This IP address has been reported a total of 25
times from 20 distinct
sources.
93.197.146.107 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-13T08:19:02.032175+02:00 linux-syslog sshd[1282555]: Disconnected from authenticating user r ... show more2024-11-13T08:19:02.032175+02:00 linux-syslog sshd[1282555]: Disconnected from authenticating user root 93.197.146.107 port 47122 [preauth]
2024-11-13T08:22:41.451069+02:00 linux-syslog sshd[1282583]: Disconnected from authenticating user root 93.197.146.107 port 49522 [preauth]
... show less
2024-11-13T04:57:45.905785+01:00 srv03 sshd[1415075]: Failed password for root from 93.197.146.107 p ... show more2024-11-13T04:57:45.905785+01:00 srv03 sshd[1415075]: Failed password for root from 93.197.146.107 port 57928 ssh2
2024-11-13T05:00:02.148023+01:00 srv03 sshd[1416511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.197.146.107 user=root
2024-11-13T05:00:04.224750+01:00 srv03 sshd[1416511]: Failed password for root from 93.197.146.107 port 39796 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-11-13T04:53:22.940801+01:00 mordor sshd[1927132]: Disconnected from authenticating user root 93 ... show more2024-11-13T04:53:22.940801+01:00 mordor sshd[1927132]: Disconnected from authenticating user root 93.197.146.107 port 34516 [preauth]
2024-11-13T04:56:30.835470+01:00 mordor sshd[1927155]: Disconnected from authenticating user root 93.197.146.107 port 42780 [preauth]
2024-11-13T04:58:50.280069+01:00 mordor sshd[1927167]: Disconnected from authenticating user root 93.197.146.107 port 40720 [preauth]
... show less
Brute-ForceSSH
Anonymous
2024-11-13T03:55:49.502907 EUR sshd[1317]: Failed password for root from 93.197.146.107 port 37374 s ... show more2024-11-13T03:55:49.502907 EUR sshd[1317]: Failed password for root from 93.197.146.107 port 37374 ssh2
2024-11-13T03:58:07.645102 EUR sshd[20649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=p5dc5926b.dip0.t-ipconnect.de user=root
2024-11-13T03:58:09.266837 EUR sshd[20649]: Failed password for root from 93.197.146.107 port 43834 ssh2
... show less
Nov 13 10:48:34 honeypot sshd[7885]: Failed password for root from 93.197.146.107 port 59864 ssh2<br ... show moreNov 13 10:48:34 honeypot sshd[7885]: Failed password for root from 93.197.146.107 port 59864 ssh2
... show less
Nov 13 10:26:58 honeypot sshd[7171]: Failed password for root from 93.197.146.107 port 56610 ssh2<br ... show moreNov 13 10:26:58 honeypot sshd[7171]: Failed password for root from 93.197.146.107 port 56610 ssh2
... show less
Nov 13 10:05:17 honeypot sshd[6469]: Failed password for root from 93.197.146.107 port 45932 ssh2<br ... show moreNov 13 10:05:17 honeypot sshd[6469]: Failed password for root from 93.197.146.107 port 45932 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-11-13T03:49:37.654524+01:00 hosting15 sshd[3935075]: Failed password for root from 93.197.146.1 ... show more2024-11-13T03:49:37.654524+01:00 hosting15 sshd[3935075]: Failed password for root from 93.197.146.107 port 57640 ssh2
2024-11-13T03:51:56.485448+01:00 hosting15 sshd[3935843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.197.146.107 user=root
2024-11-13T03:51:58.960197+01:00 hosting15 sshd[3935843]: Failed password for root from 93.197.146.107 port 58652 ssh2
... show less
Nov 13 09:44:01 honeypot sshd[5841]: Failed password for root from 93.197.146.107 port 47482 ssh2<br ... show moreNov 13 09:44:01 honeypot sshd[5841]: Failed password for root from 93.197.146.107 port 47482 ssh2
... show less