This IP address has been reported a total of 422
times from 254 distinct
sources.
103.2.229.148 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-17T21:22:07.521576+00:00 erdbeerbaerlp.de sshd[834279]: Invalid user user from 103.2.229.148 ... show more2024-11-17T21:22:07.521576+00:00 erdbeerbaerlp.de sshd[834279]: Invalid user user from 103.2.229.148 port 51510
2024-11-17T21:25:07.614370+00:00 erdbeerbaerlp.de sshd[915041]: Invalid user ftpuser from 103.2.229.148 port 39556
2024-11-17T21:27:47.182528+00:00 erdbeerbaerlp.de sshd[985877]: Invalid user ftpuser from 103.2.229.148 port 53994
... show less
Nov 17 22:02:03 host1 sshd[2052519]: Failed password for root from 103.2.229.148 port 56984 ssh2<br ... show moreNov 17 22:02:03 host1 sshd[2052519]: Failed password for root from 103.2.229.148 port 56984 ssh2
Nov 17 22:04:36 host1 sshd[2052913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
Nov 17 22:04:38 host1 sshd[2052913]: Failed password for root from 103.2.229.148 port 42766 ssh2
Nov 17 22:04:36 host1 sshd[2052913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
Nov 17 22:04:38 host1 sshd[2052913]: Failed password for root from 103.2.229.148 port 42766 ssh2
... show less
Nov 17 21:43:11 host1 sshd[2050231]: Failed password for root from 103.2.229.148 port 43574 ssh2<br ... show moreNov 17 21:43:11 host1 sshd[2050231]: Failed password for root from 103.2.229.148 port 43574 ssh2
Nov 17 21:45:49 host1 sshd[2050494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
Nov 17 21:45:52 host1 sshd[2050494]: Failed password for root from 103.2.229.148 port 57590 ssh2
Nov 17 21:48:33 host1 sshd[2050917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
Nov 17 21:48:35 host1 sshd[2050917]: Failed password for root from 103.2.229.148 port 43376 ssh2
... show less
[rede-168-134] (sshd) Failed SSH login from 103.2.229.148 (-): 5 in the last 3600 secs; Ports: *; Di ... show more[rede-168-134] (sshd) Failed SSH login from 103.2.229.148 (-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 17 17:36:03 sshd[4795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=[USERNAME]
Nov 17 17:36:05 sshd[4795]: Failed password for [USERNAME] from 103.2.229.148 port 56496 ssh2
Nov 17 17:40:06 sshd[4854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=[USERNAME]
Nov 17 17:40:08 sshd[4854]: Failed password for [USERNAME] from 103.2.229.148 port 54678 ssh2
Nov 17 17:42:52 ss show less
Nov 17 21:27:04 Debian-1202-bookworm-amd64-base sshd[4007512]: Failed password for invalid user user ... show moreNov 17 21:27:04 Debian-1202-bookworm-amd64-base sshd[4007512]: Failed password for invalid user user from 103.2.229.148 port 35066 ssh2
Nov 17 21:29:43 Debian-1202-bookworm-amd64-base sshd[4067989]: Invalid user ubuntu from 103.2.229.148 port 49504
Nov 17 21:29:43 Debian-1202-bookworm-amd64-base sshd[4067989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148
Nov 17 21:29:44 Debian-1202-bookworm-amd64-base sshd[4067989]: Failed password for invalid user ubuntu from 103.2.229.148 port 49504 ssh2
Nov 17 21:32:22 Debian-1202-bookworm-amd64-base sshd[4131020]: Invalid user developer from 103.2.229.148 port 35716
... show less
Nov 17 21:11:34 Debian-1202-bookworm-amd64-base sshd[3645487]: Failed password for invalid user misu ... show moreNov 17 21:11:34 Debian-1202-bookworm-amd64-base sshd[3645487]: Failed password for invalid user misuser from 103.2.229.148 port 33162 ssh2
Nov 17 21:14:09 Debian-1202-bookworm-amd64-base sshd[3707950]: Invalid user postgres from 103.2.229.148 port 47596
Nov 17 21:14:09 Debian-1202-bookworm-amd64-base sshd[3707950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148
Nov 17 21:14:11 Debian-1202-bookworm-amd64-base sshd[3707950]: Failed password for invalid user postgres from 103.2.229.148 port 47596 ssh2
Nov 17 21:16:51 Debian-1202-bookworm-amd64-base sshd[3769500]: Invalid user postgres from 103.2.229.148 port 33790
... show less
Nov 17 20:55:23 Debian-1202-bookworm-amd64-base sshd[3267441]: Failed password for invalid user ubun ... show moreNov 17 20:55:23 Debian-1202-bookworm-amd64-base sshd[3267441]: Failed password for invalid user ubuntu from 103.2.229.148 port 55042 ssh2
Nov 17 20:58:31 Debian-1202-bookworm-amd64-base sshd[3340421]: Invalid user testusr from 103.2.229.148 port 45672
Nov 17 20:58:31 Debian-1202-bookworm-amd64-base sshd[3340421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148
Nov 17 20:58:33 Debian-1202-bookworm-amd64-base sshd[3340421]: Failed password for invalid user testusr from 103.2.229.148 port 45672 ssh2
Nov 17 21:01:09 Debian-1202-bookworm-amd64-base sshd[3405943]: Invalid user postgres from 103.2.229.148 port 60110
... show less
Brute-ForceSSH
Anonymous
Nov 17 16:52:31 ica-cluster sshd[222507]: Failed password for invalid user ubuntu from 103.2.229.148 ... show moreNov 17 16:52:31 ica-cluster sshd[222507]: Failed password for invalid user ubuntu from 103.2.229.148 port 49846 ssh2
Nov 17 16:56:49 ica-cluster sshd[222563]: Invalid user testusr from 103.2.229.148 port 52168
Nov 17 16:56:49 ica-cluster sshd[222563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148
Nov 17 16:56:51 ica-cluster sshd[222563]: Failed password for invalid user testusr from 103.2.229.148 port 52168 ssh2
Nov 17 16:59:28 ica-cluster sshd[222660]: Invalid user postgres from 103.2.229.148 port 38370
... show less
2024-11-17T16:55:26.991789devel sshd[23890]: Invalid user ubuntu from 103.2.229.148 port 33382 ... show more2024-11-17T16:55:26.991789devel sshd[23890]: Invalid user ubuntu from 103.2.229.148 port 33382
2024-11-17T16:55:29.194177devel sshd[23890]: Failed password for invalid user ubuntu from 103.2.229.148 port 33382 ssh2
2024-11-17T16:58:36.491824devel sshd[25544]: Invalid user testusr from 103.2.229.148 port 52036 show less
2024-11-17T20:55:26.543449+01:00 bear sshd[544000]: Invalid user ubuntu from 103.2.229.148 port 3990 ... show more2024-11-17T20:55:26.543449+01:00 bear sshd[544000]: Invalid user ubuntu from 103.2.229.148 port 39908
2024-11-17T20:55:26.547216+01:00 bear sshd[544000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148
2024-11-17T20:55:28.736186+01:00 bear sshd[544000]: Failed password for invalid user ubuntu from 103.2.229.148 port 39908 ssh2
... show less
Nov 17 19:31:41 henshouse sshd[1939614]: Failed password for root from 103.2.229.148 port 55852 ssh2 ... show moreNov 17 19:31:41 henshouse sshd[1939614]: Failed password for root from 103.2.229.148 port 55852 ssh2
Nov 17 19:34:27 henshouse sshd[1942994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
Nov 17 19:34:29 henshouse sshd[1942994]: Failed password for root from 103.2.229.148 port 41366 ssh2
... show less