This IP address has been reported a total of 405
times from 169 distinct
sources.
123.193.196.150 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-10-01T14:54:39.827275angela sshd[789738]: Failed password for root from 123.193.196.150 port 44 ... show more2024-10-01T14:54:39.827275angela sshd[789738]: Failed password for root from 123.193.196.150 port 44340 ssh2
2024-10-01T14:56:39.012868angela sshd[789891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.193.196.150 user=root
2024-10-01T14:56:41.024147angela sshd[789891]: Failed password for root from 123.193.196.150 port 57138 ssh2
... show less
SSH
Anonymous
2024-10-01T09:48:09.342200 SPARTAN sshd[15630]: pam_unix(sshd:auth): authentication failure; logname ... show more2024-10-01T09:48:09.342200 SPARTAN sshd[15630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123-193-196-150.dynamic.kbronet.com.tw user=root
2024-10-01T09:48:11.310055 SPARTAN sshd[15630]: Failed password for root from 123.193.196.150 port 54136 ssh2
2024-10-01T09:56:29.747709 SPARTAN sshd[19179]: Invalid user ubuntu from 123.193.196.150 port 48692
2024-10-01T09:56:29.753515 SPARTAN sshd[19179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123-193-196-150.dynamic.kbronet.com.tw
2024-10-01T09:56:31.181307 SPARTAN sshd[19179]: Failed password for invalid user ubuntu from 123.193.196.150 port 48692 ssh2
... show less
Report 1356625 with IP 1996478 for SSH brute-force attack by source 2398850 via ssh-honeypot/0.2.0+h ... show moreReport 1356625 with IP 1996478 for SSH brute-force attack by source 2398850 via ssh-honeypot/0.2.0+http show less
Oct 1 13:19:36 sg-mirror sshd[73984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreOct 1 13:19:36 sg-mirror sshd[73984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.193.196.150 user=root
Oct 1 13:19:38 sg-mirror sshd[73984]: Failed password for root from 123.193.196.150 port 34220 ssh2
... show less
Oct 1 06:43:36 b146-29 sshd[3375345]: Failed password for root from 123.193.196.150 port 37112 ssh2 ... show moreOct 1 06:43:36 b146-29 sshd[3375345]: Failed password for root from 123.193.196.150 port 37112 ssh2
Oct 1 06:54:23 b146-29 sshd[3377163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.193.196.150 user=root
Oct 1 06:54:25 b146-29 sshd[3377163]: Failed password for root from 123.193.196.150 port 44310 ssh2
... show less
Oct 1 08:00:36 gen sshd[147515]: Failed password for invalid user patrick from 123.193.196.150 port ... show moreOct 1 08:00:36 gen sshd[147515]: Failed password for invalid user patrick from 123.193.196.150 port 53450 ssh2
Oct 1 08:20:19 gen sshd[148014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.193.196.150 user=root
Oct 1 08:20:21 gen sshd[148014]: Failed password for root from 123.193.196.150 port 46416 ssh2
... show less
DATE:2024-10-01 14:17:57, IP:123.193.196.150, PORT:ssh SSH brute force auth on honeypot server (epe- ... show moreDATE:2024-10-01 14:17:57, IP:123.193.196.150, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq) show less
[rede-176-124] (sshd) Failed SSH login from 123.193.196.150 (TW/Taiwan/123-193-196-150.dynamic.kbron ... show more[rede-176-124] (sshd) Failed SSH login from 123.193.196.150 (TW/Taiwan/123-193-196-150.dynamic.kbronet.com.tw): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 23 14:00:59 sshd[28161]: Invalid user [USERNAME] from 123.193.196.150 port 37542
Sep 23 14:01:02 sshd[28161]: Failed password for invalid user [USERNAME] from 123.193.196.150 port 37542 ssh2
Sep 23 14:03:07 sshd[28273]: Invalid user [USERNAME] from 123.193.196.150 port 53000
Sep 23 14:03:09 sshd[28273]: Failed password for invalid user [USERNAME] from 123.193.196.150 port 53000 ssh2
Sep 23 14:05:20 sshd[28324]: Failed password for [USERNAME] from 123.193.196.150 port 40236 ssh2 show less
Port Scan
Anonymous
2024-09-23T19:00:49+02:00 exit-2 sshd[75033]: pam_unix(sshd:auth): authentication failure; logname= ... show more2024-09-23T19:00:49+02:00 exit-2 sshd[75033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.193.196.150
2024-09-23T19:00:51+02:00 exit-2 sshd[75033]: Failed password for invalid user chris from 123.193.196.150 port 54228 ssh2
2024-09-23T19:00:49+02:00 exit-2 sshd[75033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.193.196.150
2024-09-23T19:00:51+02:00 exit-2 sshd[75033]: Failed password for invalid user chris from 123.193.196.150 port 54228 ssh2
... show less