User szkiddaj joined AbuseIPDB in December 2022 and has reported 99,671 IP addresses.

Standing (weight) is good.

ACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
185.246.128.133
unauthorized connection with user "root" and password "password" at 2024-06-25T09:09:13Z
Brute-Force SSH
141.98.10.106
unauthorized connection with user "luckyren20" and password "luckyren20" at 2024-06-25T09:03:04Z
Brute-Force SSH
103.174.115.172
unauthorized connection with user "root" and password "Password@123123" at 2024-06-25T08:58:04Z
Brute-Force SSH
43.163.221.113
unauthorized connection with user "root" and password "root@2023@" at 2024-06-25T08:56:54Z
Brute-Force SSH
178.141.249.26
unauthorized connection with user "root" and password "P@ssw0rd123@" at 2024-06-25T08:56:33Z
Brute-Force SSH
103.94.113.2
unauthorized connection with user "root" and password "Admin123!@#$" at 2024-06-25T08:54:58Z
Brute-Force SSH
129.226.88.173
unauthorized connection with user "root" and password "Password@123123" at 2024-06-25T08:53:11Z
Brute-Force SSH
45.119.81.249
unauthorized connection with user "postgres" and password "M3gaP33!" at 2024-06-25T08:52:32Z
Brute-Force SSH
35.233.166.33
unauthorized connection with user "ubuntu" and password "1q2w3e4r5t6y" at 2024-06-25T08:50:57Z
Brute-Force SSH
174.138.56.3
unauthorized connection with user "root" and password "default" at 2024-06-25T08:14:03Z
Brute-Force SSH
51.75.120.93
unauthorized connection with user "testftp" and password "test" at 2024-06-25T08:13:57Z
Brute-Force SSH
43.153.9.244
unauthorized connection with user "root" and password "zzz123456" at 2024-06-25T08:13:12Z
Brute-Force SSH
193.151.142.241
unauthorized connection with user "szkiddaj" and password "szkiddaj!23" at 2024-06-25T08:12:52Z
Brute-Force SSH
43.134.241.198
unauthorized connection with user "es" and password "test123" at 2024-06-25T08:12:06Z
Brute-Force SSH
165.154.131.4
unauthorized connection with user "root" and password "ngf1r3wall" at 2024-06-25T08:10:50Z
Brute-Force SSH
45.9.228.30
unauthorized connection with user "root" and password "ngf1r3wall" at 2024-06-25T08:10:26Z
Brute-Force SSH
211.199.187.14
unauthorized connection with user "usr" and password "www.usr.cn" at 2024-06-25T08:03:38Z
Brute-Force SSH
164.215.103.47
unauthorized connection with user "root" and password "admin123$" at 2024-06-25T08:01:31Z
Brute-Force SSH
118.253.177.161
unauthorized connection with user "root" and password "admin123$" at 2024-06-25T08:01:30Z
Brute-Force SSH
80.94.95.81
unauthorized connection with user "root" and password "12345qwer" at 2024-06-25T07:59:37Z
Brute-Force SSH
43.135.135.61
unauthorized connection with user "root" and password "Qwe1234567" at 2024-06-25T07:54:42Z
Brute-Force SSH
36.92.214.178
unauthorized connection with user "root" and password "Lm123456" at 2024-06-25T07:53:14Z
Brute-Force SSH
170.106.65.35
unauthorized connection with user "root" and password "Qwe12345." at 2024-06-25T07:51:59Z
Brute-Force SSH
43.153.14.30
unauthorized connection with user "sysadmin" and password "sysadmin2019" at 2024-06-25T07:51:57Z
Brute-Force SSH
200.237.128.234
unauthorized connection with user "root" and password "Q1w2e3r4t5y6u7" at 2024-06-25T07:50:35Z
Brute-Force SSH
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com