This IP address has been reported a total of 588
times from 320 distinct
sources.
20.193.139.214 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
Failed password for invalid user algonzalez from 20.193.139.214 port 54260 ssh2
Invalid user r ... show moreFailed password for invalid user algonzalez from 20.193.139.214 port 54260 ssh2
Invalid user rstudio-server from 20.193.139.214 port 42644
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
Failed password for invalid user rstudio-server from 20.193.139.214 port 42644 ssh2
Invalid user remote2 from 20.193.139.214 port 39542 show less
Nov 8 11:12:52 plesk sshd[6101]: Failed password for invalid user algonzalez from 20.193.139.214 po ... show moreNov 8 11:12:52 plesk sshd[6101]: Failed password for invalid user algonzalez from 20.193.139.214 port 54848 ssh2
Nov 8 11:15:51 plesk sshd[7205]: Invalid user rstudio-server from 20.193.139.214 port 48986
Nov 8 11:15:51 plesk sshd[7205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
Nov 8 11:15:53 plesk sshd[7205]: Failed password for invalid user rstudio-server from 20.193.139.214 port 48986 ssh2
Nov 8 11:18:09 plesk sshd[8009]: Invalid user remote2 from 20.193.139.214 port 49056 show less
2024-11-08T10:12:37.461051+00:00 mapir-proxmox sshd[3690542]: pam_unix(sshd:auth): authentication fa ... show more2024-11-08T10:12:37.461051+00:00 mapir-proxmox sshd[3690542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
2024-11-08T10:12:39.749026+00:00 mapir-proxmox sshd[3690542]: Failed password for invalid user algonzalez from 20.193.139.214 port 40824 ssh2
2024-11-08T10:15:43.755341+00:00 mapir-proxmox sshd[3716559]: Invalid user rstudio-server from 20.193.139.214 port 54364
... show less
11/08/2024-11:11:06.402288 20.193.139.214 Protocol: 6 ET POLICY SSH session in progress on Expected ... show more11/08/2024-11:11:06.402288 20.193.139.214 Protocol: 6 ET POLICY SSH session in progress on Expected Port show less
2024-11-08T11:34:49.152822+02:00 fusco sshd[2177749]: Failed password for root from 20.193.139.214 p ... show more2024-11-08T11:34:49.152822+02:00 fusco sshd[2177749]: Failed password for root from 20.193.139.214 port 51420 ssh2
2024-11-08T11:37:24.044143+02:00 fusco sshd[2181366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214 user=root
2024-11-08T11:37:25.920822+02:00 fusco sshd[2181366]: Failed password for root from 20.193.139.214 port 40478 ssh2
... show less
Nov 8 10:31:38 login sshd[25747]: Failed password for root from 20.193.139.214 port 50656 ssh2<br / ... show moreNov 8 10:31:38 login sshd[25747]: Failed password for root from 20.193.139.214 port 50656 ssh2
Nov 8 10:35:28 login sshd[25892]: Failed password for root from 20.193.139.214 port 51032 ssh2
... show less
2024-11-08T16:16:38.545087 jp3.cdn.420422709.xyz sshd[145400]: pam_unix(sshd:auth): authentication f ... show more2024-11-08T16:16:38.545087 jp3.cdn.420422709.xyz sshd[145400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
2024-11-08T16:16:40.482971 jp3.cdn.420422709.xyz sshd[145400]: Failed password for invalid user mohsenabbas from 20.193.139.214 port 34940 ssh2
2024-11-08T16:19:17.092287 jp3.cdn.420422709.xyz sshd[145455]: Invalid user software15 from 20.193.139.214 port 39660
... show less
Nov 8 08:16:35 ice2 sshd[2239831]: Invalid user mohsenabbas from 20.193.139.214 port 49736
No ... show moreNov 8 08:16:35 ice2 sshd[2239831]: Invalid user mohsenabbas from 20.193.139.214 port 49736
Nov 8 08:19:15 ice2 sshd[2239938]: Invalid user software15 from 20.193.139.214 port 35010
... show less
2024-11-08T08:14:09.937444+00:00 bluefire sshd[2697006]: pam_unix(sshd:auth): authentication failure ... show more2024-11-08T08:14:09.937444+00:00 bluefire sshd[2697006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214
2024-11-08T08:14:12.085870+00:00 bluefire sshd[2697006]: Failed password for invalid user mohsenabbas from 20.193.139.214 port 57590 ssh2
2024-11-08T08:17:43.232776+00:00 bluefire sshd[2698020]: Invalid user software15 from 20.193.139.214 port 48872
... show less
Brute-ForceSSH
Anonymous
Nov 8 08:14:05 f2b auth.info sshd[751750]: Invalid user mohsenabbas from 20.193.139.214 port 51484< ... show moreNov 8 08:14:05 f2b auth.info sshd[751750]: Invalid user mohsenabbas from 20.193.139.214 port 51484
Nov 8 08:14:05 f2b auth.info sshd[751750]: Failed password for invalid user mohsenabbas from 20.193.139.214 port 51484 ssh2
Nov 8 08:14:05 f2b auth.info sshd[751750]: Disconnected from invalid user mohsenabbas 20.193.139.214 port 51484 [preauth]
... show less
Brute-ForceSSH
Anonymous
Nov 8 08:57:46 rendez-vous sshd[426926]: Failed password for root from 20.193.139.214 port 58074 ss ... show moreNov 8 08:57:46 rendez-vous sshd[426926]: Failed password for root from 20.193.139.214 port 58074 ssh2
Nov 8 09:00:10 rendez-vous sshd[426979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214 user=root
Nov 8 09:00:12 rendez-vous sshd[426979]: Failed password for root from 20.193.139.214 port 42942 ssh2 show less
2024-11-08T09:36:46.780649+02:00 vserver-20917 sshd-session[3266105]: Failed password for root from ... show more2024-11-08T09:36:46.780649+02:00 vserver-20917 sshd-session[3266105]: Failed password for root from 20.193.139.214 port 54110 ssh2
2024-11-08T09:39:03.523552+02:00 vserver-20917 sshd-session[3266416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214 user=root
2024-11-08T09:39:05.888443+02:00 vserver-20917 sshd-session[3266416]: Failed password for root from 20.193.139.214 port 54794 ssh2
2024-11-08T09:41:32.683339+02:00 vserver-20917 sshd-session[3266786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214 user=root
2024-11-08T09:41:34.837310+02:00 vserver-20917 sshd-session[3266786]: Failed password for root from 20.193.139.214 port 34686 ssh2
... show less
Brute-ForceSSH
Anonymous
Nov 8 08:41:06 rendez-vous sshd[426276]: Failed password for root from 20.193.139.214 port 45892 ss ... show moreNov 8 08:41:06 rendez-vous sshd[426276]: Failed password for root from 20.193.139.214 port 45892 ssh2
Nov 8 08:43:25 rendez-vous sshd[426351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.139.214 user=root
Nov 8 08:43:27 rendez-vous sshd[426351]: Failed password for root from 20.193.139.214 port 49138 ssh2 show less