This IP address has been reported a total of 339
times from 203 distinct
sources.
103.49.238.134 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
103.49.238.134 (-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Di ... show more103.49.238.134 (-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Nov 30 11:28:35 server2 sshd[2973]: Failed password for root from 143.244.164.83 port 35374 ssh2
Nov 30 11:28:50 server2 sshd[3119]: Failed password for root from 103.75.183.83 port 43664 ssh2
Nov 30 11:28:19 server2 sshd[2884]: Failed password for root from 103.49.238.134 port 49260 ssh2
Nov 30 11:27:34 server2 sshd[2598]: Failed password for root from 14.63.217.28 port 50272 ssh2
Nov 30 11:29:42 server2 sshd[3389]: Failed password for root from 14.63.217.28 port 36150 ssh2
IP Addresses Blocked:
143.244.164.83 (US/United States/-)
103.75.183.83 (VN/Vietnam/-) show less
Nov 30 15:31:17 markkoudstaal sshd[3165540]: Failed password for root from 103.49.238.134 port 54970 ... show moreNov 30 15:31:17 markkoudstaal sshd[3165540]: Failed password for root from 103.49.238.134 port 54970 ssh2
Nov 30 15:33:09 markkoudstaal sshd[3165928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134 user=root
Nov 30 15:33:12 markkoudstaal sshd[3165928]: Failed password for root from 103.49.238.134 port 41076 ssh2
... show less
2024-11-30T07:58:06.999590-06:00 BAW-C02 sshd[2957328]: Failed password for invalid user influxdb fr ... show more2024-11-30T07:58:06.999590-06:00 BAW-C02 sshd[2957328]: Failed password for invalid user influxdb from 103.49.238.134 port 44676 ssh2
2024-11-30T07:59:52.653427-06:00 BAW-C02 sshd[2957445]: Invalid user babak from 103.49.238.134 port 48242
2024-11-30T07:59:52.667115-06:00 BAW-C02 sshd[2957445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134
2024-11-30T07:59:55.203594-06:00 BAW-C02 sshd[2957445]: Failed password for invalid user babak from 103.49.238.134 port 48242 ssh2
2024-11-30T08:01:47.679378-06:00 BAW-C02 sshd[2958049]: Invalid user ubuntu from 103.49.238.134 port 38410
... show less
2024-11-30T07:21:19.576146-06:00 BAW-C02 sshd[2953022]: Failed password for invalid user 11 from 103 ... show more2024-11-30T07:21:19.576146-06:00 BAW-C02 sshd[2953022]: Failed password for invalid user 11 from 103.49.238.134 port 46872 ssh2
2024-11-30T07:23:16.735050-06:00 BAW-C02 sshd[2953279]: Invalid user eric from 103.49.238.134 port 51062
2024-11-30T07:23:16.744442-06:00 BAW-C02 sshd[2953279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134
2024-11-30T07:23:18.473825-06:00 BAW-C02 sshd[2953279]: Failed password for invalid user eric from 103.49.238.134 port 51062 ssh2
2024-11-30T07:26:59.388080-06:00 BAW-C02 sshd[2953605]: Invalid user danilo from 103.49.238.134 port 48898
... show less
Brute-ForceSSH
Anonymous
Nov 30 12:02:24 f2b auth.info sshd[207536]: Failed password for root from 103.49.238.134 port 40322 ... show moreNov 30 12:02:24 f2b auth.info sshd[207536]: Failed password for root from 103.49.238.134 port 40322 ssh2
Nov 30 12:04:28 f2b auth.info sshd[207558]: Failed password for root from 103.49.238.134 port 48440 ssh2
Nov 30 12:06:26 f2b auth.info sshd[207561]: Failed password for root from 103.49.238.134 port 55390 ssh2
... show less
[rede-arem1] (sshd) Failed SSH login from 103.49.238.134 (ID/Indonesia/topkamatera.eu.com): 5 in the ... show more[rede-arem1] (sshd) Failed SSH login from 103.49.238.134 (ID/Indonesia/topkamatera.eu.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 30 08:57:16 sshd[26956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134 user=[USERNAME]
Nov 30 08:57:18 sshd[26956]: Failed password for [USERNAME] from 103.49.238.134 port 39560 ssh2
Nov 30 09:03:07 sshd[27165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134 user=[USERNAME]
Nov 30 09:03:09 sshd[27165]: Failed password for [USERNAME] from 103.49.238.134 port 47064 ssh2
Nov 30 09: show less
Port Scan
Anonymous
2024-11-30T12:13:42+01:00 lb-2 sshd[2384722]: pam_unix(sshd:auth): authentication failure; logname= ... show more2024-11-30T12:13:42+01:00 lb-2 sshd[2384722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134 user=root
2024-11-30T12:13:44+01:00 lb-2 sshd[2384722]: Failed password for root from 103.49.238.134 port 36542 ssh2
2024-11-30T12:15:41+01:00 lb-2 sshd[2385343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134 user=root
2024-11-30T12:15:43+01:00 lb-2 sshd[2385343]: Failed password for root from 103.49.238.134 port 55618 ssh2
... show less
Nov 30 02:23:47 cohoe sshd[3443679]: Failed password for root from 103.49.238.134 port 44064 ssh2<br ... show moreNov 30 02:23:47 cohoe sshd[3443679]: Failed password for root from 103.49.238.134 port 44064 ssh2
Nov 30 02:25:38 cohoe sshd[3443777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134 user=root
Nov 30 02:25:41 cohoe sshd[3443777]: Failed password for root from 103.49.238.134 port 33456 ssh2
Nov 30 02:27:32 cohoe sshd[3443888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134 user=root
Nov 30 02:27:34 cohoe sshd[3443888]: Failed password for root from 103.49.238.134 port 59404 ssh2
... show less
Nov 30 09:33:41 Sildom2 sshd[2115774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreNov 30 09:33:41 Sildom2 sshd[2115774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.238.134 user=root
Nov 30 09:33:43 Sildom2 sshd[2115774]: Failed password for root from 103.49.238.134 port 43054 ssh2
... show less