This IP address has been reported a total of 387
times from 231 distinct
sources.
103.142.199.64 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-12-18T04:54:30.260020+01:00 s1 sshd[2753783]: Failed password for root from 103.142.199.64 port ... show more2024-12-18T04:54:30.260020+01:00 s1 sshd[2753783]: Failed password for root from 103.142.199.64 port 51236 ssh2
2024-12-18T04:56:45.121594+01:00 s1 sshd[2753811]: Invalid user pi from 103.142.199.64 port 36974
2024-12-18T04:56:46.118854+01:00 s1 sshd[2753813]: Invalid user hive from 103.142.199.64 port 36978
... show less
Dec 18 02:11:44 whitehoodie sshd[2543499]: Invalid user pi from 103.142.199.64 port 38220
Dec ... show moreDec 18 02:11:44 whitehoodie sshd[2543499]: Invalid user pi from 103.142.199.64 port 38220
Dec 18 02:11:44 whitehoodie sshd[2543501]: Invalid user hive from 103.142.199.64 port 38236
Dec 18 02:11:43 whitehoodie sshd[2543497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.199.64 user=root
Dec 18 02:11:45 whitehoodie sshd[2543497]: Failed password for root from 103.142.199.64 port 38216 ssh2
Dec 18 02:11:45 whitehoodie sshd[2543503]: Invalid user git from 103.142.199.64 port 38238
... show less
2024-12-18T01:00:45.471855italoVM sshd[603639]: Invalid user pi from 103.142.199.64 port 56150 ... show more2024-12-18T01:00:45.471855italoVM sshd[603639]: Invalid user pi from 103.142.199.64 port 56150
2024-12-18T01:00:44.136096italoVM sshd[603628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.199.64 user=root
2024-12-18T01:00:45.859494italoVM sshd[603628]: Failed password for root from 103.142.199.64 port 56146 ssh2
... show less
Dec 17 23:54:27 arayat sshd[14440]: Failed password for root from 103.142.199.64 port 37694 ssh2<br ... show moreDec 17 23:54:27 arayat sshd[14440]: Failed password for root from 103.142.199.64 port 37694 ssh2
Dec 17 23:54:27 apo sshd[18977]: Failed password for root from 103.142.199.64 port 60752 ssh2
Dec 17 23:56:44 apo sshd[25363]: Failed password for root from 103.142.199.64 port 46246 ssh2
Dec 17 23:56:44 arayat sshd[14959]: Failed password for root from 103.142.199.64 port 36224 ssh2
... show less
Report 1512687 with IP 2551513 for SSH brute-force attack by source 2554912 via ssh-honeypot/0.2.0+h ... show moreReport 1512687 with IP 2551513 for SSH brute-force attack by source 2554912 via ssh-honeypot/0.2.0+http show less
2024-12-18T03:51:45.052048+07:00 BAW-C03 sshd[340378]: Failed password for root from 103.142.199.64 ... show more2024-12-18T03:51:45.052048+07:00 BAW-C03 sshd[340378]: Failed password for root from 103.142.199.64 port 54498 ssh2
2024-12-18T03:51:45.153059+07:00 BAW-C03 sshd[340380]: Invalid user pi from 103.142.199.64 port 54506
2024-12-18T03:51:46.592194+07:00 BAW-C03 sshd[340382]: Invalid user hive from 103.142.199.64 port 54508
2024-12-18T03:51:45.275190+07:00 BAW-C03 sshd[340380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.199.64
2024-12-18T03:51:46.799598+07:00 BAW-C03 sshd[340380]: Failed password for invalid user pi from 103.142.199.64 port 54506 ssh2
... show less