This IP address has been reported a total of 46 times from 26 distinct sources.
198.55.102.158 was first reported on , and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
2020-11-24T07:06:27.083461devel sshd[11601]: Invalid user tom1 from 198.55.102.158 port 42350
... show more2020-11-24T07:06:27.083461devel sshd[11601]: Invalid user tom1 from 198.55.102.158 port 42350
2020-11-24T07:06:28.350936devel sshd[11601]: Failed password for invalid user tom1 from 198.55.102.158 port 42350 ssh2
2020-11-24T07:16:48.905038devel sshd[12333]: Invalid user testman from 198.55.102.158 port 54716 show less
Nov 24 09:55:19 *** sshd[31356]: Invalid user tom1 from 198.55.102.158
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 198.55.102.158 (US/United States/198.55.102.158.static.quadranet.com): ... show more(sshd) Failed SSH login from 198.55.102.158 (US/United States/198.55.102.158.static.quadranet.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 24 01:44:35 optimus sshd[19809]: Invalid user google from 198.55.102.158
Nov 24 01:44:35 optimus sshd[19809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158
Nov 24 01:44:37 optimus sshd[19809]: Failed password for invalid user google from 198.55.102.158 port 58068 ssh2
Nov 24 01:50:41 optimus sshd[22877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158 user=mail
Nov 24 01:50:44 optimus sshd[22877]: Failed password for mail from 198.55.102.158 port 57036 ssh2 show less
Brute-Force
Anonymous
(sshd) Failed SSH login from 198.55.102.158 (US/United States/198.55.102.158.static.quadranet.com): ... show more(sshd) Failed SSH login from 198.55.102.158 (US/United States/198.55.102.158.static.quadranet.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 24 00:34:06 optimus sshd[17339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158 user=root
Nov 24 00:34:08 optimus sshd[17339]: Failed password for root from 198.55.102.158 port 41438 ssh2
Nov 24 00:47:13 optimus sshd[23495]: Invalid user test from 198.55.102.158
Nov 24 00:47:13 optimus sshd[23495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158
Nov 24 00:47:15 optimus sshd[23495]: Failed password for invalid user test from 198.55.102.158 port 39046 ssh2 show less
Brute-Force
Anonymous
(sshd) Failed SSH login from 198.55.102.158 (US/United States/198.55.102.158.static.quadranet.com): ... show more(sshd) Failed SSH login from 198.55.102.158 (US/United States/198.55.102.158.static.quadranet.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 23 23:02:21 optimus sshd[6174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158 user=root
Nov 23 23:02:24 optimus sshd[6174]: Failed password for root from 198.55.102.158 port 44210 ssh2
Nov 23 23:15:08 optimus sshd[12132]: Invalid user marylee from 198.55.102.158
Nov 23 23:15:08 optimus sshd[12132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158
Nov 23 23:15:10 optimus sshd[12132]: Failed password for invalid user marylee from 198.55.102.158 port 55680 ssh2 show less
Nov 24 04:09:11 *hidden* sshd[40209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreNov 24 04:09:11 *hidden* sshd[40209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158 user=root Nov 24 04:09:13 *hidden* sshd[40209]: Failed password for *hidden* from 198.55.102.158 port 40506 ssh2 Nov 24 04:11:07 *hidden* sshd[40703]: Invalid user haldaemon from 198.55.102.158 port 57876 show less
Nov 24 03:03:16 *hidden* sshd[26131]: Failed password for *hidden* from 198.55.102.158 port 42322 ss ... show moreNov 24 03:03:16 *hidden* sshd[26131]: Failed password for *hidden* from 198.55.102.158 port 42322 ssh2 Nov 24 03:05:10 *hidden* sshd[26834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158 user=root Nov 24 03:05:13 *hidden* sshd[26834]: Failed password for *hidden* from 198.55.102.158 port 59696 ssh2 show less
Brute-ForceSSH
Anonymous
198.55.102.158 (US/United States/-), 6 distributed sshd attacks on account [root] in the last 3600 s ... show more198.55.102.158 (US/United States/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Nov 23 19:59:40 jbs1 sshd[18374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158 user=root
Nov 23 19:57:09 jbs1 sshd[17580]: Failed password for root from 49.234.41.108 port 44488 ssh2
Nov 23 19:56:25 jbs1 sshd[17386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.103.60 user=root
Nov 23 19:56:27 jbs1 sshd[17386]: Failed password for root from 132.232.103.60 port 54236 ssh2
Nov 23 19:57:07 jbs1 sshd[17580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.41.108 user=root
Nov 23 19:55:26 jbs1 sshd[16872]: Failed password for root from 78.131.100.190 port 33104 ssh2
Nov 24 01:55:14 *hidden* sshd[12280]: Failed password for invalid user smmsp from 198.55.102.158 por ... show moreNov 24 01:55:14 *hidden* sshd[12280]: Failed password for invalid user smmsp from 198.55.102.158 port 36780 ssh2 Nov 24 01:59:32 *hidden* sshd[12801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158 user=root Nov 24 01:59:34 *hidden* sshd[12801]: Failed password for *hidden* from 198.55.102.158 port 49424 ssh2 show less
Brute-ForceSSH
Anonymous
Nov 23 20:07:00 DAAP sshd[16451]: Invalid user ts3 from 198.55.102.158 port 42868
Nov 23 20:07 ... show moreNov 23 20:07:00 DAAP sshd[16451]: Invalid user ts3 from 198.55.102.158 port 42868
Nov 23 20:07:00 DAAP sshd[16451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158
Nov 23 20:07:00 DAAP sshd[16451]: Invalid user ts3 from 198.55.102.158 port 42868
Nov 23 20:07:02 DAAP sshd[16451]: Failed password for invalid user ts3 from 198.55.102.158 port 42868 ssh2
Nov 23 20:13:02 DAAP sshd[16609]: Invalid user testftp from 198.55.102.158 port 60146
... show less
fail2ban/Nov 23 17:57:33 h1962932 sshd[18238]: pam_unix(sshd:auth): authentication failure; logname= ... show morefail2ban/Nov 23 17:57:33 h1962932 sshd[18238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158 user=root
Nov 23 17:57:35 h1962932 sshd[18238]: Failed password for root from 198.55.102.158 port 55712 ssh2
Nov 23 18:04:20 h1962932 sshd[19028]: Invalid user sshd1 from 198.55.102.158 port 54974
Nov 23 18:04:20 h1962932 sshd[19028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.102.158
Nov 23 18:04:20 h1962932 sshd[19028]: Invalid user sshd1 from 198.55.102.158 port 54974
Nov 23 18:04:22 h1962932 sshd[19028]: Failed password for invalid user sshd1 from 198.55.102.158 port 54974 ssh2 show less