This IP address has been reported a total of 17,542
times from 1,331 distinct
sources.
54.38.190.246 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-06-17T11:34:04.727589+00:00 localhost sshd[2528305]: pam_unix(sshd:auth): authentication failur ... show more2025-06-17T11:34:04.727589+00:00 localhost sshd[2528305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246 user=root
2025-06-17T11:34:07.139813+00:00 localhost sshd[2528305]: Failed password for root from 54.38.190.246 port 43158 ssh2
2025-06-17T11:37:47.587463+00:00 localhost sshd[2532872]: Invalid user xx from 54.38.190.246 port 51556
2025-06-17T11:37:47.590870+00:00 localhost sshd[2532872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246
2025-06-17T11:37:49.951848+00:00 localhost sshd[2532872]: Failed password for invalid user xx from 54.38.190.246 port 51556 ssh2
... show less
2025-06-17T11:04:06.183280+00:00 localhost sshd[2491218]: Failed password for invalid user openvpn f ... show more2025-06-17T11:04:06.183280+00:00 localhost sshd[2491218]: Failed password for invalid user openvpn from 54.38.190.246 port 51402 ssh2
2025-06-17T11:07:52.290644+00:00 localhost sshd[2495887]: Invalid user erpnext from 54.38.190.246 port 42916
2025-06-17T11:07:52.294081+00:00 localhost sshd[2495887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246
2025-06-17T11:07:54.566011+00:00 localhost sshd[2495887]: Failed password for invalid user erpnext from 54.38.190.246 port 42916 ssh2
2025-06-17T11:11:33.429890+00:00 localhost sshd[2500457]: Invalid user tidb from 54.38.190.246 port 54032
... show less
Jun 17 12:29:56 cow sshd[662232]: Failed password for invalid user deamon from 54.38.190.246 port 56 ... show moreJun 17 12:29:56 cow sshd[662232]: Failed password for invalid user deamon from 54.38.190.246 port 56100 ssh2
Jun 17 12:33:29 cow sshd[664924]: Invalid user ftpuser from 54.38.190.246 port 37268
Jun 17 12:33:29 cow sshd[664924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246
Jun 17 12:33:31 cow sshd[664924]: Failed password for invalid user ftpuser from 54.38.190.246 port 37268 ssh2
Jun 17 12:37:11 cow sshd[667674]: Invalid user test from 54.38.190.246 port 46290
... show less
Brute-ForceSSH
Anonymous
Jun 17 12:19:03 wireguard sshd[2701672]: Invalid user centos from 54.38.190.246 port 59550
Jun ... show moreJun 17 12:19:03 wireguard sshd[2701672]: Invalid user centos from 54.38.190.246 port 59550
Jun 17 12:22:47 wireguard sshd[2701686]: Invalid user ubuntu from 54.38.190.246 port 56890
Jun 17 12:26:26 wireguard sshd[2701701]: Invalid user tomcat from 54.38.190.246 port 51330
... show less
Jun 17 12:04:03 cow sshd[643330]: Invalid user testman from 54.38.190.246 port 60316
Jun 17 12 ... show moreJun 17 12:04:03 cow sshd[643330]: Invalid user testman from 54.38.190.246 port 60316
Jun 17 12:04:03 cow sshd[643330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246
Jun 17 12:04:05 cow sshd[643330]: Failed password for invalid user testman from 54.38.190.246 port 60316 ssh2
Jun 17 12:07:44 cow sshd[645999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246 user=root
Jun 17 12:07:46 cow sshd[645999]: Failed password for root from 54.38.190.246 port 45806 ssh2
... show less
Brute-ForceSSH
Anonymous
Jun 17 11:53:15 wireguard sshd[2701533]: Invalid user techuser from 54.38.190.246 port 38648
J ... show moreJun 17 11:53:15 wireguard sshd[2701533]: Invalid user techuser from 54.38.190.246 port 38648
Jun 17 11:56:53 wireguard sshd[2701546]: Invalid user ubuntu from 54.38.190.246 port 45214
Jun 17 12:00:33 wireguard sshd[2701564]: Invalid user test from 54.38.190.246 port 49830
... show less
Jun 17 11:34:38 cow sshd[621551]: Invalid user songzhu from 54.38.190.246 port 33224
Jun 17 11 ... show moreJun 17 11:34:38 cow sshd[621551]: Invalid user songzhu from 54.38.190.246 port 33224
Jun 17 11:34:38 cow sshd[621551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246
Jun 17 11:34:39 cow sshd[621551]: Failed password for invalid user songzhu from 54.38.190.246 port 33224 ssh2
Jun 17 11:38:14 cow sshd[624327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246 user=root
Jun 17 11:38:16 cow sshd[624327]: Failed password for root from 54.38.190.246 port 49344 ssh2
... show less
Brute-ForceSSH
Anonymous
Jun 17 11:27:32 wireguard sshd[2701447]: Invalid user ftptest from 54.38.190.246 port 38990
Ju ... show moreJun 17 11:27:32 wireguard sshd[2701447]: Invalid user ftptest from 54.38.190.246 port 38990
Jun 17 11:31:11 wireguard sshd[2701454]: Invalid user ubuntu from 54.38.190.246 port 43388
Jun 17 11:34:49 wireguard sshd[2701467]: Invalid user songzhu from 54.38.190.246 port 53414
... show less
Brute-ForceSSH
Anonymous
Jun 17 11:01:44 wireguard sshd[2701375]: Invalid user minecraft from 54.38.190.246 port 36024
... show moreJun 17 11:01:44 wireguard sshd[2701375]: Invalid user minecraft from 54.38.190.246 port 36024
Jun 17 11:09:15 wireguard sshd[2701393]: Invalid user lucid from 54.38.190.246 port 42566
Jun 17 11:12:54 wireguard sshd[2701398]: Invalid user steam from 54.38.190.246 port 46228
... show less
Jun 17 11:05:18 cow sshd[599850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreJun 17 11:05:18 cow sshd[599850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246 user=root
Jun 17 11:05:19 cow sshd[599850]: Failed password for root from 54.38.190.246 port 49316 ssh2
Jun 17 11:09:04 cow sshd[602590]: Invalid user lucid from 54.38.190.246 port 45716
Jun 17 11:09:04 cow sshd[602590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246
Jun 17 11:09:06 cow sshd[602590]: Failed password for invalid user lucid from 54.38.190.246 port 45716 ssh2
... show less
[rede-164-29] (sshd) Failed SSH login from 54.38.190.246 (FR/France/vps-3d2e1516.vps.ovh.net): 5 in ... show more[rede-164-29] (sshd) Failed SSH login from 54.38.190.246 (FR/France/vps-3d2e1516.vps.ovh.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 17 05:03:02 sshd[2058]: Invalid user [USERNAME] from 54.38.190.246 port 52344
Jun 17 05:03:05 sshd[2058]: Failed password for invalid user [USERNAME] from 54.38.190.246 port 52344 ssh2
Jun 17 05:06:49 sshd[2176]: Failed password for [USERNAME] from 54.38.190.246 port 53030 ssh2
Jun 17 05:10:41 sshd[2314]: Invalid user [USERNAME] from 54.38.190.246 port 58586
Jun 17 05:10:43 sshd[2314]: Failed password for invalid user [USERNAME] from 54.38.190.246 port 58586 ssh2 show less
Jun 17 09:58:50 debian sshd[2192160]: Disconnected from authenticating user root 54.38.190.246 port ... show moreJun 17 09:58:50 debian sshd[2192160]: Disconnected from authenticating user root 54.38.190.246 port 45238 [preauth]
Jun 17 10:02:42 debian sshd[2192778]: Invalid user kashan from 54.38.190.246 port 46726
Jun 17 10:02:42 debian sshd[2192778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246
Jun 17 10:02:44 debian sshd[2192778]: Failed password for invalid user kashan from 54.38.190.246 port 46726 ssh2
Jun 17 10:02:46 debian sshd[2192778]: Disconnected from invalid user kashan 54.38.190.246 port 46726 [preauth]
... show less
[rede-164-29] (sshd) Failed SSH login from 54.38.190.246 (FR/France/vps-3d2e1516.vps.ovh.net): 5 in ... show more[rede-164-29] (sshd) Failed SSH login from 54.38.190.246 (FR/France/vps-3d2e1516.vps.ovh.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 17 03:54:09 sshd[32284]: Invalid user [USERNAME] from 54.38.190.246 port 49770
Jun 17 03:54:11 sshd[32284]: Failed password for invalid user [USERNAME] from 54.38.190.246 port 49770 ssh2
Jun 17 03:58:41 sshd[32399]: Failed password for [USERNAME] from 54.38.190.246 port 36870 ssh2
Jun 17 04:02:25 sshd[32625]: Invalid user [USERNAME] from 54.38.190.246 port 47024
Jun 17 04:02:27 sshd[32625]: Failed password for invalid user [USERNAME] from 54.38.190.246 port 47024 ssh2 show less
Jun 17 08:53:09 debian sshd[2187878]: Failed password for invalid user fedora from 54.38.190.246 por ... show moreJun 17 08:53:09 debian sshd[2187878]: Failed password for invalid user fedora from 54.38.190.246 port 42410 ssh2
Jun 17 08:53:09 debian sshd[2187878]: Disconnected from invalid user fedora 54.38.190.246 port 42410 [preauth]
Jun 17 08:58:19 debian sshd[2188075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.246 user=root
Jun 17 08:58:21 debian sshd[2188075]: Failed password for root from 54.38.190.246 port 55950 ssh2
Jun 17 08:58:22 debian sshd[2188075]: Disconnected from authenticating user root 54.38.190.246 port 55950 [preauth]
... show less