This IP address has been reported a total of 3,507
times from 854 distinct
sources.
124.221.49.14 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
(sshd) Failed SSH login from 124.221.49.14 (CN/-/-): 5 in the last 3600 secs; Ports: *; Direction: i ... show more(sshd) Failed SSH login from 124.221.49.14 (CN/-/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 14 03:32:29 na-s3 sshd[1976089]: Invalid user fmmud from 124.221.49.14 port 48278
Jun 14 03:32:31 na-s3 sshd[1976089]: Failed password for invalid user fmmud from 124.221.49.14 port 48278 ssh2
Jun 14 03:34:38 na-s3 sshd[2003996]: Invalid user mzhou from 124.221.49.14 port 41676
Jun 14 03:34:40 na-s3 sshd[2003996]: Failed password for invalid user mzhou from 124.221.49.14 port 41676 ssh2
Jun 14 03:35:44 na-s3 sshd[2017732]: Invalid user movies from 124.221.49.14 port 57076 show less
2024-06-14T09:24:45.097308+02:00 git-lab sshd[1422049]: pam_unix(sshd:auth): authentication failure; ... show more2024-06-14T09:24:45.097308+02:00 git-lab sshd[1422049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.49.14
2024-06-14T09:24:47.035971+02:00 git-lab sshd[1422049]: Failed password for invalid user fmmud from 124.221.49.14 port 35624 ssh2
2024-06-14T09:31:43.053742+02:00 git-lab sshd[1434414]: Invalid user mzhou from 124.221.49.14 port 59264
... show less
2024-06-14T05:14:54.975972+02:00 mail sshd[247642]: pam_unix(sshd:auth): authentication failure; log ... show more2024-06-14T05:14:54.975972+02:00 mail sshd[247642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.49.14
2024-06-14T05:14:56.581021+02:00 mail sshd[247642]: Failed password for invalid user teamspeak from 124.221.49.14 port 40808 ssh2
2024-06-14T05:15:52.515991+02:00 mail sshd[247673]: Invalid user dstserver from 124.221.49.14 port 51646
2024-06-14T05:15:52.521759+02:00 mail sshd[247673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.49.14
2024-06-14T05:15:54.758025+02:00 mail sshd[247673]: Failed password for invalid user dstserver from 124.221.49.14 port 51646 ssh2
... show less
Jun 14 03:14:40 worker-03 sshd[1566516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreJun 14 03:14:40 worker-03 sshd[1566516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.49.14
Jun 14 03:14:42 worker-03 sshd[1566516]: Failed password for invalid user teamspeak from 124.221.49.14 port 34538 ssh2
Jun 14 03:15:38 worker-03 sshd[1566566]: Invalid user dstserver from 124.221.49.14 port 45370
Jun 14 03:15:38 worker-03 sshd[1566566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.49.14
Jun 14 03:15:40 worker-03 sshd[1566566]: Failed password for invalid user dstserver from 124.221.49.14 port 45370 ssh2
... show less
Jun 14 10:11:20 pve sshd[2359718]: Disconnected from authenticating user root 124.221.49.14 port 588 ... show moreJun 14 10:11:20 pve sshd[2359718]: Disconnected from authenticating user root 124.221.49.14 port 58870 [preauth]
Jun 14 10:14:36 pve sshd[2360875]: Invalid user teamspeak from 124.221.49.14 port 57280
Jun 14 10:14:36 pve sshd[2360875]: Disconnected from invalid user teamspeak 124.221.49.14 port 57280 [preauth]
Jun 14 10:15:35 pve sshd[2361196]: Invalid user dstserver from 124.221.49.14 port 39880
Jun 14 10:15:36 pve sshd[2361196]: Disconnected from invalid user dstserver 124.221.49.14 port 39880 [preauth]
... show less
Funeypot detected 25 ssh attempts in 20m50s. Last by user "ts3", password "t*3", client "libssh_0.9. ... show moreFuneypot detected 25 ssh attempts in 20m50s. Last by user "ts3", password "t*3", client "libssh_0.9.6". show less
Funeypot detected 5 ssh attempts in 5m22s. Last by user "barcelona", password "bar***ona", client "l ... show moreFuneypot detected 5 ssh attempts in 5m22s. Last by user "barcelona", password "bar***ona", client "libssh_0.9.6". show less
Jun 13 19:59:36 ssfs sshd[1829577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreJun 13 19:59:36 ssfs sshd[1829577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.49.14
Jun 13 19:59:38 ssfs sshd[1829577]: Failed password for invalid user postgres from 124.221.49.14 port 48194 ssh2
Jun 13 20:08:44 ssfs sshd[1831355]: User root from 124.221.49.14 not allowed because listed in DenyUsers
... show less
[rede-44-49] (sshd) Failed SSH login from 124.221.49.14 (CN/China/-): 5 in the last 3600 secs; Ports ... show more[rede-44-49] (sshd) Failed SSH login from 124.221.49.14 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 13 06:41:35 sshd[32167]: Invalid user [USERNAME] from 124.221.49.14 port 35734
Jun 13 06:41:37 sshd[32167]: Failed password for invalid user [USERNAME] from 124.221.49.14 port 35734 ssh2
Jun 13 06:44:06 sshd[32483]: Invalid user [USERNAME] from 124.221.49.14 port 54540
Jun 13 06:44:08 sshd[32483]: Failed password for invalid user [USERNAME] from 124.221.49.14 port 54540 ssh2
Jun 13 06:59:24 sshd[884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124 show less
SSH brute force: 4 attempts were recorded from 124.221.49.14
2024-06-13T10:07:52.274593+02:00 ... show moreSSH brute force: 4 attempts were recorded from 124.221.49.14
2024-06-13T10:07:52.274593+02:00 user oracle from 124.221.49.14 port 33024
2024-06-13T10:07:52.487503+02:00 from invalid user oracle 124.221.49.14 port 33024 [preauth]
2024-06-13T10:09:07.299591+02:00 from authenticating user root 124.221.49.14 port 48036 [preauth]
2024-06-13T10:12:14.729976+02:00 from authenticating user root 124.221.49.14 port 49040 [preauth] show less