Go
54.38.82.14
is a
Hacker
100 %
France
Report Abuse
1008attacks reported
968Brute-ForceSSH
21Brute-Force
10HackingBrute-Force
4SSH
3uncategorized
1FTP Brute-ForceHacking
1Bad Web Bot
from 11 distinct reporters
and 4 distinct sources : BadIPs.com, Blocklist.de, FireHOL, AbuseIPDB
54.38.82.14 was first signaled at 2018-12-26 09:12 and last record was at 2019-06-26 14:56.
IP

54.38.82.14

Organization
OVH SAS
Localisation
France
NetRange : First & Last IP
54.38.80.0 - 54.38.83.255
Network CIDR
54.38.80.0/22

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-06-26 14:56 attacks Brute-ForceSSH AbuseIPDB Jun 26 19:56:10 vps200512 sshd\[17028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 14:03 attacks Brute-ForceSSH AbuseIPDB Jun 26 19:03:05 vps200512 sshd\[16130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 13:26 attacks Brute-ForceSSH AbuseIPDB Jun 26 18:26:06 vps200512 sshd\[15531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 13:09 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2019-06-26 13:02 attacks Brute-ForceSSH AbuseIPDB Jun 26 18:02:39 vps200512 sshd\[15211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 12:44 attacks Brute-ForceSSH AbuseIPDB Jun 26 17:44:41 vps200512 sshd\[15051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 12:11 attacks Brute-ForceSSH AbuseIPDB Jun 26 17:11:00 vps200512 sshd\[14686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 11:22 attacks Brute-ForceSSH AbuseIPDB Jun 26 16:22:48 vps200512 sshd\[13961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 11:05 attacks Brute-ForceSSH AbuseIPDB Jun 27 03:05:01 lcl-usvr-02 sshd[26423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=root
2019-06-26 09:25 attacks Brute-ForceSSH AbuseIPDB Jun 26 14:25:00 vps200512 sshd\[12059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 08:11 attacks Brute-ForceSSH AbuseIPDB Jun 26 13:11:15 vps200512 sshd\[10906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-26 05:47 attacks Brute-ForceSSH AbuseIPDB Jun 26 10:47:28 vps200512 sshd\[8662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-26 05:23 attacks Brute-ForceSSH AbuseIPDB Jun 26 10:23:30 vps200512 sshd\[8217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-26 05:04 attacks Brute-Force AbuseIPDB Jun 26 21:04:00 lcl-usvr-01 sshd[27365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=root
2019-06-26 04:13 attacks Brute-ForceSSH AbuseIPDB Jun 26 09:13:30 vps200512 sshd\[7227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-26 03:09 attacks Brute-ForceSSH AbuseIPDB Jun 26 08:09:35 vps200512 sshd\[6497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-26 02:35 attacks Brute-ForceSSH AbuseIPDB Jun 26 07:35:02 vps200512 sshd\[5988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-26 02:03 attacks Brute-ForceSSH AbuseIPDB Jun 26 07:03:03 vps200512 sshd\[5589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-26 01:38 attacks Brute-ForceSSH AbuseIPDB Jun 26 06:38:13 vps200512 sshd\[5104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-26 01:10 attacks Brute-ForceSSH AbuseIPDB Jun 26 06:10:25 vps200512 sshd\[4420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-25 23:34 attacks Brute-ForceSSH AbuseIPDB Jun 26 04:33:55 vps200512 sshd\[3252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-25 22:32 attacks Brute-ForceSSH AbuseIPDB Jun 26 03:32:12 vps200512 sshd\[2436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-25 21:51 attacks Brute-ForceSSH AbuseIPDB Jun 26 02:51:31 vps200512 sshd\[1790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-25 21:30 attacks Brute-ForceSSH AbuseIPDB Jun 26 02:29:55 vps200512 sshd\[1468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=ro
2019-06-25 19:56 attacks Brute-ForceSSH AbuseIPDB Jun 26 00:56:42 vps200512 sshd\[32625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 18:58 attacks Brute-ForceSSH AbuseIPDB Jun 25 23:58:46 vps200512 sshd\[31985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 18:37 attacks Brute-ForceSSH AbuseIPDB Jun 25 23:37:44 vps200512 sshd\[31792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 17:37 attacks Brute-ForceSSH AbuseIPDB Jun 25 22:37:38 vps200512 sshd\[31263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 16:56 attacks Brute-ForceSSH AbuseIPDB Jun 25 21:56:47 vps200512 sshd\[30826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 15:32 attacks Brute-ForceSSH AbuseIPDB Jun 25 20:32:03 vps200512 sshd\[29683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 14:17 attacks Brute-ForceSSH AbuseIPDB Jun 25 19:17:13 vps200512 sshd\[28727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 13:36 attacks Brute-ForceSSH AbuseIPDB Jun 25 18:36:05 vps200512 sshd\[28124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 13:25 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2019-06-25 12:24 attacks Brute-ForceSSH AbuseIPDB Jun 25 17:24:40 vps200512 sshd\[27201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 11:38 attacks Brute-ForceSSH AbuseIPDB Jun 25 16:38:48 vps200512 sshd\[26356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 10:45 attacks Brute-ForceSSH AbuseIPDB Jun 26 02:45:14 lcl-usvr-02 sshd[31555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=root
2019-06-25 10:29 attacks Brute-ForceSSH AbuseIPDB Jun 25 15:29:31 vps200512 sshd\[25528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 08:56 attacks Brute-ForceSSH AbuseIPDB Jun 25 13:56:35 vps200512 sshd\[24505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 08:18 attacks Brute-ForceSSH AbuseIPDB Jun 25 13:17:57 vps200512 sshd\[23739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 06:56 attacks Brute-ForceSSH AbuseIPDB Jun 25 11:56:52 vps200512 sshd\[22543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 06:28 attacks Brute-ForceSSH AbuseIPDB Jun 25 11:28:39 vps200512 sshd\[22276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 05:49 attacks Brute-ForceSSH AbuseIPDB Jun 25 10:49:38 vps200512 sshd\[21853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 05:09 attacks Brute-ForceSSH AbuseIPDB Jun 25 10:09:39 vps200512 sshd\[21388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 04:40 attacks Brute-ForceSSH AbuseIPDB Jun 25 09:40:07 vps200512 sshd\[20972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 04:29 attacks Brute-Force AbuseIPDB Jun 25 20:29:14 lcl-usvr-01 sshd[20739]: Invalid user admin from 54.38.82.14
2019-06-25 04:21 attacks Brute-ForceSSH AbuseIPDB Jun 25 09:21:02 vps200512 sshd\[20672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 03:48 attacks Brute-ForceSSH AbuseIPDB Jun 25 08:47:56 vps200512 sshd\[20172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 02:51 attacks Brute-ForceSSH AbuseIPDB Jun 25 07:51:44 vps200512 sshd\[19474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 02:25 attacks Brute-ForceSSH AbuseIPDB Jun 25 07:25:46 vps200512 sshd\[19143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2019-06-25 01:40 attacks Brute-ForceSSH AbuseIPDB Jun 25 06:40:28 vps200512 sshd\[18677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=r
2018-12-26 09:12 attacks Brute-Force AbuseIPDB Dec 26 20:12:21 ext-ipv4-fra2 sshd\[3042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 use
2018-12-26 09:41 attacks FTP Brute-ForceHacking AbuseIPDB Dec 26 19:01:24 ihels001 sshd[11306]: Connection from 54.38.82.14 port 58282 on 46.101.50.153 port 22 Dec 26 19:01:24 ihels001 sshd[11306]: Connection
2018-12-26 12:10 attacks Brute-Force AbuseIPDB Dec 26 23:10:48 ext-ipv4-fra2 sshd\[15567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 us
2018-12-26 12:37 attacks Brute-Force AbuseIPDB Dec 26 23:33:26 ext-ipv4-fra2 sshd\[16895\]: Invalid user admin from 54.38.82.14 port 53186 Dec 26 23:33:26 ext-ipv4-fra2 sshd\[16895\]: pam_unix\(ssh
2018-12-26 12:53 attacks Brute-Force AbuseIPDB Dec 26 23:53:27 ext-ipv4-fra2 sshd\[18056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 us
2018-12-26 14:08 attacks Brute-Force AbuseIPDB Dec 27 01:08:22 ext-ipv4-fra2 sshd\[2380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 use
2018-12-26 14:56 attacks Brute-Force AbuseIPDB Dec 27 01:56:10 ext-ipv4-fra2 sshd\[5143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 use
2018-12-26 15:27 attacks Brute-Force AbuseIPDB Dec 27 02:27:43 ext-ipv4-fra2 sshd\[7202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 use
2018-12-26 16:55 attacks Brute-Force AbuseIPDB Dec 27 03:55:17 ext-ipv4-fra2 sshd\[12343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 us
2018-12-26 17:55 attacks Brute-Force AbuseIPDB Dec 27 04:55:13 ext-ipv4-fra2 sshd\[15889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 us
2019-03-29 18:18 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-06-08 17:29 attacks blocklist_de Blocklist.de  
2019-06-08 17:29 attacks SSH blocklist_de_ssh Blocklist.de  
2019-06-08 17:35 attacks firehol_level2 FireHOL  
2019-06-19 07:33 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-06-19 07:33 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

whois.ripe.net.



inetnum: 54.38.80.0 - 54.38.83.255
netname: SD-1G-RBX7
country: FR
org: ORG-OS3-RIPE
admin-c: OTC2-RIPE
tech-c: OTC2-RIPE
status: LEGACY
mnt-by: OVH-MNT
created: 2018-01-09T11:00:21Z
last-modified: 2018-01-09T11:00:21Z
source: RIPE

organisation: ORG-OS3-RIPE
org-name: OVH SAS
org-type: LIR
address: 2 rue Kellermann
address: 59100
address: Roubaix
address: FRANCE
phone: +33972101007
abuse-c: AR15333-RIPE
admin-c: OTC2-RIPE
admin-c: OK217-RIPE
admin-c: GM84-RIPE
mnt-ref: OVH-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: OVH-MNT
created: 2004-04-17T11:23:17Z
last-modified: 2017-10-30T14:40:06Z
source: RIPE # Filtered

role: OVH Technical Contact
address: OVH SAS
address: 2 rue Kellermann
address: 59100 Roubaix
address: France
admin-c: OK217-RIPE
tech-c: GM84-RIPE
tech-c: SL10162-RIPE
nic-hdl: OTC2-RIPE
abuse-mailbox: abuse@ovh.net
mnt-by: OVH-MNT
created: 2004-01-28T17:42:29Z
last-modified: 2014-09-05T10:47:15Z
source: RIPE # Filtered

route: 54.38.0.0/16
origin: AS16276
mnt-by: OVH-MNT
created: 2017-10-06T07:58:11Z
last-modified: 2017-10-06T07:58:11Z
source: RIPE
most specific ip range is highlighted
Updated : 2019-07-04