19113]: Invalid user xcc from 136.232.98.230 Oct 4 23:27:41 ws12vmsma01 sshd[19113]: Failed password for invalid user xcc from 136.232.98.230 port 34648 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:22:30 ws12vmsma01 sshd[18379]: Invalid user irina from 154.83.12.80
Oct 4 23:22:33 ... show moreOct 4 23:22:30 ws12vmsma01 sshd[18379]: Invalid user irina from 154.83.12.80
Oct 4 23:22:33 ws12vmsma01 sshd[18379]: Failed password for invalid user irina from 154.83.12.80 port 37882 ssh2 Oct 4 23:27:36 ws12vmsma01 sshd[19092]: Invalid user lanet from 154.83.12.80 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:21:21 ws22vmsma01 sshd[9436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:21:21 ws22vmsma01 sshd[9436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.210.76.253
Oct 4 23:21:23 ws22vmsma01 sshd[9436]: Failed password for invalid user admin from 149.210.76.253 port 57614 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:06:19 ws22vmsma01 sshd[5470]: Failed password for root from 103.115.104.38 port 46724 ssh2 ... show moreOct 4 23:06:19 ws22vmsma01 sshd[5470]: Failed password for root from 103.115.104.38 port 46724 ssh2
Oct 4 23:14:33 ws22vmsma01 sshd[7676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.104.38 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:00:53 ws12vmsma01 sshd[15240]: Invalid user packet from 124.220.44.91
Oct 4 23:00:5 ... show moreOct 4 23:00:53 ws12vmsma01 sshd[15240]: Invalid user packet from 124.220.44.91
Oct 4 23:00:54 ws12vmsma01 sshd[15240]: Failed password for invalid user packet from 124.220.44.91 port 42612 ssh2 Oct 4 23:07:19 ws12vmsma01 sshd[16163]: Invalid user mws from 124.220.44.91 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:07:04 ws22vmsma01 sshd[5669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:07:04 ws22vmsma01 sshd[5669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.33.6.232
Oct 4 23:07:05 ws22vmsma01 sshd[5669]: Failed password for invalid user matt from 45.33.6.232 port 36946 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:05:23 ws22vmsma01 sshd[5228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:05:23 ws22vmsma01 sshd[5228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.230.235.117
Oct 4 23:05:25 ws22vmsma01 sshd[5228]: Failed password for invalid user v2 from 150.230.235.117 port 57590 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:04:16 ws22vmsma01 sshd[4929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:04:16 ws22vmsma01 sshd[4929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.81.111.101
Oct 4 23:04:17 ws22vmsma01 sshd[4929]: Failed password for invalid user solr from 51.81.111.101 port 45064 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 23:00:03 ws22vmsma01 sshd[3753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 23:00:03 ws22vmsma01 sshd[3753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.195.222.251
Oct 4 23:00:05 ws22vmsma01 sshd[3753]: Failed password for invalid user admin from 124.195.222.251 port 60175 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 5 01:42:25 wslbvm01 sshd[2249868]: Invalid user mk from 64.227.158.85 port 33732
Oct 5 0 ... show moreOct 5 01:42:25 wslbvm01 sshd[2249868]: Invalid user mk from 64.227.158.85 port 33732
Oct 5 01:42:28 wslbvm01 sshd[2249868]: Failed password for invalid user mk from 64.227.158.85 port 33732 ssh2 Oct 5 01:44:18 wslbvm01 sshd[2250356]: Invalid user node1 from 64.227.158.85 port 47424 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 22:39:26 ws22vmsma01 sshd[30998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 22:39:26 ws22vmsma01 sshd[30998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.174.136.146
Oct 4 22:39:27 ws22vmsma01 sshd[30998]: Failed password for invalid user admin from 185.174.136.146 port 57788 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 22:39:08 ws22vmsma01 sshd[30806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 22:39:08 ws22vmsma01 sshd[30806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.219.117.191
Oct 4 22:39:10 ws22vmsma01 sshd[30806]: Failed password for invalid user admin from 178.219.117.191 port 48934 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 5 01:32:36 wslbvm01 sshd[2247252]: Failed password for invalid user cumulus from 112.216.108.62 ... show moreOct 5 01:32:36 wslbvm01 sshd[2247252]: Failed password for invalid user cumulus from 112.216.108.62 port 44526 ssh2
Oct 5 01:34:19 wslbvm01 sshd[2247710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.108.62 user=root Oct 5 01:34:22 wslbvm01 sshd[2247710]: Failed password for root from 112.216.108.62 port 58844 ssh2 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 22:19:19 ws12vmsma01 sshd[9458]: Invalid user ts3server from 175.144.158.39
Oct 4 22:1 ... show moreOct 4 22:19:19 ws12vmsma01 sshd[9458]: Invalid user ts3server from 175.144.158.39
Oct 4 22:19:22 ws12vmsma01 sshd[9458]: Failed password for invalid user ts3server from 175.144.158.39 port 45945 ssh2 Oct 4 22:24:34 ws12vmsma01 sshd[10329]: Invalid user ustc from 175.144.158.39 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 22:19:45 ws12vmsma01 sshd[9516]: Invalid user lhj from 129.226.210.215
Oct 4 22:19:46 ... show moreOct 4 22:19:45 ws12vmsma01 sshd[9516]: Invalid user lhj from 129.226.210.215
Oct 4 22:19:46 ws12vmsma01 sshd[9516]: Failed password for invalid user lhj from 129.226.210.215 port 46088 ssh2 Oct 4 22:24:30 ws12vmsma01 sshd[10279]: Invalid user ustc from 129.226.210.215 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 22:19:59 ws12vmsma01 sshd[9549]: Invalid user sonar from 208.64.230.217
Oct 4 22:20:01 ... show moreOct 4 22:19:59 ws12vmsma01 sshd[9549]: Invalid user sonar from 208.64.230.217
Oct 4 22:20:01 ws12vmsma01 sshd[9549]: Failed password for invalid user sonar from 208.64.230.217 port 54534 ssh2 Oct 4 22:24:11 ws12vmsma01 sshd[10163]: Invalid user ustc from 208.64.230.217 ... show less |
Brute-Force SSH | |
![]() |
Oct 4 22:21:53 ws12vmsma01 sshd[9782]: Failed password for invalid user azael from 201.124.192.136 ... show moreOct 4 22:21:53 ws12vmsma01 sshd[9782]: Failed password for invalid user azael from 201.124.192.136 port 47022 ssh2
Oct 4 22:23:32 ws12vmsma01 sshd[10040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.124.192.136 user=root Oct 4 22:23:35 ws12vmsma01 sshd[10040]: Failed password for root from 201.124.192.136 port 38434 ssh2 ... show less |
Brute-Force SSH |
- « Previous
- Next »