User dont like exploits, the webmaster of windevents.com, joined AbuseIPDB in January 2022 and has reported 6,774 IP addresses.

Standing (weight) is good.

INACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
13.94.146.246
Failed password for admin from 13.94.146.246 port 40630 ssh2
Brute-Force SSH
4.224.22.134
Failed password for mail from 4.224.22.134 port 56314 ssh2
Brute-Force SSH
131.100.164.234
Failed password for root from 131.100.164.234 port 43424 ssh2
Brute-Force SSH
20.65.91.182
Failed password for root from 20.65.91.182 port 41378 ssh2
Brute-Force SSH
49.87.77.178
Failed password for root from 49.87.77.178 port 40520 ssh2
Brute-Force SSH
8.219.234.194
Failed password for admin from 8.219.234.194 port 52504 ssh2
Brute-Force SSH
114.33.94.191
Failed password for admin from 114.33.94.191 port 37777 ssh2
Brute-Force SSH
80.82.45.96
Failed password for root from 80.82.45.96 port 60588 ssh2
Brute-Force SSH
117.157.87.15
Failed password for root from 117.157.87.15 port 2347 ssh2
Brute-Force SSH
177.161.76.179
Failed password for root from 177.161.76.179 port 55431 ssh2
Brute-Force SSH
220.70.110.190
Failed password for root from 220.70.110.190 port 60772 ssh2
Brute-Force SSH
61.56.172.170
Failed password for root from 61.56.172.170 port 33263 ssh2
Brute-Force SSH
93.70.225.182
Failed password for root from 93.70.225.182 port 34900 ssh2
Brute-Force SSH
221.153.108.222
Failed password for root from 221.153.108.222 port 43004 ssh2
Brute-Force SSH
8.142.110.165
Failed password for admin from 8.142.110.165 port 46706 ssh2
Brute-Force SSH
61.224.19.148
Failed password for root from 61.224.19.148 port 57705 ssh2
Brute-Force SSH
113.98.191.11
Failed password for admin from 113.98.191.11 port 34496 ssh2
Brute-Force SSH
223.95.78.66
Failed password for root from 223.95.78.66 port 58544 ssh2
Brute-Force SSH
209.159.237.175
Failed password for root from 209.159.237.175 port 33497 ssh2
Brute-Force SSH
220.141.26.117
Failed password for root from 220.141.26.117 port 38865 ssh2
Brute-Force SSH
36.234.54.9
Failed password for root from 36.234.54.9 port 40059 ssh2
Brute-Force SSH
177.139.73.88
Failed password for admin from 177.139.73.88 port 52981 ssh2
Brute-Force SSH
159.65.53.91
Failed password for root from 159.65.53.91 port 45154 ssh2
Brute-Force SSH
1.2.232.105
Failed password for root from 1.2.232.105 port 45402 ssh2
Brute-Force SSH
73.54.198.113
Failed password for admin from 73.54.198.113 port 56982 ssh2
Brute-Force SSH
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com