This IP address has been reported a total of 389
times from 215 distinct
sources.
102.130.122.145 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-08-18T03:20:14.035635+00:00 edge-bom-con01.int.pdx.net.uk sshd[1160413]: Invalid user rakhi fro ... show more2024-08-18T03:20:14.035635+00:00 edge-bom-con01.int.pdx.net.uk sshd[1160413]: Invalid user rakhi from 102.130.122.145 port 37158
2024-08-18T03:20:14.041458+00:00 edge-bom-con01.int.pdx.net.uk sshd[1160413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.122.145
2024-08-18T03:20:16.233133+00:00 edge-bom-con01.int.pdx.net.uk sshd[1160413]: Failed password for invalid user rakhi from 102.130.122.145 port 37158 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 18 02:43:25 f2b auth.info sshd[88306]: Failed password for root from 102.130.122.145 port 60542 ... show moreAug 18 02:43:25 f2b auth.info sshd[88306]: Failed password for root from 102.130.122.145 port 60542 ssh2
Aug 18 02:44:33 f2b auth.info sshd[88309]: Failed password for root from 102.130.122.145 port 35720 ssh2
Aug 18 02:45:26 f2b auth.info sshd[88313]: Failed password for root from 102.130.122.145 port 37110 ssh2
... show less
2024-08-18T03:22:35.356206+02:00 debian-mc-server sshd[2266231]: Invalid user borg from 102.130.122. ... show more2024-08-18T03:22:35.356206+02:00 debian-mc-server sshd[2266231]: Invalid user borg from 102.130.122.145 port 47974
2024-08-18T03:24:20.698025+02:00 debian-mc-server sshd[2266300]: Invalid user qiyuesuo from 102.130.122.145 port 38402
2024-08-18T03:26:08.552982+02:00 debian-mc-server sshd[2266384]: Invalid user subhash from 102.130.122.145 port 42450
2024-08-18T03:27:07.274458+02:00 debian-mc-server sshd[2266476]: Invalid user ali from 102.130.122.145 port 47312
2024-08-18T03:28:04.703828+02:00 debian-mc-server sshd[2266565]: Invalid user codi from 102.130.122.145 port 37778
... show less
2024-08-18T03:22:47.391208optasports sshd[14416]: Invalid user borg from 102.130.122.145 port 46718< ... show more2024-08-18T03:22:47.391208optasports sshd[14416]: Invalid user borg from 102.130.122.145 port 46718
2024-08-18T03:24:32.043774optasports sshd[14459]: Invalid user qiyuesuo from 102.130.122.145 port 53434
2024-08-18T03:26:20.438092optasports sshd[14477]: Invalid user subhash from 102.130.122.145 port 49526
... show less
2024-08-17T20:40:03.210100-04:00 collabhost.computernewb.com sshd-session[67830]: Invalid user kredd ... show more2024-08-17T20:40:03.210100-04:00 collabhost.computernewb.com sshd-session[67830]: Invalid user kreddy from 102.130.122.145 port 47182
2024-08-17T20:45:45.418166-04:00 collabhost.computernewb.com sshd-session[68224]: Invalid user setup from 102.130.122.145 port 37600
2024-08-17T20:46:35.434078-04:00 collabhost.computernewb.com sshd-session[68289]: Invalid user memo from 102.130.122.145 port 43332
... show less
Aug 17 23:57:26 elasticsearch sshd[712848]: Invalid user yogesh from 102.130.122.145 port 47808<br / ... show moreAug 17 23:57:26 elasticsearch sshd[712848]: Invalid user yogesh from 102.130.122.145 port 47808
Aug 18 00:00:47 elasticsearch sshd[712908]: Invalid user u2 from 102.130.122.145 port 51022
Aug 18 00:01:45 elasticsearch sshd[712956]: Invalid user sahel from 102.130.122.145 port 49258
... show less
2024-08-18T01:23:35.318441+02:00 cloud..de sshd[2434326]: Disconnected from authenticating user root ... show more2024-08-18T01:23:35.318441+02:00 cloud..de sshd[2434326]: Disconnected from authenticating user root 102.130.122.145 port 40754 [preauth]
2024-08-18T01:25:00.387014+02:00 cloud..de sshd[2434398]: Disconnected from authenticating user root 102.130.122.145 port 57484 [preauth]
2024-08-18T01:26:09.234413+02:00 cloud..de sshd[2434499]: Invalid user ftp1 from 102.130.122.145 port 33430 show less
Aug 18 01:24:27 qube2 sshd[2079859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 18 01:24:27 qube2 sshd[2079859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.122.145 user=root
Aug 18 01:24:28 qube2 sshd[2079859]: Failed password for root from 102.130.122.145 port 37796 ssh2
Aug 18 01:25:35 qube2 sshd[2083130]: Invalid user ftp1 from 102.130.122.145 port 60420
... show less
Brute-ForceSSH
Anonymous
Aug 18 01:00:22 C1D543E sshd[828197]: Failed password for invalid user debian from 102.130.122.145 p ... show moreAug 18 01:00:22 C1D543E sshd[828197]: Failed password for invalid user debian from 102.130.122.145 port 32920 ssh2
Aug 18 01:10:55 C1D543E sshd[828585]: Invalid user qxl from 102.130.122.145 port 33848
Aug 18 01:10:55 C1D543E sshd[828585]: Failed password for invalid user qxl from 102.130.122.145 port 33848 ssh2
Aug 18 01:11:47 C1D543E sshd[828612]: Invalid user elektra from 102.130.122.145 port 60408
Aug 18 01:11:47 C1D543E sshd[828612]: Failed password for invalid user elektra from 102.130.122.145 port 60408 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 18 00:45:58 C1D543E sshd[827452]: User root from 102.130.122.145 not allowed because not listed ... show moreAug 18 00:45:58 C1D543E sshd[827452]: User root from 102.130.122.145 not allowed because not listed in AllowUsers
Aug 18 00:45:58 C1D543E sshd[827452]: Failed password for invalid user root from 102.130.122.145 port 51894 ssh2
Aug 18 00:47:04 C1D543E sshd[827619]: User root from 102.130.122.145 not allowed because not listed in AllowUsers
Aug 18 00:47:04 C1D543E sshd[827619]: Failed password for invalid user root from 102.130.122.145 port 60210 ssh2
Aug 18 00:48:04 C1D543E sshd[827666]: User root from 102.130.122.145 not allowed because not listed in AllowUsers
... show less
Brute-ForceSSH
Anonymous
102.130.122.145 (ZA/South Africa/-), 5 distributed sshd attacks on account [root] in the last 3600 s ... show more102.130.122.145 (ZA/South Africa/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Aug 17 17:55:19 server2 sshd[25310]: Failed password for root from 128.199.202.79 port 59048 ssh2
Aug 17 17:56:14 server2 sshd[25519]: Failed password for root from 102.130.122.145 port 58676 ssh2
Aug 17 17:56:58 server2 sshd[30554]: Failed password for root from 175.100.24.139 port 33698 ssh2
Aug 17 17:56:58 server2 sshd[30556]: Failed password for root from 150.158.7.254 port 53312 ssh2
Aug 17 17:57:36 server2 sshd[2720]: Failed password for root from 190.145.200.210 port 56924 ssh2
OCCO-Holding Aug 17 23:23:07 vmi702584 sshd[730430]: Disconnected from authenticating user root 102. ... show moreOCCO-Holding Aug 17 23:23:07 vmi702584 sshd[730430]: Disconnected from authenticating user root 102.130.122.145 port 35016 [preauth]
Aug 17 23:26:48 vmi702584 sshd[730619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.122.145 user=root
Aug 17 23:26:51 vmi702584 sshd[730619]: Failed password for root from 102.130.122.145 port 47108 ssh2
Aug 17 23:26:51 vmi702584 sshd[730619]: Disconnected from authenticating user root 102.130.122.145 port 47108 [preauth]
Aug 17 23:27:41 vmi702584 sshd[730649]: Invalid user xutao from 102.130.122.145 port 34054
... show less