This IP address has been reported a total of 588
times from 320 distinct
sources.
20.193.139.214 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Bad SSHAUTH 2024.11.09 05:08:36
blocked until 2024.11.16 05:08:36
by HoneyPot DE_Berlin0 ... show moreBad SSHAUTH 2024.11.09 05:08:36
blocked until 2024.11.16 05:08:36
by HoneyPot DE_Berlin01 show less
2024-11-08T23:58:07.798070-04:00 endlessh-abuse sshd[167254]: pam_unix(sshd:auth): authentication fa ... show more2024-11-08T23:58:07.798070-04:00 endlessh-abuse sshd[167254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
2024-11-08T23:58:09.893580-04:00 endlessh-abuse sshd[167254]: Failed password for invalid user a from 20.193.139.214 port 37184 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-11-09T04:52:20+01:00 lb-2 sshd[2473468]: Failed password for invalid user aaron from 20.193.139 ... show more2024-11-09T04:52:20+01:00 lb-2 sshd[2473468]: Failed password for invalid user aaron from 20.193.139.214 port 34978 ssh2
2024-11-09T04:53:29+01:00 lb-2 sshd[2473683]: Invalid user acontat from 20.193.139.214 port 34096
2024-11-09T04:53:29+01:00 lb-2 sshd[2473683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
2024-11-09T04:53:31+01:00 lb-2 sshd[2473683]: Failed password for invalid user acontat from 20.193.139.214 port 34096 ssh2
... show less
2024-11-08T22:37:40.556893-05:00 ns05-a-ns-xyz sshd[2793504]: Failed password for invalid user altib ... show more2024-11-08T22:37:40.556893-05:00 ns05-a-ns-xyz sshd[2793504]: Failed password for invalid user altibase from 20.193.139.214 port 33670 ssh2
2024-11-08T22:39:30.908675-05:00 ns05-a-ns-xyz sshd[2793588]: Invalid user amssftp from 20.193.139.214 port 52108
2024-11-08T22:39:30.921021-05:00 ns05-a-ns-xyz sshd[2793588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
2024-11-08T22:39:32.340442-05:00 ns05-a-ns-xyz sshd[2793588]: Failed password for invalid user amssftp from 20.193.139.214 port 52108 ssh2
2024-11-08T22:45:41.672667-05:00 ns05-a-ns-xyz sshd[2794002]: Invalid user aurel from 20.193.139.214 port 36582
... show less
Nov 8 20:32:05 fortemn sshd[2438634]: Invalid user agustina from 20.193.139.214 port 59038
No ... show moreNov 8 20:32:05 fortemn sshd[2438634]: Invalid user agustina from 20.193.139.214 port 59038
Nov 8 20:34:45 fortemn sshd[2438874]: Invalid user castagna from 20.193.139.214 port 33162
Nov 8 20:37:07 fortemn sshd[2439751]: Invalid user cornish from 20.193.139.214 port 46680
Nov 8 20:39:31 fortemn sshd[2440464]: Invalid user willemsen from 20.193.139.214 port 46374
Nov 8 20:41:51 fortemn sshd[2441249]: Invalid user molinaro from 20.193.139.214 port 53368
... show less
Nov 9 04:30:22 charon sshd[2255380]: pam_sss(sshd:auth): authentication failure; logname= uid=0 eui ... show moreNov 9 04:30:22 charon sshd[2255380]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214 user=??
Nov 9 04:30:25 charon sshd[2255380]: Failed password for invalid user ?? from 20.193.139.214 port 44444 ssh2
Nov 9 04:33:22 charon sshd[2255507]: Invalid user adam from 20.193.139.214 port 56310
... show less
2024-11-09T03:07:52.554915+00:00 nzxldotspace sshd[494970]: Invalid user aeroone from 20.193.139.214 ... show more2024-11-09T03:07:52.554915+00:00 nzxldotspace sshd[494970]: Invalid user aeroone from 20.193.139.214 port 47594
... show less
2024-11-09T03:36:47.264695+01:00 srv2 sshd[258794]: Failed password for invalid user airlync from 20 ... show more2024-11-09T03:36:47.264695+01:00 srv2 sshd[258794]: Failed password for invalid user airlync from 20.193.139.214 port 42966 ssh2
2024-11-09T03:40:25.986417+01:00 srv2 sshd[260221]: Invalid user amx from 20.193.139.214 port 36336
2024-11-09T03:40:25.988893+01:00 srv2 sshd[260221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
2024-11-09T03:40:28.074034+01:00 srv2 sshd[260221]: Failed password for invalid user amx from 20.193.139.214 port 36336 ssh2
2024-11-09T03:54:13.221983+01:00 srv2 sshd[265256]: Invalid user bjzk1 from 20.193.139.214 port 58386
... show less
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "acitoolkit" at 2024-11-09T02:51:24 ... show moreCowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "acitoolkit" at 2024-11-09T02:51:24Z show less
Nov 8 18:43:39 servidor sshd[3718630]: Disconnected from authenticating user root 20.193.139.214 po ... show moreNov 8 18:43:39 servidor sshd[3718630]: Disconnected from authenticating user root 20.193.139.214 port 54412 [preauth]
Nov 8 18:47:17 servidor sshd[3718990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214 user=root
Nov 8 18:47:18 servidor sshd[3718990]: Failed password for root from 20.193.139.214 port 40390 ssh2
... show less