This IP address has been reported a total of 1,035
times from 437 distinct
sources.
14.99.61.202 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
[2025 Mar 16 11:16:05] DoS / DDoS detected from 14.99.61.202 (mail.lloydcollege.in) SYN=30 x / 24 Ho ... show more[2025 Mar 16 11:16:05] DoS / DDoS detected from 14.99.61.202 (mail.lloydcollege.in) SYN=30 x / 24 Hours | ACTIVITY: First: 10:33:33 SYN - Last: 11:16:05, SPT=47108 -> DPT=222, ONLY ACK=330 x show less
DDoS Attack
Anonymous
Mar 16 11:33:35 ns5024002 sshd[4113662]: Failed password for root from 14.99.61.202 port 49454 ssh2< ... show moreMar 16 11:33:35 ns5024002 sshd[4113662]: Failed password for root from 14.99.61.202 port 49454 ssh2
Mar 16 11:34:56 ns5024002 sshd[4115347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
Mar 16 11:34:59 ns5024002 sshd[4115347]: Failed password for root from 14.99.61.202 port 47432 ssh2
Mar 16 11:36:19 ns5024002 sshd[4117132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
Mar 16 11:36:20 ns5024002 sshd[4117132]: Failed password for root from 14.99.61.202 port 45358 ssh2
... show less
Mar 16 11:17:18 antti-vps2 sshd[3174494]: User root from 14.99.61.202 not allowed because none of us ... show moreMar 16 11:17:18 antti-vps2 sshd[3174494]: User root from 14.99.61.202 not allowed because none of user's groups are listed in AllowGroups
Mar 16 11:18:39 antti-vps2 sshd[3174693]: Connection from 14.99.61.202 port 32970 on 10.0.0.124 port 22 rdomain ""
Mar 16 11:18:40 antti-vps2 sshd[3174693]: User root from 14.99.61.202 not allowed because none of user's groups are listed in AllowGroups
Mar 16 11:20:00 antti-vps2 sshd[3174870]: Connection from 14.99.61.202 port 59656 on 10.0.0.124 port 22 rdomain ""
Mar 16 11:20:01 antti-vps2 sshd[3174870]: User root from 14.99.61.202 not allowed because none of user's groups are listed in AllowGroups
... show less
Brute-ForceSSH
Anonymous
Mar 16 11:17:15 ns5024002 sshd[4092626]: Failed password for root from 14.99.61.202 port 54216 ssh2< ... show moreMar 16 11:17:15 ns5024002 sshd[4092626]: Failed password for root from 14.99.61.202 port 54216 ssh2
Mar 16 11:18:36 ns5024002 sshd[4094498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
Mar 16 11:18:37 ns5024002 sshd[4094498]: Failed password for root from 14.99.61.202 port 52738 ssh2
Mar 16 11:19:56 ns5024002 sshd[4096341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
Mar 16 11:19:59 ns5024002 sshd[4096341]: Failed password for root from 14.99.61.202 port 51222 ssh2
... show less
Mar 16 08:11:31 ica-cluster sshd[1051158]: Failed password for root from 14.99.61.202 port 53832 ssh ... show moreMar 16 08:11:31 ica-cluster sshd[1051158]: Failed password for root from 14.99.61.202 port 53832 ssh2
Mar 16 08:12:56 ica-cluster sshd[1051417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
Mar 16 08:12:58 ica-cluster sshd[1051417]: Failed password for root from 14.99.61.202 port 41792 ssh2
Mar 16 08:14:21 ica-cluster sshd[1051666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
Mar 16 08:14:23 ica-cluster sshd[1051666]: Failed password for root from 14.99.61.202 port 57838 ssh2
... show less
Mar 16 05:09:59 b146-30 sshd[3322185]: Failed password for root from 14.99.61.202 port 44830 ssh2<br ... show moreMar 16 05:09:59 b146-30 sshd[3322185]: Failed password for root from 14.99.61.202 port 44830 ssh2
Mar 16 05:11:24 b146-30 sshd[3322272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
Mar 16 05:11:26 b146-30 sshd[3322272]: Failed password for root from 14.99.61.202 port 58922 ssh2
... show less
2025-03-16T13:59:44.004522pantelemone.ru sshd[1461630]: Failed password for root from 14.99.61.202 p ... show more2025-03-16T13:59:44.004522pantelemone.ru sshd[1461630]: Failed password for root from 14.99.61.202 port 37140 ssh2
2025-03-16T14:01:03.593832pantelemone.ru sshd[1462427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
2025-03-16T14:01:05.369391pantelemone.ru sshd[1462427]: Failed password for root from 14.99.61.202 port 33392 ssh2
2025-03-16T14:02:24.024635pantelemone.ru sshd[1462705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
2025-03-16T14:02:26.587873pantelemone.ru sshd[1462705]: Failed password for root from 14.99.61.202 port 58188 ssh2
... show less
2025-03-16T13:43:45.745115pantelemone.ru sshd[1459457]: Failed password for root from 14.99.61.202 p ... show more2025-03-16T13:43:45.745115pantelemone.ru sshd[1459457]: Failed password for root from 14.99.61.202 port 41314 ssh2
2025-03-16T13:45:05.423430pantelemone.ru sshd[1459795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
2025-03-16T13:45:07.681039pantelemone.ru sshd[1459795]: Failed password for root from 14.99.61.202 port 38162 ssh2
2025-03-16T13:46:23.355523pantelemone.ru sshd[1459929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
2025-03-16T13:46:25.321925pantelemone.ru sshd[1459929]: Failed password for root from 14.99.61.202 port 34810 ssh2
... show less
Mar 16 10:29:16 prod sshd[3616655]: Failed password for root from 14.99.61.202 port 35630 ssh2 ... show moreMar 16 10:29:16 prod sshd[3616655]: Failed password for root from 14.99.61.202 port 35630 ssh2
Mar 16 10:30:39 prod sshd[3617191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.61.202 user=root
Mar 16 10:30:41 prod sshd[3617191]: Failed password for root from 14.99.61.202 port 36276 ssh2
... show less