This IP address has been reported a total of 306
times from 164 distinct
sources.
103.139.193.14 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
[rede-166-249] (sshd) Failed SSH login from 103.139.193.14 (ID/Indonesia/ip103-139-193-14.cloudhost. ... show more[rede-166-249] (sshd) Failed SSH login from 103.139.193.14 (ID/Indonesia/ip103-139-193-14.cloudhost.web.id): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 7 02:39:59 sshd[18152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.193.14 user=[USERNAME]
Dec 7 02:40:01 sshd[18152]: Failed password for [USERNAME] from 103.139.193.14 port 40782 ssh2
Dec 7 02:43:13 sshd[18453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.193.14 user=[USERNAME]
Dec 7 02:43:15 sshd[18453]: Failed password for [USERNAME] from 103.139.193.14 port 33842 ssh2
Dec 7 02: show less
Dec 7 05:42:12 jump sshd[2229277]: Failed password for root from 103.139.193.14 port 37950 ssh2<br ... show moreDec 7 05:42:12 jump sshd[2229277]: Failed password for root from 103.139.193.14 port 37950 ssh2
Dec 7 05:44:43 jump sshd[2229356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.193.14 user=root
Dec 7 05:44:46 jump sshd[2229356]: Failed password for root from 103.139.193.14 port 48950 ssh2
... show less
Dec 7 06:35:56 vps789833 sshd[16173]: Failed password for root from 103.139.193.14 port 34010 ssh2< ... show moreDec 7 06:35:56 vps789833 sshd[16173]: Failed password for root from 103.139.193.14 port 34010 ssh2
Dec 7 06:41:39 vps789833 sshd[16269]: Failed password for root from 103.139.193.14 port 60492 ssh2 show less
Brute-ForceSSH
Anonymous
103.139.193.14 (KH/Cambodia/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; ... show more103.139.193.14 (KH/Cambodia/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Dec 7 00:38:02 server2 sshd[22357]: Failed password for root from 113.133.171.168 port 58860 ssh2
Dec 7 00:37:19 server2 sshd[22071]: Failed password for root from 121.142.87.218 port 43466 ssh2
Dec 7 00:39:23 server2 sshd[22901]: Failed password for root from 103.88.130.60 port 65110 ssh2
Dec 7 00:38:26 server2 sshd[22563]: Failed password for root from 174.138.27.5 port 50380 ssh2
Dec 7 00:37:46 server2 sshd[22276]: Failed password for root from 103.139.193.14 port 56932 ssh2
IP Addresses Blocked:
113.133.171.168 (CN/China/-)
121.142.87.218 (KR/South Korea/-)
103.88.130.60 (IN/India/-)
174.138.27.5 (SG/Singapore/-) show less
2024-12-07T05:12:00.394208+00:00 files sshd[519907]: Failed password for root from 103.139.193.14 po ... show more2024-12-07T05:12:00.394208+00:00 files sshd[519907]: Failed password for root from 103.139.193.14 port 48764 ssh2
2024-12-07T05:14:37.060723+00:00 files sshd[520985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.193.14 user=root
2024-12-07T05:14:39.310834+00:00 files sshd[520985]: Failed password for root from 103.139.193.14 port 40020 ssh2
... show less
2024-12-07T04:01:50.526027+01:00 tor01-ca-pop.as202427.net sshd[203195]: Invalid user noc from 103.1 ... show more2024-12-07T04:01:50.526027+01:00 tor01-ca-pop.as202427.net sshd[203195]: Invalid user noc from 103.139.193.14 port 47668
2024-12-07T04:07:21.399475+01:00 tor01-ca-pop.as202427.net sshd[204893]: Invalid user ey from 103.139.193.14 port 51154
2024-12-07T04:10:06.712459+01:00 tor01-ca-pop.as202427.net sshd[205568]: Invalid user shuai from 103.139.193.14 port 57156
... show less
2024-12-07T03:06:04.630167+00:00 bluefire sshd[381925]: pam_unix(sshd:auth): authentication failure; ... show more2024-12-07T03:06:04.630167+00:00 bluefire sshd[381925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.193.14
2024-12-07T03:06:06.683755+00:00 bluefire sshd[381925]: Failed password for invalid user noc from 103.139.193.14 port 50254 ssh2
2024-12-07T03:09:24.801379+00:00 bluefire sshd[382759]: Invalid user ey from 103.139.193.14 port 44720
... show less
Dec 7 03:02:27 thecount sshd[2088292]: Invalid user noc from 103.139.193.14 port 50346
...
Brute-ForceSSH
Anonymous
2024-12-07T03:58:34+01:00 lb-2 sshd[1118738]: pam_unix(sshd:auth): authentication failure; logname= ... show more2024-12-07T03:58:34+01:00 lb-2 sshd[1118738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.193.14 user=root
2024-12-07T03:58:36+01:00 lb-2 sshd[1118738]: Failed password for root from 103.139.193.14 port 47076 ssh2
2024-12-07T03:58:34+01:00 lb-2 sshd[1118738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.193.14 user=root
2024-12-07T03:58:36+01:00 lb-2 sshd[1118738]: Failed password for root from 103.139.193.14 port 47076 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-12-07T02:49:06+01:00 lb-2 sshd[1098168]: Failed password for invalid user deamon from 103.139.1 ... show more2024-12-07T02:49:06+01:00 lb-2 sshd[1098168]: Failed password for invalid user deamon from 103.139.193.14 port 38742 ssh2
2024-12-07T02:53:08+01:00 lb-2 sshd[1099011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.193.14 user=root
2024-12-07T02:53:10+01:00 lb-2 sshd[1099011]: Failed password for root from 103.139.193.14 port 47406 ssh2
2024-12-07T02:55:15+01:00 lb-2 sshd[1099991]: Invalid user erpnext from 103.139.193.14 port 49302
... show less