The details of the abuse-complaint are as follows:
1. 80.71.232.40:
2025-06-11 20:08.Categories: Brute-Force. Comment: list.rtbh.com.tr report: tcp/0 2025-06-11 15:00.Categories: Port Scan, Brute-Force, SSH. Comment: Invalid user imran from 80.71.232.40 port 40106 2025-06-11 10:38.Categories: Brute-Force, SSH. Comment: Jun 11 03:25:04 ismay sshd[1161196]: Failed password for invalid user rafael from 80.71.232.40 port 38032 ssh2
Jun 11 03:34:17 ismay sshd[1161733]: Invalid user aluno from 80.71.232.40 port 37012
Jun 11 03:34:17 ismay sshd[1161733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 11 03:34:20 ismay sshd[1161733]: Failed password for invalid user aluno from 80.71.232.40 port 37012 ssh2
Jun 11 03:38:20 ismay sshd[1161862]: Invalid user danya from 80.71.232.40 port 56086
… 2025-06-11 10:23.Categories: DDoS Attack Participating, Brute-Force, SSH. Comment: [sshut] (game01) SSH brute force attempt 2025-06-11 10:20.Categories: Port Scan, Brute-Force, SSH. Comment: 4 port probes: 4x tcp/22 (ssh)
[srv132] 2025-06-11 10:05.Categories: Port Scan, Brute-Force, SSH. Comment: 3 port probes: 3x tcp/22 (ssh)
[srv132] 2025-06-11 09:50.Categories: Port Scan, Brute-Force, SSH. Comment: 5 port probes: 5x tcp/22 (ssh)
[srv132] 2025-06-11 09:37.Categories: Brute-Force, SSH. Comment: Jun 11 09:33:56 honey3 sshd[1813261]: Failed password for invalid user admin from 80.71.232.40 port 60972 ssh2
Jun 11 09:33:57 honey3 sshd[1813261]: Disconnected from invalid user admin 80.71.232.40 port 60972 [preauth]
Jun 11 09:37:52 honey3 sshd[1813492]: Invalid user artem from 80.71.232.40 port 46806
Jun 11 09:37:52 honey3 sshd[1813492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 11 09:37:54 honey3 sshd[1813492]: Failed password for invalid user artem from 80.71.232.40 port 46806 ssh2
… 2025-06-11 09:35.Categories: Port Scan, Brute-Force, SSH. Comment: 3 port probes: 3x tcp/22 (ssh)
[srv132] 2025-06-11 09:20.Categories: Port Scan, Brute-Force, SSH. Comment: 4 port probes: 4x tcp/22 (ssh)
[srv132] 2025-06-11 09:05.Categories: Port Scan, Brute-Force, SSH. Comment: 5 port probes: 5x tcp/22 (ssh)
[srv132] 2025-06-11 08:50.Categories: Port Scan, Brute-Force, SSH. Comment: 4 port probes: 4x tcp/22 (ssh)
[srv132] 2025-06-11 08:43.Categories: Brute-Force, SSH. Comment: Jun 11 10:31:50 teamcity sshd[342898]: Invalid user mqm from 80.71.232.40 port 46694
Jun 11 10:39:37 teamcity sshd[345224]: Invalid user long from 80.71.232.40 port 34612
Jun 11 10:43:25 teamcity sshd[346266]: Invalid user tmax from 80.71.232.40 port 56714
… 2025-06-11 08:43.Categories: Brute-Force. Comment: 2025-06-11T08:31:32.326179+00:00 m sshd[3175439]: Invalid user mqm from 80.71.232.40 port 57562
2025-06-11T08:39:19.068571+00:00 m sshd[3176244]: Invalid user long from 80.71.232.40 port 34206
2025-06-11T08:43:08.136985+00:00 m sshd[3176626]: Invalid user tmax from 80.71.232.40 port 38056
… 2025-06-11 08:41.Categories: Brute-Force. Comment: SSH Fail2Ban [srv132] 2025-06-11 08:35.Categories: Port Scan, Brute-Force, SSH. Comment: 2 port probes: 2x tcp/22 (ssh)
[srv132] 2025-06-11 08:32.Categories: Brute-Force, SSH. Comment: Jun 11 08:28:37 honey3 sshd[1807922]: Failed password for invalid user mqm from 80.71.232.40 port 45424 ssh2
Jun 11 08:28:37 honey3 sshd[1807922]: Disconnected from invalid user mqm 80.71.232.40 port 45424 [preauth]
Jun 11 08:32:27 honey3 sshd[1808146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 11 08:32:29 honey3 sshd[1808146]: Failed password for root from 80.71.232.40 port 34566 ssh2
Jun 11 08:32:31 honey3 sshd[1808146]: Disconnected from authenticating user root 80.71.232.40 port 34566 [preauth]
… 2025-06-11 08:20.Categories: Port Scan, Brute-Force, SSH. Comment: Port probe to tcp/22 (ssh)
[srv132] 2025-06-11 08:00.Categories: Brute-Force, SSH. Comment: Jun 11 09:56:54 cirno sshd[1568988]: Invalid user user2 from 80.71.232.40 port 59778
Jun 11 09:56:56 cirno sshd[1568988]: Failed password for invalid user user2 from 80.71.232.40 port 59778 ssh2
Jun 11 10:00:49 cirno sshd[1569527]: Invalid user kp from 80.71.232.40 port 35698
… 2025-06-11 07:41.Categories: Brute-Force, SSH. Comment: Jun 11 09:37:28 cirno sshd[1566258]: Invalid user acer from 80.71.232.40 port 53456
Jun 11 09:37:30 cirno sshd[1566258]: Failed password for invalid user acer from 80.71.232.40 port 53456 ssh2
Jun 11 09:41:22 cirno sshd[1566807]: Invalid user alireza from 80.71.232.40 port 50598
… 2025-06-11 07:21.Categories: Brute-Force, SSH. Comment: Jun 11 09:17:51 cirno sshd[1563406]: Invalid user zhangsan from 80.71.232.40 port 41562
Jun 11 09:17:53 cirno sshd[1563406]: Failed password for invalid user zhangsan from 80.71.232.40 port 41562 ssh2
Jun 11 09:21:39 cirno sshd[1563936]: Invalid user minecraft from 80.71.232.40 port 57530
… 2025-06-11 07:02.Categories: Brute-Force, SSH. Comment: Jun 11 08:58:32 cirno sshd[1560562]: Failed password for invalid user cisco from 80.71.232.40 port 46864 ssh2
Jun 11 09:02:11 cirno sshd[1561109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 11 09:02:13 cirno sshd[1561109]: Failed password for root from 80.71.232.40 port 46372 ssh2
… 2025-06-11 06:42.Categories: Brute-Force, SSH. Comment: Jun 11 08:38:49 cirno sshd[1557757]: Failed password for invalid user code from 80.71.232.40 port 40286 ssh2
Jun 11 08:42:43 cirno sshd[1558325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 11 08:42:45 cirno sshd[1558325]: Failed password for root from 80.71.232.40 port 53740 ssh2
… 2025-06-11 06:28.Categories: Brute-Force, SSH. Comment: 2025-06-11T08:16:29.008310+02:00 jadzia sshd[1201436]: Disconnected from invalid user test1 80.71.232.40 port 52444 [preauth]
2025-06-11T08:24:13.187938+02:00 jadzia sshd[1201932]: Invalid user jboss from 80.71.232.40 port 54390
2025-06-11T08:24:13.198459+02:00 jadzia sshd[1201932]: Disconnected from invalid user jboss 80.71.232.40 port 54390 [preauth]
2025-06-11T08:28:14.571954+02:00 jadzia sshd[1202189]: User root from 80.71.232.40 not allowed because not listed in AllowUsers
2025-06-11T08:28:14.584416+02:00 jadzia sshd[1202189]: Disconnected from invalid user root 80.71.232.40 port 40710 [preauth]
… 2025-06-11 06:23.Categories: Brute-Force, SSH. Comment: Jun 11 08:13:18 cirno sshd[1554087]: Invalid user test1 from 80.71.232.40 port 51772
Jun 11 08:13:20 cirno sshd[1554087]: Failed password for invalid user test1 from 80.71.232.40 port 51772 ssh2
Jun 11 08:23:15 cirno sshd[1555506]: Invalid user jboss from 80.71.232.40 port 46130
… 2025-06-11 05:59.Categories: Brute-Force, SSH. Comment: 2025-06-11T01:51:45.023064-04:00 debian sshd[2450005]: Failed password for invalid user db2fenc1 from 80.71.232.40 port 43144 ssh2
2025-06-11T01:55:40.890790-04:00 debian sshd[2454365]: Invalid user userftp from 80.71.232.40 port 39240
2025-06-11T01:55:40.894363-04:00 debian sshd[2454365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
2025-06-11T01:55:42.629125-04:00 debian sshd[2454365]: Failed password for invalid user userftp from 80.71.232.40 port 39240 ssh2
2025-06-11T01:59:26.895671-04:00 debian sshd[2457704]: Invalid user web-user from 80.71.232.40 port 52634
… 2025-06-11 05:40.Categories: Brute-Force, SSH. Comment: 2025-06-11T01:36:14.544979-04:00 debian sshd[2434414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
2025-06-11T01:36:16.539293-04:00 debian sshd[2434414]: Failed password for root from 80.71.232.40 port 60952 ssh2
2025-06-11T01:40:00.714827-04:00 debian sshd[2438705]: Invalid user cadmin from 80.71.232.40 port 44014
2025-06-11T01:40:00.718079-04:00 debian sshd[2438705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
2025-06-11T01:40:02.407053-04:00 debian sshd[2438705]: Failed password for invalid user cadmin from 80.71.232.40 port 44014 ssh2
… 2025-06-11 04:28.Categories: Port Scan. Comment: (sshd) Failed SSH login from 80.71.232.40 (NL/-/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 11 00:08:47 na-s3 sshd[4056285]: Invalid user zhang from 80.71.232.40 port 39638
Jun 11 00:12:46 na-s3 sshd[4107790]: Invalid user akbar from 80.71.232.40 port 40092
Jun 11 00:20:31 na-s3 sshd[5193]: Invalid user azureuser from 80.71.232.40 port 37678
Jun 11 00:24:17 na-s3 sshd[49484]: Invalid user oracle from 80.71.232.40 port 37424
Jun 11 00:28:10 na-s3 sshd[95512]: Invalid user erpnext from 80.71.232.40 port 36680 2025-06-11 04:13.Categories: Brute-Force, SSH. Comment: Hetzner-F2B blocked SSH BF— 2025-06-11 02:30.Categories: Brute-Force, SSH. Comment: SSH Brute-Force attempt 2025-06-11 01:46.Categories: Brute-Force, SSH. Comment: 2025-06-10T21:36:21.809556-04:00 debian sshd[2154884]: Failed password for invalid user stack from 80.71.232.40 port 47104 ssh2
2025-06-10T21:38:43.962704-04:00 debian sshd[2157838]: Invalid user stack from 80.71.232.40 port 54030
2025-06-10T21:38:43.966074-04:00 debian sshd[2157838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
2025-06-10T21:38:46.548252-04:00 debian sshd[2157838]: Failed password for invalid user stack from 80.71.232.40 port 54030 ssh2
2025-06-10T21:46:31.122663-04:00 debian sshd[2166743]: Invalid user ftp_client from 80.71.232.40 port 33550
… 2025-06-11 00:52.Categories: Brute-Force, SSH. Comment: 2025-06-10T20:46:05.787491-04:00 debian sshd[2096820]: Failed password for invalid user u1 from 80.71.232.40 port 34264 ssh2
2025-06-10T20:48:31.411164-04:00 debian sshd[2099559]: Invalid user u1 from 80.71.232.40 port 36868
2025-06-10T20:48:31.414287-04:00 debian sshd[2099559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
2025-06-10T20:48:34.167211-04:00 debian sshd[2099559]: Failed password for invalid user u1 from 80.71.232.40 port 36868 ssh2
2025-06-10T20:52:13.423797-04:00 debian sshd[2104665]: Invalid user veera from 80.71.232.40 port 59814
… 2025-06-11 00:07.Categories: Brute-Force, SSH. Comment: Fail2ban Triggered 2025-06-11 00:07.Categories: Brute-Force. Comment: list.rtbh.com.tr report: tcp/0 2025-06-11 00:06.Categories: Brute-Force, SSH. Comment: SSH brute force login attempt 2025-06-11 00:01.Categories: Brute-Force, SSH. Comment: 2025-06-11T01:53:23.640691+02:00 tlgylol sshd[161337]: Invalid user dell from 80.71.232.40 port 40140
2025-06-11T01:53:23.662343+02:00 tlgylol sshd[161337]: Failed password for invalid user dell from 80.71.232.40 port 40140 ssh2
2025-06-11T02:01:16.861506+02:00 tlgylol sshd[165096]: Invalid user leandro from 80.71.232.40 port 59704
… 2025-06-11 00:00.Categories: Brute-Force, SSH. Comment: 2025-06-10T19:49:03.183056-04:00 debian sshd[2026188]: Failed password for invalid user dell from 80.71.232.40 port 59490 ssh2
2025-06-10T19:56:59.035597-04:00 debian sshd[2035535]: Invalid user dell from 80.71.232.40 port 43236
2025-06-10T19:56:59.038853-04:00 debian sshd[2035535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
2025-06-10T19:57:00.981989-04:00 debian sshd[2035535]: Failed password for invalid user dell from 80.71.232.40 port 43236 ssh2
2025-06-10T19:59:59.731567-04:00 debian sshd[2039380]: Invalid user leandro from 80.71.232.40 port 53590
… 2025-06-10 23:09.Categories: Port Scan. Comment: [rede-44-49] (sshd) Failed SSH login from 80.71.232.40 (NL/The Netherlands/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 10 20:01:11 sshd[5958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=[USERNAME]
Jun 10 20:01:13 sshd[5958]: Failed password for [USERNAME] from 80.71.232.40 port 48294 ssh2
Jun 10 20:05:04 sshd[6270]: Invalid user [USERNAME] from 80.71.232.40 port 34290
Jun 10 20:05:06 sshd[6270]: Failed password for invalid user [USERNAME] from 80.71.232.40 port 34290 ssh2
Jun 10 20:08:59 sshd[6493]: Invalid user [USERNAME] from 80.71.232.40 port 2025-06-10 23:04.Categories: Brute-Force, SSH. Comment: Jun 10 23:00:12 ubuntu sshd[11357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 10 23:00:14 ubuntu sshd[11357]: Failed password for root from 80.71.232.40 port 59242 ssh2
Jun 10 23:00:15 ubuntu sshd[11357]: Disconnected from authenticating user root 80.71.232.40 port 59242 [preauth]
Jun 10 23:00:15 ubuntu sshd[11357]: Disconnected from authenticating user root 80.71.232.40 port 59242 [preauth]
Jun 10 23:04:05 ubuntu sshd[11364]: Invalid user test6 from 80.71.232.40 port 40252
… 2025-06-10 22:09.Categories: Brute-Force, SSH. Comment: fail2banned (ssh brute) 2025-06-10 22:05.Categories: Brute-Force, SSH. Comment: Unauthorized access via ssh 80.71.232.40 2025-06-10 21:58.Categories: Port Scan. Comment: [rede-44-49] (sshd) Failed SSH login from 80.71.232.40 (NL/The Netherlands/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 10 18:44:58 sshd[991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=[USERNAME]
Jun 10 18:45:00 sshd[991]: Failed password for [USERNAME] from 80.71.232.40 port 46494 ssh2
Jun 10 18:54:41 sshd[1547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=[USERNAME]
Jun 10 18:54:43 sshd[1547]: Failed password for [USERNAME] from 80.71.232.40 port 60702 ssh2
Jun 10 18:58:42 sshd[187 2025-06-10 21:57.Categories: Brute-Force, SSH. Comment: Jun 10 21:41:46 ubuntu sshd[11221]: Disconnected from authenticating user root 80.71.232.40 port 44076 [preauth]
Jun 10 21:53:44 ubuntu sshd[11242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 10 21:53:45 ubuntu sshd[11242]: Failed password for root from 80.71.232.40 port 52642 ssh2
Jun 10 21:53:46 ubuntu sshd[11242]: Disconnected from authenticating user root 80.71.232.40 port 52642 [preauth]
Jun 10 21:57:44 ubuntu sshd[11245]: Invalid user csgoserver from 80.71.232.40 port 45680
… 2025-06-10 21:54.Categories: Brute-Force, SSH. Comment: Jun 10 21:44:17 v4bgp sshd[3963463]: Failed password for root from 80.71.232.40 port 35962 ssh2
Jun 10 21:54:06 v4bgp sshd[3963652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 10 21:54:08 v4bgp sshd[3963652]: Failed password for root from 80.71.232.40 port 36620 ssh2
… 2025-06-10 20:09.Categories: Brute-Force. Comment: list.rtbh.com.tr report: tcp/0 2025-06-10 19:50.Categories: Brute-Force, SSH. Comment: 2025-06-10T22:42:06.264165+03:00 kiv01.hacktegic.com sshd-session[2137395]: Invalid user wordpress from 80.71.232.40 port 41800
2025-06-10T22:42:06.310852+03:00 kiv01.hacktegic.com sshd-session[2137395]: Disconnected from invalid user wordpress 80.71.232.40 port 41800 [preauth]
2025-06-10T22:50:34.034647+03:00 kiv01.hacktegic.com sshd-session[2138419]: Invalid user titan from 80.71.232.40 port 48918
… 2025-06-10 19:50.Categories: SSH. Comment: SSH Abuse 2025-06-10 19:49.Categories: Brute-Force, SSH. Comment: Jun 10 21:38:14 pornomens sshd[1829664]: Invalid user wordpress from 80.71.232.40 port 52984
Jun 10 21:38:14 pornomens sshd[1829664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 21:38:16 pornomens sshd[1829664]: Failed password for invalid user wordpress from 80.71.232.40 port 52984 ssh2
Jun 10 21:49:19 pornomens sshd[1829688]: Invalid user titan from 80.71.232.40 port 58882
… 2025-06-10 19:46.Categories: Brute-Force, SSH. Comment: Jun 10 16:46:09 vmori-manager-1 sshd[153896]: Invalid user wordpress from 80.71.232.40 port 53342
… 2025-06-10 17:55.Categories: Brute-Force, SSH. Comment: $f2bV_matches 2025-06-10 17:53.Categories: Brute-Force. Comment: Brute force attempt — 3 login attempts (3 failed) 2025-06-10 16:50.Categories: Brute-Force, SSH. Comment: 2025-06-10T16:46:19.224763+00:00 v36397 sshd[1917335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
2025-06-10T16:46:20.784999+00:00 v36397 sshd[1917335]: Failed password for invalid user systems from 80.71.232.40 port 56904 ssh2
2025-06-10T16:50:13.242110+00:00 v36397 sshd[1918228]: Invalid user nas from 80.71.232.40 port 47956
… 2025-06-10 16:47.Categories: Brute-Force, SSH. Comment: Jun 10 16:43:26 gs sshd[361789]: Failed password for invalid user spark from 80.71.232.40 port 40288 ssh2
Jun 10 16:43:27 gs sshd[361789]: Disconnected from invalid user spark 80.71.232.40 port 40288 [preauth]
Jun 10 16:47:24 gs sshd[361864]: Invalid user systems from 80.71.232.40 port 53644
Jun 10 16:47:24 gs sshd[361864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 16:47:26 gs sshd[361864]: Failed password for invalid user systems from 80.71.232.40 port 53644 ssh2
… 2025-06-10 15:45.Categories: Brute-Force, SSH. Comment: $f2bV_matches 2025-06-10 15:43.Categories: Brute-Force, SSH. Comment: 2025-06-10T15:39:29.878640+00:00 v36397 sshd[1897448]: Failed password for invalid user qwerty from 80.71.232.40 port 47214 ssh2
2025-06-10T15:43:32.541398+00:00 v36397 sshd[1898879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
2025-06-10T15:43:34.292233+00:00 v36397 sshd[1898879]: Failed password for root from 80.71.232.40 port 55808 ssh2
… 2025-06-10 15:40.Categories: Brute-Force, SSH. Comment: Jun 10 15:36:29 gs sshd[360467]: Failed password for invalid user jenkins from 80.71.232.40 port 38208 ssh2
Jun 10 15:36:30 gs sshd[360467]: Disconnected from invalid user jenkins 80.71.232.40 port 38208 [preauth]
Jun 10 15:40:40 gs sshd[360600]: Invalid user qwerty from 80.71.232.40 port 55690
Jun 10 15:40:40 gs sshd[360600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 15:40:43 gs sshd[360600]: Failed password for invalid user qwerty from 80.71.232.40 port 55690 ssh2
… 2025-06-10 15:38.Categories: Brute-Force, SSH. Comment: 2025-06-10T15:29:04.827485+00:00 ubuntu sshd[566961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
2025-06-10T15:29:06.418022+00:00 ubuntu sshd[566961]: Failed password for invalid user jenkins from 80.71.232.40 port 36314 ssh2
2025-06-10T15:38:15.754225+00:00 ubuntu sshd[567014]: Invalid user qwerty from 80.71.232.40 port 47780
… 2025-06-10 15:11.Categories: Brute-Force, SSH. Comment: Jun 10 18:11:44 www4 sshd\[12007\]: Invalid user db2 from 80.71.232.40
Jun 10 18:11:44 www4 sshd\[12007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 18:11:45 www4 sshd\[12007\]: Failed password for invalid user db2 from 80.71.232.40 port 43080 ssh2
… 2025-06-10 15:00.Categories: Port Scan, Brute-Force, SSH. Comment: Invalid user imran from 80.71.232.40 port 40106 2025-06-10 14:53.Categories: Brute-Force, SSH. Comment: Jun 10 22:44:57 bird sshd[2444775]: Failed password for invalid user rajeev from 80.71.232.40 port 42768 ssh2
Jun 10 22:49:04 bird sshd[2444804]: Invalid user gitlab-runner from 80.71.232.40 port 54712
Jun 10 22:49:04 bird sshd[2444804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 22:49:06 bird sshd[2444804]: Failed password for invalid user gitlab-runner from 80.71.232.40 port 54712 ssh2
Jun 10 22:53:15 bird sshd[2444829]: Invalid user switch from 80.71.232.40 port 57382
… 2025-06-10 14:46.Categories: Brute-Force, SSH. Comment: Jun 10 17:46:48 www4 sshd\[9943\]: Invalid user gitlab-runner from 80.71.232.40
Jun 10 17:46:48 www4 sshd\[9943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 17:46:50 www4 sshd\[9943\]: Failed password for invalid user gitlab-runner from 80.71.232.40 port 53842 ssh2
… 2025-06-10 14:21.Categories: Brute-Force, SSH. Comment: Jun 10 17:17:33 www4 sshd\[7860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 10 17:17:35 www4 sshd\[7860\]: Failed password for root from 80.71.232.40 port 48194 ssh2
Jun 10 17:21:42 www4 sshd\[8166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
… 2025-06-10 14:11.Categories: Brute-Force, SSH. Comment: Jun 10 22:02:50 bird sshd[2444393]: Failed password for invalid user stefan from 80.71.232.40 port 37596 ssh2
Jun 10 22:07:03 bird sshd[2444421]: Invalid user awx from 80.71.232.40 port 49938
Jun 10 22:07:03 bird sshd[2444421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 22:07:06 bird sshd[2444421]: Failed password for invalid user awx from 80.71.232.40 port 49938 ssh2
Jun 10 22:11:19 bird sshd[2444457]: Invalid user frappe from 80.71.232.40 port 36842
… 2025-06-10 13:52.Categories: Brute-Force, SSH. Comment: Jun 10 16:52:29 www4 sshd\[5779\]: Invalid user jasmin from 80.71.232.40
Jun 10 16:52:29 www4 sshd\[5779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 16:52:30 www4 sshd\[5779\]: Failed password for invalid user jasmin from 80.71.232.40 port 40014 ssh2
… 2025-06-10 13:30.Categories: Brute-Force, SSH. Comment: Jun 10 21:25:50 bird sshd[2444048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 10 21:25:52 bird sshd[2444048]: Failed password for root from 80.71.232.40 port 44052 ssh2
Jun 10 21:30:01 bird sshd[2444102]: Invalid user king from 80.71.232.40 port 52050
Jun 10 21:30:01 bird sshd[2444102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 21:30:04 bird sshd[2444102]: Failed password for invalid user king from 80.71.232.40 port 52050 ssh2
… 2025-06-10 13:27.Categories: Brute-Force, SSH. Comment: Jun 10 16:23:34 www4 sshd\[3599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40 user=root
Jun 10 16:23:36 www4 sshd\[3599\]: Failed password for root from 80.71.232.40 port 54838 ssh2
Jun 10 16:27:49 www4 sshd\[3914\]: Invalid user king from 80.71.232.40
… 2025-06-10 13:19.Categories: Brute-Force, SSH. Comment: Unauthorized SSH login attempt detected and blocked. 2025-06-10 13:14.Categories: Brute-Force, SSH. Comment: The IP 80.71.232.40 tried multiple SSH logins 2025-06-10 13:12.Categories: Brute-Force, SSH. Comment: Jun 10 16:12:12 www4 sshd\[2874\]: Invalid user server from 80.71.232.40
Jun 10 16:12:12 www4 sshd\[2874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 16:12:14 www4 sshd\[2874\]: Failed password for invalid user server from 80.71.232.40 port 41222 ssh2
… 2025-06-10 12:41.Categories: Brute-Force, SSH. Comment: Invalid user casaos from 80.71.232.40 port 54476 2025-06-10 12:19.Categories: Brute-Force, SSH. Comment: SSH Brute force: 15 attempts were recorded from 80.71.232.40
2025-06-10T13:05:28+02:00 Invalid user casaos from 80.71.232.40 port 53742
2025-06-10T13:13:10+02:00 Invalid user app from 80.71.232.40 port 40440
2025-06-10T13:17:32+02:00 Invalid user faisal from 80.71.232.40 port 50200
2025-06-10T13:21:38+02:00 Invalid user tester from 80.71.232.40 port 35766
2025-06-10T13:25:29+02:00 Invalid user newftpuser from 80.71.232.40 port 48610
2025-06-10T13:29:28+02:00 Invalid user coder from 80.71.232.40 port 49824
2025-06-10T13:37:54+02:00 Invalid user jmarquez from 80.71.232.40 port 59064
2025-06-10T13:42:01+02:00 Invalid user j from 80.71.232.40 port 43536
2025-06-10T13:46:07+02:00 Invalid user liu from 80.71.232.40 port 33736
2025-06-10T13:50:06+02:00 Invalid user ociisstd from 80.71.232.40 port 53638
2025-06-10T13:54:17+02:00 Invalid user zomboid from 80.71.232.40 port 49590
2025-06-10T13:58: 2025-06-10 11:13.Categories: Brute-Force, SSH. Comment: SSH brute force attack detected from [80.71.232.40] 2025-06-10 11:13.Categories: Brute-Force, SSH. Comment: Jun 10 05:05:06 b146-07 sshd[2275217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.71.232.40
Jun 10 05:05:08 b146-07 sshd[2275217]: Failed password for invalid user casaos from 80.71.232.40 port 46712 ssh2
Jun 10 05:13:02 b146-07 sshd[2275646]: Invalid user app from 80.71.232.40 port 59718
… 2025-06-10 10:47.Categories: Brute-Force, SSH. Comment: 2025-06-10 10:47:12,079 fail2ban.actions [504677]: NOTICE [sshd] Ban 80.71.232.40 2025-06-10 10:27.Categories: Brute-Force, SSH. Comment: 2025-06-10 10:27:16,412 fail2ban.actions [504677]: NOTICE [sshd] Ban 80.71.232.40 2025-06-10 10:07.Categories: Brute-Force, SSH. Comment: 2025-06-10 10:07:16,272 fail2ban.actions [504677]: NOTICE [sshd] Ban 80.71.232.40 2025-06-10 09:47.Categories: Brute-Force, SSH. Comment: 2025-06-10 09:47:10,957 fail2ban.actions [504677]: NOTICE [sshd] Ban 80.71.232.40 2025-06-10 09:27.Categories: Brute-Force, SSH. Comment: 2025-06-10 09:27:11,979 fail2ban.actions [504677]: NOTICE [sshd] Ban 80.71.232.40 2025-06-10 09:07.Categories: Brute-Force, SSH. Comment: 2025-06-10 09:07:27,712 fail2ban.actions [504677]: NOTICE [sshd] Ban 80.71.232.40 2025-06-10 09:02.Categories: Brute-Force, SSH. Comment: 2025-06-10T08:49:55.257769+00:00 eu-north-sto2 sshd[26456]: Invalid user imran from 80.71.232.40 port 36326
2025-06-10T08:49:55.284333+00:00 eu-north-sto2 sshd[26456]: Disconnected from invalid user imran 80.71.232.40 port 36326 [preauth]
2025-06-10T09:02:11.971454+00:00 eu-north-sto2 sshd[26463]: Invalid user brian from 80.71.232.40 port 54432
… 2025-06-10 06:50.Categories: Port Scan, Brute-Force, SSH. Comment: Unauthorized connection attempt detected, SSH Brute-Force
2. 80.71.232.28:
2025-06-12 01:34.Categories: Brute-Force, SSH. Comment: 20 attempts against mh-ssh on mung 2025-06-12 01:11.Categories: Fraud VoIP, Port Scan, Hacking, Brute-Force. Comment: SIP/5060 Probe, Scan, BF, Hack — 2025-06-12 00:21.Categories: Port Scan, Hacking. Comment: MultiHost/MultiPort Probe, Scan, Hack — 2025-06-11 19:16.Categories: Port Scan. Comment: Unauthorized connection attempt to port 8000 from 80.71.232.28 2025-06-11 19:09.Categories: Port Scan. Comment: Port Scanning 2025-06-11 19:09.Categories: Fraud VoIP, Port Scan. Comment: VoIP Attack proto:UDP src:5060 dst:5060 2025-06-11 17:02.Categories: Port Scan, Hacking, Exploited Host. Comment: Honeypot hit. 2025-06-11 05:17.Categories: Port Scan, Hacking, Exploited Host. Comment: Unauthorized connection attempt
Please go to the InterLIR Portal Abuses page for more information and confirm resolving the abuse.
Have any question so far? Visit [InterLIR Support](http://url177.interlir.com/ls/click?upn=u001.AC6RhJrAZ4-2FafAO9DCKUm0OEBkaVdM3PGLF9qKdQfAo-3DL65e_lpk-2BpdcweK4SiojplRoDFUVHO942bHuhAaf0UY9TUgHm0CLfOgi2Ydtaaa2oy7bnapPEYKcGFUUl3BERK2oi2ymzJIQaOc618TMPm7AdR1Dp6dHfIt4dEPcm0nzV9E-2F9vXXRk9Di1Zqojxhe1yz3smkOtP5PHcVq1FBE1nxTxyEqkABWaV7J6ZYc4CmX4P7as31vPZ6s7HnHeS0TJda2RQ-3D-3D or
[contact us](http://url177.interlir.com/ls/click?upn=u001.AC6RhJrAZ4-2FafAO9DCKUm7YdN-2BbLtZ4tDZkU0VLNqx8-3D-7Dr_lpk-2BpdcweK4SiojplRoDFUVHO942bHuhAaf0UY9TUgHm0CLfOgi2Ydtaaa2oy7bnMQlAknHaejyUVxPQY3yuBCkAMIR5cnDBLnJ60RHgdtj8G-2BTpRVUr5v62GyBdyA56ACNBRuFvIG7s0QOGDPaF1g5FjYsfL1C-2BcwjZfZIEEIQB4btA7-2BqDyd8662P2G8p9gN53-2BDttJydb3O8YvMZ77w-3D-3D
Thanks,
InterLIR
InterLIR GmbH, Berlin