This IP address has been reported a total of 422
times from 254 distinct
sources.
103.2.229.148 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-17T13:36:07.364455+00:00 saccapposh sshd[241838]: Invalid user deploy from 103.2.229.148 por ... show more2024-11-17T13:36:07.364455+00:00 saccapposh sshd[241838]: Invalid user deploy from 103.2.229.148 port 33930
2024-11-17T13:38:34.053596+00:00 saccapposh sshd[246382]: Invalid user test from 103.2.229.148 port 47456
2024-11-17T13:41:07.645001+00:00 saccapposh sshd[251255]: Invalid user postgres from 103.2.229.148 port 60986
... show less
2024-11-17T14:29:03.300077+01:00 ondrej-desktop sshd[390393]: pam_unix(sshd:auth): authentication fa ... show more2024-11-17T14:29:03.300077+01:00 ondrej-desktop sshd[390393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
2024-11-17T14:29:05.200908+01:00 ondrej-desktop sshd[390393]: Failed password for root from 103.2.229.148 port 52306 ssh2
2024-11-17T14:31:45.027212+01:00 ondrej-desktop sshd[390924]: Invalid user dev from 103.2.229.148 port 37606
... show less
Nov 17 15:26:33 ubuntu-MQTT sshd[386173]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreNov 17 15:26:33 ubuntu-MQTT sshd[386173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
Nov 17 15:26:35 ubuntu-MQTT sshd[386173]: Failed password for invalid user root from 103.2.229.148 port 47080 ssh2
Nov 17 15:26:33 ubuntu-MQTT sshd[386173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
Nov 17 15:26:35 ubuntu-MQTT sshd[386173]: Failed password for invalid user root from 103.2.229.148 port 47080 ssh2
Nov 17 15:29:44 ubuntu-MQTT sshd[386190]: User root from 103.2.229.148 not allowed because not listed in AllowUsers
... show less
Nov 17 13:24:15 thecount sshd[1842769]: Disconnected from authenticating user root 103.2.229.148 por ... show moreNov 17 13:24:15 thecount sshd[1842769]: Disconnected from authenticating user root 103.2.229.148 port 50456 [preauth]
... show less
Nov 17 12:47:47 dagasistemas sshd[12099]: Invalid user ftpuser from 103.2.229.148 port 43976
N ... show moreNov 17 12:47:47 dagasistemas sshd[12099]: Invalid user ftpuser from 103.2.229.148 port 43976
Nov 17 12:47:47 dagasistemas sshd[12099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148
Nov 17 12:47:49 dagasistemas sshd[12099]: Failed password for invalid user ftpuser from 103.2.229.148 port 43976 ssh2
... show less
2024-11-17T12:16:12.930504+01:00 linux sshd[1000249]: pam_unix(sshd:auth): authentication failure; l ... show more2024-11-17T12:16:12.930504+01:00 linux sshd[1000249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.229.148 user=root
2024-11-17T12:16:15.218695+01:00 linux sshd[1000249]: Failed password for root from 103.2.229.148 port 56878 ssh2 show less