This IP address has been reported a total of 129
times from 77 distinct
sources.
140.249.213.103 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jun 11 12:21:44 lamvda sshd[1877080]: Invalid user media from 140.249.213.103 port 45104
...
Brute-ForceSSH
Anonymous
2025-06-11T12:18:43.853890+02:00 leela sshd[3770314]: Invalid user media from 140.249.213.103 port 5 ... show more2025-06-11T12:18:43.853890+02:00 leela sshd[3770314]: Invalid user media from 140.249.213.103 port 53498
2025-06-11T12:18:43.858404+02:00 leela sshd[3770314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103
2025-06-11T12:18:45.992510+02:00 leela sshd[3770314]: Failed password for invalid user media from 140.249.213.103 port 53498 ssh2
... show less
Jun 11 09:19:56 debian sshd[1533793]: Failed password for invalid user faisal from 140.249.213.103 p ... show moreJun 11 09:19:56 debian sshd[1533793]: Failed password for invalid user faisal from 140.249.213.103 port 38796 ssh2
Jun 11 09:19:57 debian sshd[1533793]: Disconnected from invalid user faisal 140.249.213.103 port 38796 [preauth]
Jun 11 09:30:03 debian sshd[1534352]: Invalid user costel from 140.249.213.103 port 52846
Jun 11 09:30:03 debian sshd[1534352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103
Jun 11 09:30:05 debian sshd[1534352]: Failed password for invalid user costel from 140.249.213.103 port 52846 ssh2
... show less
Jun 11 08:08:52 debian sshd[1528866]: Failed password for invalid user sherry from 140.249.213.103 p ... show moreJun 11 08:08:52 debian sshd[1528866]: Failed password for invalid user sherry from 140.249.213.103 port 38058 ssh2
Jun 11 08:08:52 debian sshd[1528866]: Disconnected from invalid user sherry 140.249.213.103 port 38058 [preauth]
Jun 11 08:17:46 debian sshd[1529753]: Invalid user shiv from 140.249.213.103 port 39032
Jun 11 08:17:46 debian sshd[1529753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103
Jun 11 08:17:49 debian sshd[1529753]: Failed password for invalid user shiv from 140.249.213.103 port 39032 ssh2
... show less
Brute-ForceSSH
Anonymous
Jun 11 03:41:27 s158416 sshd[1883841]: Failed password for invalid user vncuser from 140.249.213.103 ... show moreJun 11 03:41:27 s158416 sshd[1883841]: Failed password for invalid user vncuser from 140.249.213.103 port 37048 ssh2
Jun 11 03:43:50 s158416 sshd[1884565]: Invalid user azureuser from 140.249.213.103 port 51624
Jun 11 03:43:50 s158416 sshd[1884565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103
Jun 11 03:43:50 s158416 sshd[1884565]: Invalid user azureuser from 140.249.213.103 port 51624
Jun 11 03:43:52 s158416 sshd[1884565]: Failed password for invalid user azureuser from 140.249.213.103 port 51624 ssh2
... show less
Brute-ForceSSH
Anonymous
Jun 11 03:22:04 s158416 sshd[1876871]: Invalid user yaya from 140.249.213.103 port 33442
Jun 1 ... show moreJun 11 03:22:04 s158416 sshd[1876871]: Invalid user yaya from 140.249.213.103 port 33442
Jun 11 03:22:04 s158416 sshd[1876871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103
Jun 11 03:22:04 s158416 sshd[1876871]: Invalid user yaya from 140.249.213.103 port 33442
Jun 11 03:22:06 s158416 sshd[1876871]: Failed password for invalid user yaya from 140.249.213.103 port 33442 ssh2
Jun 11 03:24:32 s158416 sshd[1877796]: Invalid user ubuntu from 140.249.213.103 port 48028
... show less
Brute-ForceSSH
Anonymous
Jun 11 03:03:01 s158416 sshd[1870036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreJun 11 03:03:01 s158416 sshd[1870036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103 user=root
Jun 11 03:03:03 s158416 sshd[1870036]: Failed password for root from 140.249.213.103 port 58128 ssh2
Jun 11 03:05:22 s158416 sshd[1871119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103 user=root
Jun 11 03:05:24 s158416 sshd[1871119]: Failed password for root from 140.249.213.103 port 44428 ssh2
Jun 11 03:07:44 s158416 sshd[1871841]: Invalid user rustserver from 140.249.213.103 port 58986
... show less
2025-06-11T04:42:49.859199+02:00 ns402 sshd[1166356]: Failed password for root from 140.249.213.103 ... show more2025-06-11T04:42:49.859199+02:00 ns402 sshd[1166356]: Failed password for root from 140.249.213.103 port 59794 ssh2
2025-06-11T04:42:51.696082+02:00 ns402 sshd[1166356]: Disconnected from authenticating user root 140.249.213.103 port 59794 [preauth]
2025-06-11T04:45:15.832498+02:00 ns402 sshd[1166727]: Invalid user yekta from 140.249.213.103 port 46142
2025-06-11T04:45:15.851336+02:00 ns402 sshd[1166727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103
2025-06-11T04:45:17.797948+02:00 ns402 sshd[1166727]: Failed password for invalid user yekta from 140.249.213.103 port 46142 ssh2
2025-06-11T04:45:18.829052+02:00 ns402 sshd[1166727]: Disconnected from invalid user yekta 140.249.213.103 port 46142 [preauth]
2025-06-11T04:47:42.095635+02:00 ns402 sshd[1167118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103 user=root
2025-06-11T04:47:44.223154+02:00 ns402 sshd[1167118]: Faile
... show less
Brute-ForceSSH
Anonymous
Jun 11 02:46:32 s158416 sshd[1864387]: Failed password for root from 140.249.213.103 port 40926 ssh2 ... show moreJun 11 02:46:32 s158416 sshd[1864387]: Failed password for root from 140.249.213.103 port 40926 ssh2
Jun 11 02:49:01 s158416 sshd[1865142]: Invalid user ts1 from 140.249.213.103 port 55454
Jun 11 02:49:01 s158416 sshd[1865142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.213.103
Jun 11 02:49:01 s158416 sshd[1865142]: Invalid user ts1 from 140.249.213.103 port 55454
Jun 11 02:49:03 s158416 sshd[1865142]: Failed password for invalid user ts1 from 140.249.213.103 port 55454 ssh2
... show less
Jun 11 11:08:15 main-frount sshd[4087518]: Invalid user alex from 140.249.213.103 port 54988
J ... show moreJun 11 11:08:15 main-frount sshd[4087518]: Invalid user alex from 140.249.213.103 port 54988
Jun 11 11:28:27 main-frount sshd[4089767]: Invalid user csserver from 140.249.213.103 port 56250
Jun 11 11:36:05 main-frount sshd[4090559]: Invalid user admins from 140.249.213.103 port 33896
Jun 11 11:38:57 main-frount sshd[4090833]: Invalid user staging from 140.249.213.103 port 51034
Jun 11 11:40:22 main-frount sshd[4091075]: Invalid user odoo13 from 140.249.213.103 port 59604
... show less
Brute-ForceSSH
Showing 46 to
60
of 129 reports
Is this your IP? You may request to takedown any associated reports.
We will attempt to verify your ownership. Request Takedown 🚩