This IP address has been reported a total of 340
times from 179 distinct
sources.
138.197.72.150 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Feb 14 17:03:03 roki2 sshd\[1272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 e ... show moreFeb 14 17:03:03 roki2 sshd\[1272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.150 user=root
Feb 14 17:03:04 roki2 sshd\[1272\]: Failed password for root from 138.197.72.150 port 53578 ssh2
Feb 14 17:05:51 roki2 sshd\[1657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.150 user=root
Feb 14 17:05:53 roki2 sshd\[1657\]: Failed password for root from 138.197.72.150 port 42240 ssh2
Feb 14 17:05:55 roki2 sshd\[1665\]: Invalid user pi from 138.197.72.150
... show less
Feb 14 17:03:03 roki2 sshd\[1272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 e ... show moreFeb 14 17:03:03 roki2 sshd\[1272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.150 user=root
Feb 14 17:03:04 roki2 sshd\[1272\]: Failed password for root from 138.197.72.150 port 53578 ssh2
Feb 14 17:05:51 roki2 sshd\[1657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.150 user=root
Feb 14 17:05:53 roki2 sshd\[1657\]: Failed password for root from 138.197.72.150 port 42240 ssh2
Feb 14 17:05:55 roki2 sshd\[1665\]: Invalid user pi from 138.197.72.150
... show less
Feb 20 21:15:58 PAR-636868 sshd[975479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreFeb 20 21:15:58 PAR-636868 sshd[975479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.150
Feb 20 21:15:58 PAR-636868 sshd[975479]: Invalid user elasticsearch from 138.197.72.150 port 49706
Feb 20 21:16:00 PAR-636868 sshd[975479]: Failed password for invalid user elasticsearch from 138.197.72.150 port 49706 ssh2
... show less
FTP Brute-ForcePort ScanHackingBrute-ForceBad Web BotWeb App AttackSSH
Feb 20 20:55:00 horseguai sshd[895788]: Failed password for root from 138.197.72.150 port 48092 ssh2 ... show moreFeb 20 20:55:00 horseguai sshd[895788]: Failed password for root from 138.197.72.150 port 48092 ssh2
Feb 20 20:55:08 horseguai sshd[895794]: Invalid user pi from 138.197.72.150 port 56044
Feb 20 20:55:09 horseguai sshd[895794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.150
Feb 20 20:55:10 horseguai sshd[895794]: Failed password for invalid user pi from 138.197.72.150 port 56044 ssh2
Feb 20 20:55:17 horseguai sshd[895800]: Invalid user hive from 138.197.72.150 port 35466
... show less
Feb 20 20:54:56 PAR-636868 sshd[975157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreFeb 20 20:54:56 PAR-636868 sshd[975157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.150 user=root
Feb 20 20:54:58 PAR-636868 sshd[975157]: Failed password for root from 138.197.72.150 port 58556 ssh2
Feb 20 20:55:06 PAR-636868 sshd[975172]: Invalid user pi from 138.197.72.150 port 60122
... show less
FTP Brute-ForcePort ScanHackingBrute-ForceBad Web BotWeb App AttackSSH