This IP address has been reported a total of 1,396
times from 531 distinct
sources.
103.146.52.96 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
(sshd) Failed SSH login from 103.146.52.96 (HK/Hong Kong/-): 5 in the last 3600 secs; Ports: *; Dire ... show more(sshd) Failed SSH login from 103.146.52.96 (HK/Hong Kong/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 8 07:52:29 sshd[1183163]: Invalid user [USERNAME] from 103.146.52.96 port 58524 show less
Brute-ForceSSH
Anonymous
2025-02-08T06:48:06.568463+00:00 de-fra2-unifi1 sshd[112777]: Invalid user alex from 103.146.52.96 p ... show more2025-02-08T06:48:06.568463+00:00 de-fra2-unifi1 sshd[112777]: Invalid user alex from 103.146.52.96 port 37698
2025-02-08T06:53:04.514346+00:00 de-fra2-unifi1 sshd[112821]: Invalid user user1 from 103.146.52.96 port 40570
2025-02-08T06:54:17.439521+00:00 de-fra2-unifi1 sshd[112838]: Invalid user deploy from 103.146.52.96 port 38718
... show less
2025-02-08T14:49:53.160695+08:00 VM-8-9-debian sshd[1487337]: pam_unix(sshd:auth): authentication fa ... show more2025-02-08T14:49:53.160695+08:00 VM-8-9-debian sshd[1487337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.52.96
2025-02-08T14:49:55.339030+08:00 VM-8-9-debian sshd[1487337]: Failed password for invalid user alex from 103.146.52.96 port 51412 ssh2
2025-02-08T14:53:28.034123+08:00 VM-8-9-debian sshd[1487367]: Invalid user user1 from 103.146.52.96 port 42252
... show less
Feb 8 05:53:16 Svalbard sshd[758274]: Failed password for root from 103.146.52.96 port 57464 ssh2<b ... show moreFeb 8 05:53:16 Svalbard sshd[758274]: Failed password for root from 103.146.52.96 port 57464 ssh2
Feb 8 05:54:27 Svalbard sshd[759212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.52.96 user=root
Feb 8 05:54:29 Svalbard sshd[759212]: Failed password for root from 103.146.52.96 port 55422 ssh2
... show less
Brute-ForceSSH
Anonymous
Feb 8 07:53:38 community sshd[2472847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreFeb 8 07:53:38 community sshd[2472847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.52.96 user=root
Feb 8 07:53:40 community sshd[2472847]: Failed password for root from 103.146.52.96 port 43206 ssh2
... show less
2025-02-08T04:54:25.064339+01:00 nc3.motyka.pro sshd[2909060]: Failed password for root from 103.146 ... show more2025-02-08T04:54:25.064339+01:00 nc3.motyka.pro sshd[2909060]: Failed password for root from 103.146.52.96 port 39414 ssh2
2025-02-08T04:55:55.584690+01:00 nc3.motyka.pro sshd[2911996]: Failed password for root from 103.146.52.96 port 39676 ssh2
2025-02-08T04:57:11.949063+01:00 nc3.motyka.pro sshd[2914479]: Failed password for root from 103.146.52.96 port 37794 ssh2
2025-02-08T04:58:27.274325+01:00 nc3.motyka.pro sshd[2916832]: Failed password for root from 103.146.52.96 port 35922 ssh2
2025-02-08T04:59:41.150714+01:00 nc3.motyka.pro sshd[2919223]: Failed password for root from 103.146.52.96 port 34044 ssh2
... show less
Feb 8 04:56:57 fshubvidspace sshd[2613783]: Failed password for root from 103.146.52.96 port 48850 ... show moreFeb 8 04:56:57 fshubvidspace sshd[2613783]: Failed password for root from 103.146.52.96 port 48850 ssh2
Feb 8 04:58:10 fshubvidspace sshd[2614059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.52.96 user=root
Feb 8 04:58:12 fshubvidspace sshd[2614059]: Failed password for root from 103.146.52.96 port 46974 ssh2
Feb 8 04:59:24 fshubvidspace sshd[2614346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.52.96 user=root
Feb 8 04:59:26 fshubvidspace sshd[2614346]: Failed password for root from 103.146.52.96 port 45094 ssh2
... show less
2025-02-08T03:14:22.207437+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[2243654]: pam_unix(sshd:auth): a ... show more2025-02-08T03:14:22.207437+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[2243654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.52.96
2025-02-08T03:14:24.518461+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[2243654]: Failed password for invalid user es from 103.146.52.96 port 49020 ssh2
2025-02-08T03:17:59.774151+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[2244399]: Invalid user server from 103.146.52.96 port 40224
... show less
2025-02-08T03:14:20.369768+02:00 vortexmapping sshd[118394]: Failed password for invalid user test1 ... show more2025-02-08T03:14:20.369768+02:00 vortexmapping sshd[118394]: Failed password for invalid user test1 from 103.146.52.96 port 46294 ssh2
2025-02-08T03:18:22.471411+02:00 vortexmapping sshd[118552]: Invalid user es from 103.146.52.96 port 41312
2025-02-08T03:18:22.479927+02:00 vortexmapping sshd[118552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.52.96
2025-02-08T03:18:24.970836+02:00 vortexmapping sshd[118552]: Failed password for invalid user es from 103.146.52.96 port 41312 ssh2
2025-02-08T03:19:40.685174+02:00 vortexmapping sshd[118608]: Invalid user test1 from 103.146.52.96 port 39294
... show less
Feb 7 18:17:35 b146-03 sshd[414170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreFeb 7 18:17:35 b146-03 sshd[414170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.52.96
Feb 7 18:17:38 b146-03 sshd[414170]: Failed password for invalid user test1 from 103.146.52.96 port 47728 ssh2
Feb 7 18:19:08 b146-03 sshd[414258]: Invalid user es from 103.146.52.96 port 48014
... show less