This IP address has been reported a total of 473
times from 298 distinct
sources.
102.134.141.23 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2024-11-12T12:27:07Z and 2024-11-1 ... show moreCowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2024-11-12T12:27:07Z and 2024-11-12T12:27:12Z show less
2024-11-12T12:08:01.335475+01:00 Server sshd[2263201]: Failed password for root from 102.134.141.23 ... show more2024-11-12T12:08:01.335475+01:00 Server sshd[2263201]: Failed password for root from 102.134.141.23 port 53160 ssh2
2024-11-12T12:10:45.581522+01:00 Server sshd[2265050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
2024-11-12T12:10:47.571278+01:00 Server sshd[2265050]: Failed password for root from 102.134.141.23 port 54280 ssh2
2024-11-12T12:13:28.100508+01:00 Server sshd[2266948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
2024-11-12T12:13:30.135400+01:00 Server sshd[2266948]: Failed password for root from 102.134.141.23 port 45192 ssh2
... show less
Nov 12 04:04:53 b146-21 sshd[40875]: Failed password for root from 102.134.141.23 port 42402 ssh2<br ... show moreNov 12 04:04:53 b146-21 sshd[40875]: Failed password for root from 102.134.141.23 port 42402 ssh2
Nov 12 04:07:36 b146-21 sshd[41191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 12 04:07:38 b146-21 sshd[41191]: Failed password for root from 102.134.141.23 port 51278 ssh2
... show less
Illegal access attempt:2024-11-12T11:16:08.130732+02:00 xn--kster-juait sshd[842064]: Failed passwor ... show moreIllegal access attempt:2024-11-12T11:16:08.130732+02:00 xn--kster-juait sshd[842064]: Failed password for root from 102.134.141.23 port 45030 ssh2
2024-11-12T11:16:09.387330+02:00 xn--kster-juait sshd[842064]: error: maximum authentication attempts exceeded for root from 102.134.141.23 port 45030 ssh2 [preauth]
... show less
Nov1208:59:30server6sshd[2901464]:Invaliduserdebianfrom161.82.233.179port60714Nov1209:29:17server6ss ... show moreNov1208:59:30server6sshd[2901464]:Invaliduserdebianfrom161.82.233.179port60714Nov1209:29:17server6sshd[2911298]:Invaliduserdebianfrom102.134.141.23port60410Nov1208:46:14server6sshd[2897567]:Invaliduserdebianfrom41.94.30.4port51288Nov1209:40:53server6sshd[2915307]:Invaliduserdebianfrom220.118.147.50port16930Nov1209:32:00server6sshd[2912352]:Invaliduserdebianfrom102.134.141.23port55548IPAddressesBlocked:161.82.233.179\(TH/Thailand/symc-161-82-233-179.violin.co.th\) show less
2024-11-12T09:19:13.470424+01:00 mailserver sshd[275270]: Failed password for root from 102.134.141. ... show more2024-11-12T09:19:13.470424+01:00 mailserver sshd[275270]: Failed password for root from 102.134.141.23 port 56988 ssh2
2024-11-12T09:21:54.299668+01:00 mailserver sshd[276627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
2024-11-12T09:21:56.144261+01:00 mailserver sshd[276627]: Failed password for root from 102.134.141.23 port 47664 ssh2
... show less
2024-11-12T09:15:20.965378+01:00 bcn01.es.pop.as202427.net sshd[2810627]: User root from 102.134.141 ... show more2024-11-12T09:15:20.965378+01:00 bcn01.es.pop.as202427.net sshd[2810627]: User root from 102.134.141.23 not allowed because not listed in AllowUsers
2024-11-12T09:19:09.219986+01:00 bcn01.es.pop.as202427.net sshd[2811226]: User root from 102.134.141.23 not allowed because not listed in AllowUsers
2024-11-12T09:21:53.265933+01:00 bcn01.es.pop.as202427.net sshd[2811630]: User root from 102.134.141.23 not allowed because not listed in AllowUsers
... show less
[SSH2] Unauthorized connection attempt from 102.134.141.23
Brute-ForceSSH
Anonymous
Nov 12 08:38:42 v2202305200205228941 sshd[990746]: Failed password for root from 102.134.141.23 port ... show moreNov 12 08:38:42 v2202305200205228941 sshd[990746]: Failed password for root from 102.134.141.23 port 59480 ssh2
Nov 12 08:41:34 v2202305200205228941 sshd[990754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 12 08:41:37 v2202305200205228941 sshd[990754]: Failed password for root from 102.134.141.23 port 58232 ssh2
Nov 12 08:44:16 v2202305200205228941 sshd[990769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 12 08:44:18 v2202305200205228941 sshd[990769]: Failed password for root from 102.134.141.23 port 58048 ssh2
... show less