This IP address has been reported a total of 12,606
times from 1,221 distinct
sources.
103.146.50.194 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jun 23 08:40:29 gateway47 sshd[58947]: Failed password for invalid user tp from 103.146.50.194 port ... show moreJun 23 08:40:29 gateway47 sshd[58947]: Failed password for invalid user tp from 103.146.50.194 port 47456 ssh2
Jun 23 08:41:35 gateway47 sshd[58949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root
Jun 23 08:41:38 gateway47 sshd[58949]: Failed password for root from 103.146.50.194 port 40472 ssh2
Jun 23 08:42:43 gateway47 sshd[58959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root
Jun 23 08:42:45 gateway47 sshd[58959]: Failed password for root from 103.146.50.194 port 33486 ssh2
Jun 23 08:43:50 gateway47 sshd[58961]: Invalid user ftpuser from 103.146.50.194 port 54734
Jun 23 08:43:50 gateway47 sshd[58961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194
Jun 23 08:43:50 gateway47 sshd[58961]: Invalid user ftpuser from 103.146.50.194 port 54734
Jun 23 08:43:52 gateway47 sshd[58961]: Failed password for
... show less
Brute-ForceSSH
Anonymous
Jun 23 08:34:38 svr10 sshd[587814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreJun 23 08:34:38 svr10 sshd[587814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194
Jun 23 08:34:39 svr10 sshd[587814]: Failed password for invalid user a from 103.146.50.194 port 60916 ssh2
Jun 23 08:34:41 svr10 sshd[587814]: Disconnected from invalid user a 103.146.50.194 port 60916 [preauth]
... show less
Jun 23 01:44:18 scp sshd[3356780]: Invalid user pl from 103.146.50.194 port 43086
Jun 23 01:52 ... show moreJun 23 01:44:18 scp sshd[3356780]: Invalid user pl from 103.146.50.194 port 43086
Jun 23 01:52:06 scp sshd[3368546]: Invalid user user from 103.146.50.194 port 48254
Jun 23 01:53:18 scp sshd[3370337]: Invalid user monitor from 103.146.50.194 port 44910
... show less
Jun 23 07:13:26 server sshd[3031228]: Invalid user dave from 103.146.50.194 port 34764
Jun 23 ... show moreJun 23 07:13:26 server sshd[3031228]: Invalid user dave from 103.146.50.194 port 34764
Jun 23 07:15:22 server sshd[3031620]: Connection from 103.146.50.194 port 42888 on 194.13.82.110 port 22 rdomain ""
Jun 23 07:15:23 server sshd[3031620]: Invalid user caixa from 103.146.50.194 port 42888
Jun 23 07:16:18 server sshd[3031767]: Connection from 103.146.50.194 port 32836 on 194.13.82.110 port 22 rdomain ""
Jun 23 07:16:19 server sshd[3031767]: Invalid user chris from 103.146.50.194 port 32836
... show less
Jun 23 05:11:43 melon sshd[3203579]: Invalid user basic from 103.146.50.194 port 32918
Jun 23 ... show moreJun 23 05:11:43 melon sshd[3203579]: Invalid user basic from 103.146.50.194 port 32918
Jun 23 05:12:40 melon sshd[3205635]: Connection from 103.146.50.194 port 51096 on 65.108.201.187 port 22 rdomain ""
Jun 23 05:12:41 melon sshd[3205635]: User root from 103.146.50.194 not allowed because none of user's groups are listed in AllowGroups
Jun 23 05:13:40 melon sshd[3207709]: Connection from 103.146.50.194 port 41040 on 65.108.201.187 port 22 rdomain ""
Jun 23 05:13:41 melon sshd[3207709]: Invalid user dave from 103.146.50.194 port 41040 show less
Jun 23 06:56:08 yoda sshd[2822505]: Failed password for root from 103.146.50.194 port 35284 ssh2<br ... show moreJun 23 06:56:08 yoda sshd[2822505]: Failed password for root from 103.146.50.194 port 35284 ssh2
Jun 23 06:57:38 yoda sshd[2825026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root
Jun 23 06:57:39 yoda sshd[2825026]: Failed password for root from 103.146.50.194 port 60158 ssh2
... show less
Jun 23 06:22:30 yoda sshd[2760505]: Failed password for root from 103.146.50.194 port 59420 ssh2<br ... show moreJun 23 06:22:30 yoda sshd[2760505]: Failed password for root from 103.146.50.194 port 59420 ssh2
Jun 23 06:23:43 yoda sshd[2763254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root
Jun 23 06:23:46 yoda sshd[2763254]: Failed password for root from 103.146.50.194 port 56064 ssh2
... show less
Jun 23 06:18:24 odin sshd[11702]: Failed password for root from 103.146.50.194 port 49184 ssh2 ... show moreJun 23 06:18:24 odin sshd[11702]: Failed password for root from 103.146.50.194 port 49184 ssh2
Jun 23 06:22:18 odin sshd[12642]: Failed password for root from 103.146.50.194 port 35384 ssh2 show less
(sshd) Failed SSH login from 103.146.50.194 (HK/Hong Kong/-): 5 in the last 3600 secs; Ports: *; Dir ... show more(sshd) Failed SSH login from 103.146.50.194 (HK/Hong Kong/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Jun 22 23:15:32 14730 sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root
Jun 22 23:15:34 14730 sshd[2388]: Failed password for root from 103.146.50.194 port 41832 ssh2
Jun 22 23:21:42 14730 sshd[2756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root
Jun 22 23:21:44 14730 sshd[2756]: Failed password for root from 103.146.50.194 port 43672 ssh2
Jun 22 23:22:58 14730 sshd[2814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root show less
(sshd) Failed SSH login from 103.146.50.194 (HK/Hong Kong/-): 5 in the last 3600 secs; Ports: *; Dir ... show more(sshd) Failed SSH login from 103.146.50.194 (HK/Hong Kong/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Jun 22 22:39:20 13231 sshd[3008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root
Jun 22 22:39:23 13231 sshd[3008]: Failed password for root from 103.146.50.194 port 60122 ssh2
Jun 22 22:41:18 13231 sshd[3133]: Invalid user tecnico from 103.146.50.194 port 58496
Jun 22 22:41:20 13231 sshd[3133]: Failed password for invalid user tecnico from 103.146.50.194 port 58496 ssh2
Jun 22 22:42:25 13231 sshd[3193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.50.194 user=root show less
2023-06-23T05:39:06.160340 mail2.akcurate.de sshd[1339884]: Disconnected from authenticating user ro ... show more2023-06-23T05:39:06.160340 mail2.akcurate.de sshd[1339884]: Disconnected from authenticating user root 103.146.50.194 port 45846 [preauth]
2023-06-23T05:41:15.680829 mail2.akcurate.de sshd[1339951]: Invalid user tecnico from 103.146.50.194 port 45656
2023-06-23T05:41:15.872094 mail2.akcurate.de sshd[1339951]: Disconnected from invalid user tecnico 103.146.50.194 port 45656 [preauth]
... show less