This IP address has been reported a total of 345
times from 204 distinct
sources.
164.138.14.208 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2025-02-20T10:01:57.826858+00:00 ubuntu-server-1 sshd[49657]: Invalid user nfsnobody from 164.138.14 ... show more2025-02-20T10:01:57.826858+00:00 ubuntu-server-1 sshd[49657]: Invalid user nfsnobody from 164.138.14.208 port 56704
2025-02-20T10:01:58.791460+00:00 ubuntu-server-1 sshd[49659]: Invalid user usr from 164.138.14.208 port 56706
2025-02-20T10:02:00.378077+00:00 ubuntu-server-1 sshd[49661]: Invalid user postgres from 164.138.14.208 port 56722
2025-02-20T10:02:01.627294+00:00 ubuntu-server-1 sshd[49663]: Invalid user kafka from 164.138.14.208 port 56736
2025-02-20T10:02:04.909521+00:00 ubuntu-server-1 sshd[49678]: Invalid user debian from 164.138.14.208 port 56756
... show less
Feb 20 10:27:21 frenskilegion sshd[2748049]: Invalid user usr from 164.138.14.208 port 45036
F ... show moreFeb 20 10:27:21 frenskilegion sshd[2748049]: Invalid user usr from 164.138.14.208 port 45036
Feb 20 10:27:23 frenskilegion sshd[2748049]: Failed password for invalid user usr from 164.138.14.208 port 45036 ssh2
Feb 20 10:27:24 frenskilegion sshd[2748061]: Invalid user postgres from 164.138.14.208 port 53058
Feb 20 10:27:24 frenskilegion sshd[2748061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.14.208
Feb 20 10:27:24 frenskilegion sshd[2748061]: Invalid user postgres from 164.138.14.208 port 53058
Feb 20 10:27:26 frenskilegion sshd[2748061]: Failed password for invalid user postgres from 164.138.14.208 port 53058 ssh2
Feb 20 10:27:28 frenskilegion sshd[2748069]: Invalid user kafka from 164.138.14.208 port 53068
... show less
[rede-arem1] (sshd) Failed SSH login from 164.138.14.208 (FI/Finland/-): 5 in the last 3600 secs; Po ... show more[rede-arem1] (sshd) Failed SSH login from 164.138.14.208 (FI/Finland/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Feb 20 04:48:14 sshd[3394]: Did not receive identification string from 164.138.14.208 port 60352
Feb 20 04:48:16 sshd[3395]: Invalid user [USERNAME] from 164.138.14.208 port 60358
Feb 20 04:48:18 sshd[3395]: Failed password for invalid user [USERNAME] from 164.138.14.208 port 60358 ssh2
Feb 20 04:48:20 sshd[3398]: Invalid user [USERNAME] from 164.138.14.208 port 43824
Feb 20 04:48:22 sshd[3398]: Failed password for invalid user [USERNAME] from 164.138.14.208 port 43824 ssh2 show less
Feb 20 15:33:07 mocha sshd[3838538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreFeb 20 15:33:07 mocha sshd[3838538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.14.208
Feb 20 15:33:09 mocha sshd[3838538]: Failed password for invalid user nfsnobody from 164.138.14.208 port 50388 ssh2
Feb 20 15:33:10 mocha sshd[3838603]: Invalid user usr from 164.138.14.208 port 50404
... show less
Feb 20 12:30:31 pihole sshd[242590]: Invalid user nfsnobody from 164.138.14.208 port 49662
Feb ... show moreFeb 20 12:30:31 pihole sshd[242590]: Invalid user nfsnobody from 164.138.14.208 port 49662
Feb 20 12:30:32 pihole sshd[242592]: Invalid user usr from 164.138.14.208 port 49674
Feb 20 12:30:33 pihole sshd[242594]: Invalid user postgres from 164.138.14.208 port 49676
Feb 20 12:30:35 pihole sshd[242596]: Invalid user kafka from 164.138.14.208 port 49690
Feb 20 12:30:37 pihole sshd[242600]: Invalid user debian from 164.138.14.208 port 34934
... show less
2025-02-20T08:50:50.651764+02:00 gogo-server sshd-session[2900969]: pam_unix(sshd:auth): authenticat ... show more2025-02-20T08:50:50.651764+02:00 gogo-server sshd-session[2900969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.14.208
2025-02-20T08:50:52.200277+02:00 gogo-server sshd-session[2900969]: Failed password for invalid user nfsnobody from 164.138.14.208 port 45814 ssh2
2025-02-20T08:50:53.183366+02:00 gogo-server sshd-session[2900973]: Invalid user usr from 164.138.14.208 port 45820
... show less
Feb 19 23:12:42 b146-25 sshd[1429376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreFeb 19 23:12:42 b146-25 sshd[1429376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.14.208
Feb 19 23:12:43 b146-25 sshd[1429376]: Failed password for invalid user nfsnobody from 164.138.14.208 port 60666 ssh2
Feb 19 23:12:46 b146-25 sshd[1429378]: Invalid user usr from 164.138.14.208 port 37156
... show less