This IP address has been reported a total of 979
times from 483 distinct
sources.
104.248.146.99 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-10-06T15:04:42.642862elastic1 sshd[15912]: Invalid user steam from 104.248.146.99 port 41510<br ... show more2024-10-06T15:04:42.642862elastic1 sshd[15912]: Invalid user steam from 104.248.146.99 port 41510
2024-10-06T15:06:57.455046elastic1 sshd[16113]: Invalid user test from 104.248.146.99 port 58290
2024-10-06T15:07:42.460143elastic1 sshd[16182]: Invalid user ftpuser from 104.248.146.99 port 54226
... show less
Oct 6 08:50:04 b146-32 sshd[3159242]: Failed password for root from 104.248.146.99 port 51366 ssh2< ... show moreOct 6 08:50:04 b146-32 sshd[3159242]: Failed password for root from 104.248.146.99 port 51366 ssh2
Oct 6 08:50:53 b146-32 sshd[3159319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.146.99 user=root
Oct 6 08:50:55 b146-32 sshd[3159319]: Failed password for root from 104.248.146.99 port 48422 ssh2
... show less
2024-10-06_14:45:43.14195 User root from 104.248.146.99 not allowed because not listed in AllowUsers ... show more2024-10-06_14:45:43.14195 User root from 104.248.146.99 not allowed because not listed in AllowUsers
2024-10-06_14:49:46.18872 User root from 104.248.146.99 not allowed because not listed in AllowUsers
2024-10-06_14:50:37.72947 User root from 104.248.146.99 not allowed because not listed in AllowUsers
... show less
Brute-ForceSSH
Anonymous
Oct 6 16:04:41 wolf1 sshd[136109]: Invalid user wwc from 104.248.146.99 port 49524
Oct 6 16: ... show moreOct 6 16:04:41 wolf1 sshd[136109]: Invalid user wwc from 104.248.146.99 port 49524
Oct 6 16:07:51 wolf1 sshd[136294]: Invalid user bwl from 104.248.146.99 port 50916
Oct 6 16:08:37 wolf1 sshd[136332]: Invalid user iib from 104.248.146.99 port 51234
Oct 6 16:09:25 wolf1 sshd[136433]: Invalid user vpf from 104.248.146.99 port 39356
Oct 6 16:10:10 wolf1 sshd[136472]: Invalid user user from 104.248.146.99 port 50758
... show less
DDoS AttackFTP Brute-ForcePort ScanHackingSQL InjectionSpoofingBrute-ForceBad Web BotSSHIoT Targeted
2024-10-06T12:41:52.262540+00:00 edge-fog-zrh01.int.pdx.net.uk sshd[3078219]: Invalid user user from ... show more2024-10-06T12:41:52.262540+00:00 edge-fog-zrh01.int.pdx.net.uk sshd[3078219]: Invalid user user from 104.248.146.99 port 33652
2024-10-06T12:49:29.262404+00:00 edge-fog-zrh01.int.pdx.net.uk sshd[3078787]: Invalid user postgres from 104.248.146.99 port 46214
2024-10-06T12:52:08.324594+00:00 edge-fog-zrh01.int.pdx.net.uk sshd[3079017]: Invalid user debian from 104.248.146.99 port 37736
... show less
Oct 6 12:43:27 h2908150 sshd[2329254]: Invalid user ubuntu from 104.248.146.99 port 43562
Oct ... show moreOct 6 12:43:27 h2908150 sshd[2329254]: Invalid user ubuntu from 104.248.146.99 port 43562
Oct 6 12:44:16 h2908150 sshd[2329293]: Connection from 104.248.146.99 port 33590 on 85.214.73.9 port 22 rdomain ""
Oct 6 12:44:17 h2908150 sshd[2329293]: Invalid user user from 104.248.146.99 port 33590
... show less
Oct 6 06:38:15 graph sshd[2525800]: Failed password for invalid user dev from 104.248.146.99 port 5 ... show moreOct 6 06:38:15 graph sshd[2525800]: Failed password for invalid user dev from 104.248.146.99 port 51278 ssh2
Oct 6 06:43:17 graph sshd[2526326]: Invalid user ubuntu from 104.248.146.99 port 34118
Oct 6 06:43:17 graph sshd[2526326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.146.99
Oct 6 06:43:19 graph sshd[2526326]: Failed password for invalid user ubuntu from 104.248.146.99 port 34118 ssh2
Oct 6 06:44:07 graph sshd[2526445]: Invalid user user from 104.248.146.99 port 55330
... show less
Oct 6 13:16:25 mail sshd[671872]: Invalid user testuser from 104.248.146.99 port 34242 Oct 6 13:18:3 ... show moreOct 6 13:16:25 mail sshd[671872]: Invalid user testuser from 104.248.146.99 port 34242 Oct 6 13:18:36 mail sshd[672219]: Invalid user oracle from 104.248.146.99 port 51382 Oct 6 13:20:07 mail sshd[672920]: Invalid user dev from 104.248.146.99 port 45848 show less
Oct 6 12:18:37 DreamStateRP sshd[939621]: Invalid user oracle from 104.248.146.99 port 51366
... show moreOct 6 12:18:37 DreamStateRP sshd[939621]: Invalid user oracle from 104.248.146.99 port 51366
Oct 6 12:18:37 DreamStateRP sshd[939621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.146.99
Oct 6 12:18:37 DreamStateRP sshd[939621]: Invalid user oracle from 104.248.146.99 port 51366
Oct 6 12:18:38 DreamStateRP sshd[939621]: Failed password for invalid user oracle from 104.248.146.99 port 51366 ssh2
Oct 6 12:19:23 DreamStateRP sshd[939665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.146.99 user=root
Oct 6 12:19:25 DreamStateRP sshd[939665]: Failed password for root from 104.248.146.99 port 56092 ssh2
Oct 6 12:20:07 DreamStateRP sshd[939698]: Invalid user dev from 104.248.146.99 port 49808
... show less
Oct 6 09:50:43 ubuntu sshd[572889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreOct 6 09:50:43 ubuntu sshd[572889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.146.99
Oct 6 09:50:45 ubuntu sshd[572889]: Failed password for invalid user deploy from 104.248.146.99 port 36878 ssh2
Oct 6 09:51:37 ubuntu sshd[572958]: Invalid user testuser from 104.248.146.99 port 60330
Oct 6 09:51:37 ubuntu sshd[572958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.146.99
Oct 6 09:51:40 ubuntu sshd[572958]: Failed password for invalid user testuser from 104.248.146.99 port 60330 ssh2
... show less
2024-10-06T11:11:51.512475+02:00 hz-vm-web-010 sshd[368705]: pam_unix(sshd:auth): authentication fai ... show more2024-10-06T11:11:51.512475+02:00 hz-vm-web-010 sshd[368705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.146.99
2024-10-06T11:11:53.498448+02:00 hz-vm-web-010 sshd[368705]: Failed password for invalid user df from 104.248.146.99 port 32814 ssh2
2024-10-06T11:12:37.672754+02:00 hz-vm-web-010 sshd[369380]: Invalid user gzm from 104.248.146.99 port 34880
2024-10-06T11:12:37.674259+02:00 hz-vm-web-010 sshd[369380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.146.99
2024-10-06T11:12:40.307704+02:00 hz-vm-web-010 sshd[369380]: Failed password for invalid user gzm from 104.248.146.99 port 34880 ssh2 show less