This IP address has been reported a total of 397
times from 236 distinct
sources.
139.47.14.250 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-18T11:22:38.686960+02:00 eos.nbg.backend.mtnmedia.group sshd[1155445]: error: maximum authen ... show more2024-09-18T11:22:38.686960+02:00 eos.nbg.backend.mtnmedia.group sshd[1155445]: error: maximum authentication attempts exceeded for root from 139.47.14.250 port 52574 ssh2 [preauth]
2024-09-18T11:22:39.574225+02:00 eos.nbg.backend.mtnmedia.group sshd[1155466]: error: maximum authentication attempts exceeded for root from 139.47.14.250 port 52590 ssh2 [preauth]
2024-09-18T11:22:40.873852+02:00 eos.nbg.backend.mtnmedia.group sshd[1155528]: error: maximum authentication attempts exceeded for root from 139.47.14.250 port 52600 ssh2 [preauth]
2024-09-18T11:22:42.042062+02:00 eos.nbg.backend.mtnmedia.group sshd[1155570]: Invalid user admin from 139.47.14.250 port 52624
2024-09-18T11:22:42.388108+02:00 eos.nbg.backend.mtnmedia.group sshd[1155570]: error: maximum authentication attempts exceeded for invalid user admin from 139.47.14.250 port 52624 ssh2 [preauth]
... show less
2024-09-18T09:58:09.784050+02:00 local sshd[51698]: error: maximum authentication attempts exceeded ... show more2024-09-18T09:58:09.784050+02:00 local sshd[51698]: error: maximum authentication attempts exceeded for root from 139.47.14.250 port 39560 ssh2 [preauth]
2024-09-18T09:58:10.607329+02:00 local sshd[51700]: error: maximum authentication attempts exceeded for root from 139.47.14.250 port 39574 ssh2 [preauth]
2024-09-18T09:58:11.718686+02:00 local sshd[51702]: error: maximum authentication attempts exceeded for root from 139.47.14.250 port 39586 ssh2 [preauth]
2024-09-18T09:58:13.109246+02:00 local sshd[51707]: Invalid user admin from 139.47.14.250 port 39606
2024-09-18T09:58:13.398686+02:00 local sshd[51707]: error: maximum authentication attempts exceeded for invalid user admin from 139.47.14.250 port 39606 ssh2 [preauth]
... show less
[rede-44-49] (sshd) Failed SSH login from 139.47.14.250 (static.masmovil.com): 5 in the last 3600 se ... show more[rede-44-49] (sshd) Failed SSH login from 139.47.14.250 (static.masmovil.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 18 04:14:16 sshd[21209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.47.14.250 user=[USERNAME]
Sep 18 04:14:18 sshd[21209]: Failed password for [USERNAME] from 139.47.14.250 port 55700 ssh2
Sep 18 04:14:21 sshd[21209]: Failed password for [USERNAME] from 139.47.14.250 port 55700 ssh2
Sep 18 04:14:23 sshd[21209]: Failed password for [USERNAME] from 139.47.14.250 port 55700 ssh2
Sep 18 04:14:25 sshd[21209]: Failed password for [USERNAME] from 13 show less
Sep 18 08:03:54 adycoaduanas sshd[2489028]: pam_unix(sshd:auth): authentication failure; logname= ui ... show moreSep 18 08:03:54 adycoaduanas sshd[2489028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.47.14.250 user=root
Sep 18 08:03:56 adycoaduanas sshd[2489028]: Failed password for invalid user root from 139.47.14.250 port 39862 ssh2
Sep 18 08:03:59 adycoaduanas sshd[2489028]: Failed password for invalid user root from 139.47.14.250 port 39862 ssh2
Sep 18 08:04:03 adycoaduanas sshd[2489028]: Failed password for invalid user root from 139.47.14.250 port 39862 ssh2
Sep 18 08:04:06 adycoaduanas sshd[2489028]: Failed password for invalid user root from 139.47.14.250 port 39862 ssh2
... show less
Sep 18 07:22:01 bla016-truserv-jhb1-001 sshd[3076795]: Failed password for root from 139.47.14.250 p ... show moreSep 18 07:22:01 bla016-truserv-jhb1-001 sshd[3076795]: Failed password for root from 139.47.14.250 port 44108 ssh2
Sep 18 07:22:05 bla016-truserv-jhb1-001 sshd[3076795]: Failed password for root from 139.47.14.250 port 44108 ssh2
Sep 18 07:22:09 bla016-truserv-jhb1-001 sshd[3076795]: Failed password for root from 139.47.14.250 port 44108 ssh2
Sep 18 07:22:12 bla016-truserv-jhb1-001 sshd[3076795]: Failed password for root from 139.47.14.250 port 44108 ssh2
... show less
Sep 18 05:42:10 webcore sshd[3126724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreSep 18 05:42:10 webcore sshd[3126724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.47.14.250 user=root
Sep 18 05:42:13 webcore sshd[3126724]: Failed password for root from 139.47.14.250 port 60522 ssh2
Sep 18 05:42:17 webcore sshd[3126724]: Failed password for root from 139.47.14.250 port 60522 ssh2
Sep 18 05:42:20 webcore sshd[3126724]: Failed password for root from 139.47.14.250 port 60522 ssh2
... show less
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 139.47.14.250 (ES/Spain/-): 5 in the last 3600 secs; Ports: *; Directio ... show more(sshd) Failed SSH login from 139.47.14.250 (ES/Spain/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 17 23:08:50 server2 sshd[15120]: Failed password for root from 139.47.14.250 port 33520 ssh2
Sep 17 23:08:50 server2 sshd[15120]: Failed password for root from 139.47.14.250 port 33520 ssh2
Sep 17 23:08:50 server2 sshd[15120]: Failed password for root from 139.47.14.250 port 33520 ssh2
Sep 17 23:08:51 server2 sshd[15120]: Failed password for root from 139.47.14.250 port 33520 ssh2
Sep 17 23:08:51 server2 sshd[15120]: Failed password for root from 139.47.14.250 port 33520 ssh2 show less