This IP address has been reported a total of 217
times from 140 distinct
sources.
203.195.64.161 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-25T00:31:35.935948+00:00 edge-drt-atl01.int.pdx.net.uk sshd[1627515]: Invalid user user from ... show more2024-09-25T00:31:35.935948+00:00 edge-drt-atl01.int.pdx.net.uk sshd[1627515]: Invalid user user from 203.195.64.161 port 41148
2024-09-25T00:34:26.649989+00:00 edge-drt-atl01.int.pdx.net.uk sshd[1627660]: Invalid user user12 from 203.195.64.161 port 43644
2024-09-25T00:35:18.246302+00:00 edge-drt-atl01.int.pdx.net.uk sshd[1627703]: Invalid user yang from 203.195.64.161 port 51322
... show less
Sep 25 01:14:45 hosting sshd[58880]: Failed password for invalid user ubuntu from 203.195.64.161 por ... show moreSep 25 01:14:45 hosting sshd[58880]: Failed password for invalid user ubuntu from 203.195.64.161 port 33908 ssh2
Sep 25 01:25:45 hosting sshd[61181]: Invalid user ubuntu from 203.195.64.161 port 53568
Sep 25 01:25:45 hosting sshd[61181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.64.161
Sep 25 01:25:47 hosting sshd[61181]: Failed password for invalid user ubuntu from 203.195.64.161 port 53568 ssh2
Sep 25 01:34:03 hosting sshd[62878]: Invalid user user12 from 203.195.64.161 port 32852
... show less
Sep 23 07:30:11 thebatforge sshd[34954]: Invalid user test from 203.195.64.161 port 34526
Sep ... show moreSep 23 07:30:11 thebatforge sshd[34954]: Invalid user test from 203.195.64.161 port 34526
Sep 23 07:30:32 thebatforge sshd[34984]: Invalid user idempiere from 203.195.64.161 port 37366
Sep 23 07:30:51 thebatforge sshd[35103]: Invalid user tg from 203.195.64.161 port 40204
Sep 23 07:31:14 thebatforge sshd[35134]: Invalid user user from 203.195.64.161 port 43044
Sep 23 07:31:32 thebatforge sshd[35156]: Invalid user nexus from 203.195.64.161 port 45882
... show less
Brute-ForceSSH
Anonymous
Sep 23 03:44:30 jumarpab sshd[582868]: Invalid user minecraft from 203.195.64.161 port 60062
S ... show moreSep 23 03:44:30 jumarpab sshd[582868]: Invalid user minecraft from 203.195.64.161 port 60062
Sep 23 03:44:32 jumarpab sshd[582868]: Failed password for invalid user minecraft from 203.195.64.161 port 60062 ssh2
Sep 23 03:44:54 jumarpab sshd[582920]: Invalid user ubuntu from 203.195.64.161 port 35258
... show less
Sep 23 08:27:05 dagasistemas sshd[4812]: Invalid user superman from 203.195.64.161 port 38952
... show moreSep 23 08:27:05 dagasistemas sshd[4812]: Invalid user superman from 203.195.64.161 port 38952
Sep 23 08:27:05 dagasistemas sshd[4812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.64.161
Sep 23 08:27:06 dagasistemas sshd[4812]: Failed password for invalid user superman from 203.195.64.161 port 38952 ssh2
... show less
Sep 23 09:54:42 mail sshd[1146100]: Failed password for invalid user ubuntu from 203.195.64.161 port ... show moreSep 23 09:54:42 mail sshd[1146100]: Failed password for invalid user ubuntu from 203.195.64.161 port 37810 ssh2
Sep 23 10:00:25 mail sshd[1147558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.64.161 user=root
Sep 23 10:00:27 mail sshd[1147558]: Failed password for root from 203.195.64.161 port 47976 ssh2
... show less