This IP address has been reported a total of 9,590
times from 1,217 distinct
sources.
14.29.214.161 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
14.29.214.161 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Port ... show more14.29.214.161 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Jan 13 19:00:57 server2 sshd[28022]: Failed password for root from 86.81.117.20 port 49618 ssh2
Jan 13 18:59:39 server2 sshd[27530]: Failed password for root from 104.208.108.166 port 15536 ssh2
Jan 13 18:59:42 server2 sshd[27533]: Failed password for root from 14.29.214.161 port 50558 ssh2
Jan 13 19:00:12 server2 sshd[27825]: Failed password for root from 104.208.108.166 port 44114 ssh2
Jan 13 18:59:04 server2 sshd[27327]: Failed password for root from 104.208.108.166 port 46316 ssh2
Jan 13 18:59:04 server2 sshd[27379]: Failed password for root from 54.38.190.246 port 59702 ssh2
IP Addresses Blocked:
86.81.117.20 (NL/Netherlands/-)
104.208.108.166 (HK/Hong Kong/-) show less
2025-01-13T21:03:35.903211+01:00 Linux12 sshd[2434964]: pam_unix(sshd:auth): authentication failure; ... show more2025-01-13T21:03:35.903211+01:00 Linux12 sshd[2434964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161
2025-01-13T21:03:38.155549+01:00 Linux12 sshd[2434964]: Failed password for invalid user hamed from 14.29.214.161 port 36566 ssh2
2025-01-13T21:04:21.522236+01:00 Linux12 sshd[2436850]: Invalid user csserver from 14.29.214.161 port 46146
2025-01-13T21:04:21.526352+01:00 Linux12 sshd[2436850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161
2025-01-13T21:04:23.764128+01:00 Linux12 sshd[2436850]: Failed password for invalid user csserver from 14.29.214.161 port 46146 ssh2
2025-01-13T21:07:00.718644+01:00 Linux12 sshd[2443456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161 user=root
2025-01-13T21:07:02.449142+01:00 Linux12 sshd[2443456]: Failed password for root from 14.29.214.161 port 46572 ssh2
2025-01-13T21:07:44.955783
... show less
Brute-ForceSSH
Anonymous
2025-01-13T19:15:24.831454front1.int sshd[199058]: Invalid user user02 from 14.29.214.161 port 37428 ... show more2025-01-13T19:15:24.831454front1.int sshd[199058]: Invalid user user02 from 14.29.214.161 port 37428
2025-01-13T19:15:24.842152front1.int sshd[199058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161
2025-01-13T19:15:26.879820front1.int sshd[199058]: Failed password for invalid user user02 from 14.29.214.161 port 37428 ssh2
2025-01-13T19:16:36.650046front1.int sshd[201453]: Invalid user informix from 14.29.214.161 port 52862
... show less
Brute-ForceSSH
Anonymous
Jan 13 18:20:29 scw-6657dc sshd[31987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreJan 13 18:20:29 scw-6657dc sshd[31987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161
Jan 13 18:20:29 scw-6657dc sshd[31987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161
Jan 13 18:20:31 scw-6657dc sshd[31987]: Failed password for invalid user pixel from 14.29.214.161 port 52512 ssh2
... show less
2025-01-13T18:08:50.629146+01:00 srv01 sshd[848251]: pam_unix(sshd:auth): authentication failure; lo ... show more2025-01-13T18:08:50.629146+01:00 srv01 sshd[848251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161
2025-01-13T18:08:52.807148+01:00 srv01 sshd[848251]: Failed password for invalid user jimmy from 14.29.214.161 port 43604 ssh2
2025-01-13T18:09:33.117620+01:00 srv01 sshd[848829]: Invalid user gabriel from 14.29.214.161 port 53150
2025-01-13T18:09:33.119773+01:00 srv01 sshd[848829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161
2025-01-13T18:09:35.202206+01:00 srv01 sshd[848829]: Failed password for invalid user gabriel from 14.29.214.161 port 53150 ssh2
... show less
Jan 13 15:10:56 instance-20221219-1303 sshd[630779]: Invalid user yhx from 14.29.214.161 port 33374< ... show moreJan 13 15:10:56 instance-20221219-1303 sshd[630779]: Invalid user yhx from 14.29.214.161 port 33374
... show less
Jan 13 15:52:41 web sshd[134643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreJan 13 15:52:41 web sshd[134643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.161
Jan 13 15:52:43 web sshd[134643]: Failed password for invalid user mmd from 14.29.214.161 port 36956 ssh2
Jan 13 15:57:38 web sshd[134722]: Invalid user laurent from 14.29.214.161 port 51836
... show less
Jan 13 14:51:33 instance-20221219-1303 sshd[630579]: Invalid user mmd from 14.29.214.161 port 44278< ... show moreJan 13 14:51:33 instance-20221219-1303 sshd[630579]: Invalid user mmd from 14.29.214.161 port 44278
... show less