This IP address has been reported a total of 556
times from 273 distinct
sources.
149.100.159.14 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jun 23 01:46:09 backup sshd[2422680]: Failed password for root from 149.100.159.14 port 42172 ssh2<b ... show moreJun 23 01:46:09 backup sshd[2422680]: Failed password for root from 149.100.159.14 port 42172 ssh2
Jun 23 01:46:09 backup sshd[2422700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.100.159.14 user=root
Jun 23 01:46:11 backup sshd[2422700]: Failed password for root from 149.100.159.14 port 54850 ssh2
Jun 23 01:46:12 backup sshd[2422702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.100.159.14 user=root
Jun 23 01:46:13 backup sshd[2422702]: Failed password for root from 149.100.159.14 port 39022 ssh2
... show less
Jun 23 00:54:30 docker01 sshd[2130007]: User root from 149.100.159.14 not allowed because none of us ... show moreJun 23 00:54:30 docker01 sshd[2130007]: User root from 149.100.159.14 not allowed because none of user's groups are listed in AllowGroups
Jun 23 00:54:30 docker01 sshd[2130007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.100.159.14 user=root
Jun 23 00:54:32 docker01 sshd[2130007]: Failed password for invalid user root from 149.100.159.14 port 40652 ssh2
... show less
Jun 23 01:31:16 unifi sshd[81520]: Failed password for root from 149.100.159.14 port 56228 ssh2<br / ... show moreJun 23 01:31:16 unifi sshd[81520]: Failed password for root from 149.100.159.14 port 56228 ssh2
Jun 23 01:31:17 unifi sshd[81522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.100.159.14 user=root
Jun 23 01:31:20 unifi sshd[81522]: Failed password for root from 149.100.159.14 port 42114 ssh2
Jun 23 01:31:20 unifi sshd[81524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.100.159.14 user=root
Jun 23 01:31:23 unifi sshd[81524]: Failed password for root from 149.100.159.14 port 57170 ssh2
... show less
Jun 22 16:27:39 v sshd\[6388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid= ... show moreJun 22 16:27:39 v sshd\[6388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.100.159.14 user=root
Jun 22 16:27:41 v sshd\[6388\]: Failed password for root from 149.100.159.14 port 56562 ssh2
Jun 22 16:27:46 v sshd\[6391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.100.159.14 user=root
... show less
2023-06-22T16:20:40.419748nc1 sshd[1379034]: Invalid user admin from 149.100.159.14 port 53424 ... show more2023-06-22T16:20:40.419748nc1 sshd[1379034]: Invalid user admin from 149.100.159.14 port 53424
... show less
Jun 17 14:25:07 multi-ip-test sshd[1327742]: Invalid user admin from 149.100.159.14 port 40304 ... show moreJun 17 14:25:07 multi-ip-test sshd[1327742]: Invalid user admin from 149.100.159.14 port 40304
Jun 17 14:25:10 multi-ip-test sshd[1327750]: Invalid user ubnt from 149.100.159.14 port 33998
... show less
ThreatBook Intelligence: Brute Force more details on http://threatbook.io/ip/149.100.159.14
20 ... show moreThreatBook Intelligence: Brute Force more details on http://threatbook.io/ip/149.100.159.14
2023-06-16 03:38:46 ["uname -a"]
2023-06-16 03:38:42 ["uname -a"]
2023-06-16 03:38:28 ["uname -a"]
2023-06-16 03:38:37 ["uname -a"]
2023-06-16 03:38:33 ["uname -a"] show less