This IP address has been reported a total of 231
times from 142 distinct
sources.
103.150.136.214 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-07T01:33:17.983826-04:00 elijahr sshd[807381]: Disconnected from authenticating user root 10 ... show more2024-09-07T01:33:17.983826-04:00 elijahr sshd[807381]: Disconnected from authenticating user root 103.150.136.214 port 39812 [preauth]
2024-09-07T01:37:15.885376-04:00 elijahr sshd[807478]: Invalid user username from 103.150.136.214 port 47450
2024-09-07T01:37:16.104199-04:00 elijahr sshd[807478]: Disconnected from invalid user username 103.150.136.214 port 47450 [preauth]
2024-09-07T01:38:07.253056-04:00 elijahr sshd[807511]: Invalid user db2inst1 from 103.150.136.214 port 34398
... show less
2024-09-07T10:37:16.728252 singularity sshd[314146]: Connection from 103.150.136.214 port 42226 on 6 ... show more2024-09-07T10:37:16.728252 singularity sshd[314146]: Connection from 103.150.136.214 port 42226 on 62.113.107.38 port 2222 rdomain ""
2024-09-07T10:37:17.725682 singularity sshd[314146]: Invalid user admin from 103.150.136.214 port 42226
2024-09-07T10:37:17.913695 singularity sshd[314146]: Disconnected from invalid user admin 103.150.136.214 port 42226 [preauth]
2024-09-07T10:38:04.427390 singularity sshd[314236]: Connection from 103.150.136.214 port 56182 on 62.113.107.38 port 2222 rdomain ""
2024-09-07T10:38:05.434105 singularity sshd[314236]: User root from 103.150.136.214 not allowed because not listed in AllowUsers
... show less
DNS CompromiseDNS PoisoningFraud OrdersDDoS AttackFTP Brute-ForcePing of DeathPhishingFraud VoIPOpen ProxyWeb SpamEmail SpamBlog SpamVPN IPPort ScanHackingSQL InjectionSpoofingBrute-ForceBad Web BotExploited HostWeb App AttackSSHIoT Targeted
Sep 7 02:55:58 mail sshd[3342766]: Invalid user user1 from 103.150.136.214 port 54774
Sep 7 ... show moreSep 7 02:55:58 mail sshd[3342766]: Invalid user user1 from 103.150.136.214 port 54774
Sep 7 03:03:27 mail sshd[3342982]: Invalid user uftp from 103.150.136.214 port 52778
Sep 7 03:04:16 mail sshd[3343010]: Invalid user tesla from 103.150.136.214 port 38404
Sep 7 03:05:05 mail sshd[3343030]: Invalid user Rizve from 103.150.136.214 port 52258
Sep 7 03:05:53 mail sshd[3343059]: Invalid user sql from 103.150.136.214 port 37878
... show less
2024-09-07T04:19:10.949845+02:00 vmd69965.contaboserver.net sshd[3483977]: Invalid user wangyaobo fr ... show more2024-09-07T04:19:10.949845+02:00 vmd69965.contaboserver.net sshd[3483977]: Invalid user wangyaobo from 103.150.136.214 port 44620
2024-09-07T04:28:07.374809+02:00 vmd69965.contaboserver.net sshd[3485102]: Invalid user ch from 103.150.136.214 port 34794
2024-09-07T04:28:58.739735+02:00 vmd69965.contaboserver.net sshd[3485142]: Invalid user oracle from 103.150.136.214 port 50492
2024-09-07T04:30:34.269568+02:00 vmd69965.contaboserver.net sshd[3486308]: Invalid user yiling from 103.150.136.214 port 52876
2024-09-07T04:31:22.018054+02:00 vmd69965.contaboserver.net sshd[3486355]: Invalid user bdc from 103.150.136.214 port 39508
... show less
Detected 50 times. SSH Brute-Force from address 103.150.136.214
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 103.150.136.214 (-): 5 in the last 3600 secs; Ports: *; Direction: inou ... show more(sshd) Failed SSH login from 103.150.136.214 (-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 6 18:53:55 server5 sshd[3426]: Invalid user ad from 103.150.136.214
Sep 6 18:53:55 server5 sshd[3426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.136.214
Sep 6 18:53:57 server5 sshd[3426]: Failed password for invalid user ad from 103.150.136.214 port 51130 ssh2
Sep 6 19:01:57 server5 sshd[4781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.136.214 user=root
Sep 6 19:01:59 server5 sshd[4781]: Failed password for root from 103.150.136.214 port 52600 ssh2 show less