This IP address has been reported a total of 1,568
times from 574 distinct
sources.
103.1.12.244 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Nov 20 08:51:22 h2691902 sshd[18584]: Failed password for root from 103.1.12.244 port 10305 ssh2<br ... show moreNov 20 08:51:22 h2691902 sshd[18584]: Failed password for root from 103.1.12.244 port 10305 ssh2
Nov 20 08:53:38 h2691902 sshd[18607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
Nov 20 08:53:41 h2691902 sshd[18607]: Failed password for root from 103.1.12.244 port 31598 ssh2
Nov 20 08:55:53 h2691902 sshd[18648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
Nov 20 08:55:55 h2691902 sshd[18648]: Failed password for root from 103.1.12.244 port 52894 ssh2
... show less
2024-11-20T07:30:35.674507+01:00 Pi sshd[147785]: Invalid user ftpuser from 103.1.12.244 port 29847< ... show more2024-11-20T07:30:35.674507+01:00 Pi sshd[147785]: Invalid user ftpuser from 103.1.12.244 port 29847
2024-11-20T07:33:42.315442+01:00 Pi sshd[147845]: Invalid user ubuntu from 103.1.12.244 port 55222
2024-11-20T07:36:14.027242+01:00 Pi sshd[147904]: Invalid user admin from 103.1.12.244 port 20234
2024-11-20T07:38:26.752609+01:00 Pi sshd[147942]: Invalid user admin from 103.1.12.244 port 41740
2024-11-20T07:40:36.469124+01:00 Pi sshd[147986]: Invalid user debian from 103.1.12.244 port 63247 show less
2024-11-20T07:31:30.890144+01:00 zrh02-ch-pop.as202427.net sshd[3760922]: Invalid user ftpuser from ... show more2024-11-20T07:31:30.890144+01:00 zrh02-ch-pop.as202427.net sshd[3760922]: Invalid user ftpuser from 103.1.12.244 port 54869
2024-11-20T07:34:18.567232+01:00 zrh02-ch-pop.as202427.net sshd[3761344]: Invalid user ubuntu from 103.1.12.244 port 21651
2024-11-20T07:36:47.893024+01:00 zrh02-ch-pop.as202427.net sshd[3761716]: Invalid user admin from 103.1.12.244 port 43162
... show less
2024-11-20T07:29:05.794022+01:00 fusco sshd[299670]: pam_unix(sshd:auth): authentication failure; lo ... show more2024-11-20T07:29:05.794022+01:00 fusco sshd[299670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244
2024-11-20T07:29:07.761145+01:00 fusco sshd[299670]: Failed password for invalid user ftpuser from 103.1.12.244 port 20437 ssh2
2024-11-20T07:32:44.929335+01:00 fusco sshd[303477]: Invalid user ubuntu from 103.1.12.244 port 49242
... show less
2024-11-20T07:29:21.917624 ******* sshd[201450]: Invalid user ftpuser from 103.1.12.244 port 29133<b ... show more2024-11-20T07:29:21.917624 ******* sshd[201450]: Invalid user ftpuser from 103.1.12.244 port 29133
2024-11-20T07:29:22.124041 ******* sshd[201450]: Disconnected from invalid user ftpuser 103.1.12.244 port 29133 [preauth] show less
Nov 20 06:06:24 s1 sshd[2006986]: Failed password for root from 103.1.12.244 port 57075 ssh2
N ... show moreNov 20 06:06:24 s1 sshd[2006986]: Failed password for root from 103.1.12.244 port 57075 ssh2
Nov 20 06:08:37 s1 sshd[2007686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
Nov 20 06:08:39 s1 sshd[2007686]: Failed password for root from 103.1.12.244 port 22005 ssh2
Nov 20 06:10:52 s1 sshd[2008477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
Nov 20 06:10:54 s1 sshd[2008477]: Failed password for root from 103.1.12.244 port 43435 ssh2
... show less
Nov 20 05:45:59 s1 sshd[2000497]: Failed password for root from 103.1.12.244 port 33699 ssh2
N ... show moreNov 20 05:45:59 s1 sshd[2000497]: Failed password for root from 103.1.12.244 port 33699 ssh2
Nov 20 05:48:18 s1 sshd[2001324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
Nov 20 05:48:21 s1 sshd[2001324]: Failed password for root from 103.1.12.244 port 55129 ssh2
Nov 20 05:50:34 s1 sshd[2002038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
Nov 20 05:50:36 s1 sshd[2002038]: Failed password for root from 103.1.12.244 port 20064 ssh2
... show less
Nov 20 05:27:53 vmi174663 sshd[1831361]: Failed password for root from 103.1.12.244 port 46286 ssh2< ... show moreNov 20 05:27:53 vmi174663 sshd[1831361]: Failed password for root from 103.1.12.244 port 46286 ssh2
Nov 20 05:30:06 vmi174663 sshd[1832736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
Nov 20 05:30:08 vmi174663 sshd[1832736]: Failed password for root from 103.1.12.244 port 10947 ssh2
Nov 20 05:32:18 vmi174663 sshd[1833961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
Nov 20 05:32:20 vmi174663 sshd[1833961]: Failed password for root from 103.1.12.244 port 32107 ssh2
... show less
2024-11-20T04:09:09.352247jump1.sailx.co sshd[28659]: Failed password for root from 103.1.12.244 por ... show more2024-11-20T04:09:09.352247jump1.sailx.co sshd[28659]: Failed password for root from 103.1.12.244 port 28885 ssh2
2024-11-20T04:11:24.334575jump1.sailx.co sshd[28843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
2024-11-20T04:11:26.543970jump1.sailx.co sshd[28843]: Failed password for root from 103.1.12.244 port 50049 ssh2
2024-11-20T04:13:38.857443jump1.sailx.co sshd[29057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.12.244 user=root
2024-11-20T04:13:40.796144jump1.sailx.co sshd[29057]: Failed password for root from 103.1.12.244 port 14709 ssh2
... show less