This IP address has been reported a total of 298
times from 177 distinct
sources.
94.139.254.41 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-10-14T02:19:26.334314-07:00 SJC-NB sshd[1059222]: Failed password for invalid user wocloud from ... show more2024-10-14T02:19:26.334314-07:00 SJC-NB sshd[1059222]: Failed password for invalid user wocloud from 94.139.254.41 port 53548 ssh2
2024-10-14T02:29:30.203499-07:00 SJC-NB sshd[1073312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.254.41 user=root
2024-10-14T02:29:32.292231-07:00 SJC-NB sshd[1073312]: Failed password for root from 94.139.254.41 port 59244 ssh2
... show less
Oct 16 05:09:36 sanyalnet-oracle-vps2 sshd[1632403]: pam_unix(sshd:auth): authentication failure; lo ... show moreOct 16 05:09:36 sanyalnet-oracle-vps2 sshd[1632403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.254.41
Oct 16 05:09:38 sanyalnet-oracle-vps2 sshd[1632403]: Failed password for invalid user cenagro from 94.139.254.41 port 56004 ssh2
Oct 16 05:09:39 sanyalnet-oracle-vps2 sshd[1632403]: Connection closed by invalid user cenagro 94.139.254.41 port 56004 [preauth]
... show less
2024-10-16T00:34:05.046954 VOSTOK sshd[19723]: Invalid user site24x7-agent from 94.139.254.41 port 4 ... show more2024-10-16T00:34:05.046954 VOSTOK sshd[19723]: Invalid user site24x7-agent from 94.139.254.41 port 49316
2024-10-16T00:34:05.051491 VOSTOK sshd[19723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.254.41
2024-10-16T00:34:07.570939 VOSTOK sshd[19723]: Failed password for invalid user site24x7-agent from 94.139.254.41 port 49316 ssh2
2024-10-16T00:35:53.957236 VOSTOK sshd[19910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.254.41 user=root
2024-10-16T00:35:55.968531 VOSTOK sshd[19910]: Failed password for root from 94.139.254.41 port 52858 ssh2
... show less
Oct 16 00:27:36 fremontnet-scca-01 sshd[23747]: pam_unix(sshd:auth): authentication failure; logname ... show moreOct 16 00:27:36 fremontnet-scca-01 sshd[23747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.254.41
Oct 16 00:27:39 fremontnet-scca-01 sshd[23747]: Failed password for invalid user robot from 94.139.254.41 port 42850 ssh2
Oct 16 00:28:33 fremontnet-scca-01 sshd[23749]: Failed password for root from 94.139.254.41 port 32910 ssh2 show less
2024-10-16T05:59:34.308108+02:00 siena sshd[2829714]: Invalid user redis from 94.139.254.41 port 601 ... show more2024-10-16T05:59:34.308108+02:00 siena sshd[2829714]: Invalid user redis from 94.139.254.41 port 60146
... show less