Enter an IP Address, Domain Name, or Subnet:

e.g.   35.175.133.127, microsoft.com, or 5.188.10.0/24


User Anze Pratnemer joined AbuseIPDB in April 2020 and has reported 5,476* IP addresses.

*Cached value. Updated daily.

INACTIVE USER
IP Date Comment Categories
120.52.120.166
Invalid user test from 120.52.120.166 port 49891
Brute-Force SSH
31.179.180.202
Failed password for root from 31.179.180.202 port 47087 ssh2
Brute-Force SSH
202.29.33.245
Invalid user student from 202.29.33.245 port 33986
Brute-Force SSH
45.55.224.209
Failed password for root from 45.55.224.209 port 37319 ssh2
Brute-Force SSH
85.222.104.218
Failed password for root from 85.222.104.218 port 42232 ssh2
Brute-Force SSH
27.154.242.142
Failed password for root from 27.154.242.142 port 11416 ssh2
Brute-Force SSH
106.12.88.165
Invalid user vpn from 106.12.88.165 port 56274
Brute-Force SSH
106.12.197.232
Invalid user test from 106.12.197.232 port 34904
Brute-Force SSH
77.132.16.112
Invalid user admin from 77.132.16.112 port 53882
Brute-Force SSH
217.61.1.129
Invalid user www from 217.61.1.129 port 34944
Brute-Force SSH
134.122.72.221
Failed password for root from 134.122.72.221 port 51614 ssh2
Brute-Force SSH
118.98.127.138
Failed password for root from 118.98.127.138 port 59994 ssh2
Brute-Force SSH
113.125.58.0
Invalid user ju from 113.125.58.0 port 40550
Brute-Force SSH
14.18.118.239
Failed password for root from 14.18.118.239 port 48762 ssh2
Brute-Force SSH
92.63.194.90
Invalid user 1234 from 92.63.194.90 port 55534
Brute-Force SSH
92.63.194.59
Invalid user admin from 92.63.194.59 port 46069
Brute-Force SSH
92.63.194.32
Failed password for root from 92.63.194.32 port 36869 ssh2
Brute-Force SSH
92.63.194.25
Invalid user Administrator from 92.63.194.25 port 33885
Brute-Force SSH
92.63.194.22
Invalid user admin from 92.63.194.22 port 40109
Brute-Force SSH
92.63.194.11
Failed password for root from 92.63.194.11 port 39955 ssh2
Brute-Force SSH
222.186.31.166
Failed password for root from 222.186.31.166 port 26391 ssh2
Brute-Force SSH
91.114.44.62
Failed password for root from 91.114.44.62 port 58326 ssh2
Brute-Force SSH
51.68.44.158
Failed password for root from 51.68.44.158 port 34318 ssh2
Brute-Force SSH
51.83.97.44
Failed password for root from 51.83.97.44 port 49754 ssh2
Brute-Force SSH
51.91.101.100
Invalid user test from 51.91.101.100 port 51520
Brute-Force SSH
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/user/42161