This IP address has been reported a total of 19
times from 16 distinct
sources.
34.148.135.105 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2025-02-16T17:22:13.520150+01:00 fnc01-us-pop.as202427.net sshd[2176653]: User root from 34.148.135. ... show more2025-02-16T17:22:13.520150+01:00 fnc01-us-pop.as202427.net sshd[2176653]: User root from 34.148.135.105 not allowed because not listed in AllowUsers
2025-02-16T17:22:14.021709+01:00 fnc01-us-pop.as202427.net sshd[2176655]: User root from 34.148.135.105 not allowed because not listed in AllowUsers
2025-02-16T17:22:14.499669+01:00 fnc01-us-pop.as202427.net sshd[2176660]: User root from 34.148.135.105 not allowed because not listed in AllowUsers
... show less
Feb 16 05:09:06 b146-13 sshd[1444848]: Failed password for root from 34.148.135.105 port 1057 ssh2<b ... show moreFeb 16 05:09:06 b146-13 sshd[1444848]: Failed password for root from 34.148.135.105 port 1057 ssh2
Feb 16 05:09:10 b146-13 sshd[1444858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.135.105 user=root
Feb 16 05:09:12 b146-13 sshd[1444858]: Failed password for root from 34.148.135.105 port 1058 ssh2
... show less
SSH Brute force: 200 attempts were recorded from 34.148.135.105
2025-02-16T11:19:00+01:00 Inva ... show moreSSH Brute force: 200 attempts were recorded from 34.148.135.105
2025-02-16T11:19:00+01:00 Invalid user ubuntu from 34.148.135.105 port 1063
2025-02-16T11:19:04+01:00 Invalid user ubuntu from 34.148.135.105 port 1064
2025-02-16T11:19:09+01:00 Invalid user ubuntu from 34.148.135.105 port 1065
2025-02-16T11:19:14+01:00 Invalid user ubuntu from 34.148.135.105 port 1066
2025-02-16T11:19:25+01:00 Invalid user ubuntu from 34.148.135.105 port 1067
2025-02-16T11:19:30+01:00 Invalid user ubuntu from 34.148.135.105 port 1068
2025-02-16T11:19:35+01:00 Invalid user ubuntu from 34.148.135.105 port 1069
2025-02-16T11:19:40+01:00 Invalid user ubuntu from 34.148.135.105 port 1070
2025-02-16T11:19:45+01:00 Invalid user ubuntu from 34.148.135.105 port 1071
2025-02-16T11:19:49+01:00 Invalid user ubuntu from 34.148.135.105 port 1072
2025-02-16T11:19:55+01:00 Invalid user ubuntu from 34.148.135.105 port 1077 show less
Brute-ForceSSH
Anonymous
threat=SSH User Authentication Brute Force Attempt(40015), indicator_type=brute-force
2025-02-16T13:28:41.593097nfs01 sshd[1912071]: Failed password for root from 34.148.135.105 port 105 ... show more2025-02-16T13:28:41.593097nfs01 sshd[1912071]: Failed password for root from 34.148.135.105 port 1057 ssh2
2025-02-16T13:28:46.131897nfs01 sshd[1912073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.135.105 user=root
2025-02-16T13:28:48.516298nfs01 sshd[1912073]: Failed password for root from 34.148.135.105 port 1058 ssh2
... show less
SSH Brute force: 168 attempts were recorded from 34.148.135.105
2025-02-16T06:03:29+01:00 Conn ... show moreSSH Brute force: 168 attempts were recorded from 34.148.135.105
2025-02-16T06:03:29+01:00 Connection closed by authenticating user root 34.148.135.105 port 1056 [preauth]
2025-02-16T06:03:34+01:00 Connection closed by authenticating user root 34.148.135.105 port 1057 [preauth]
2025-02-16T06:03:37+01:00 Connection closed by authenticating user root 34.148.135.105 port 1058 [preauth]
2025-02-16T06:03:42+01:00 Connection closed by authenticating user root 34.148.135.105 port 1059 [preauth]
2025-02-16T06:03:48+01:00 Connection closed by authenticating user root 34.148.135.105 port 1060 [preauth]
2025-02-16T06:03:52+01:00 Connection closed by authenticating user root 34.148.135.105 port 1061 [preauth]
2025-02-16T06:04:00+01:00 Connection closed by authenticating user root 34.148.135.105 port 1062 [preauth]
2025-02-16T06:04:05+01:00 Connection closed by authenticating user root 34.148.135.105 show less