This IP address has been reported a total of 1,413
times from 507 distinct
sources.
14.103.70.21 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 27 00:42:35 mail sshd[1103757]: Invalid user user from 14.103.70.21 port 56664
Nov 27 00:4 ... show moreNov 27 00:42:35 mail sshd[1103757]: Invalid user user from 14.103.70.21 port 56664
Nov 27 00:42:37 mail sshd[1103759]: Invalid user user from 14.103.70.21 port 56674
Nov 27 00:42:38 mail sshd[1103761]: Invalid user user from 14.103.70.21 port 56676
Nov 27 00:42:39 mail sshd[1103763]: Invalid user user from 14.103.70.21 port 56692
Nov 27 00:42:41 mail sshd[1103765]: Invalid user user from 14.103.70.21 port 56696
... show less
2024-11-26T10:01:33.291900-08:00 SJC-NB sshd[2810658]: Failed password for root from 14.103.70.21 po ... show more2024-11-26T10:01:33.291900-08:00 SJC-NB sshd[2810658]: Failed password for root from 14.103.70.21 port 53886 ssh2
2024-11-26T10:01:36.454224-08:00 SJC-NB sshd[2810837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.103.70.21 user=root
2024-11-26T10:01:38.609198-08:00 SJC-NB sshd[2810837]: Failed password for root from 14.103.70.21 port 48714 ssh2
... show less
2024-11-26T16:41:26.833264+01:00 quita sshd[20114]: Failed password for root from 14.103.70.21 port ... show more2024-11-26T16:41:26.833264+01:00 quita sshd[20114]: Failed password for root from 14.103.70.21 port 43658 ssh2
2024-11-26T16:41:29.663012+01:00 quita sshd[20116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.103.70.21 user=root
2024-11-26T16:41:31.683068+01:00 quita sshd[20116]: Failed password for root from 14.103.70.21 port 48950 ssh2
2024-11-26T16:41:34.921885+01:00 quita sshd[20118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.103.70.21 user=root
2024-11-26T16:41:36.962053+01:00 quita sshd[20118]: Failed password for root from 14.103.70.21 port 48964 ssh2
... show less
Brute-ForceSSH
Anonymous
Nov 26 11:04:32 f2b auth.info sshd[23944]: Failed password for root from 14.103.70.21 port 59624 ssh ... show moreNov 26 11:04:32 f2b auth.info sshd[23944]: Failed password for root from 14.103.70.21 port 59624 ssh2
Nov 26 11:04:34 f2b auth.info sshd[23946]: Failed password for root from 14.103.70.21 port 59630 ssh2
Nov 26 11:04:36 f2b auth.info sshd[23948]: Failed password for root from 14.103.70.21 port 37286 ssh2
... show less
2024-11-26T10:05:37.086753+01:00 monitoring.crazycraftland.net sshd[1543091]: User root from 14.103. ... show more2024-11-26T10:05:37.086753+01:00 monitoring.crazycraftland.net sshd[1543091]: User root from 14.103.70.21 not allowed because not listed in AllowUsers
2024-11-26T10:05:38.302181+01:00 monitoring.crazycraftland.net sshd[1543093]: User root from 14.103.70.21 not allowed because not listed in AllowUsers
2024-11-26T10:05:39.562085+01:00 monitoring.crazycraftland.net sshd[1543095]: User root from 14.103.70.21 not allowed because not listed in AllowUsers
... show less