This IP address has been reported a total of 473
times from 298 distinct
sources.
102.134.141.23 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Nov 12 07:45:02 pbs sshd[2178358]: Failed password for root from 102.134.141.23 port 48846 ssh2<br / ... show moreNov 12 07:45:02 pbs sshd[2178358]: Failed password for root from 102.134.141.23 port 48846 ssh2
Nov 12 07:47:41 pbs sshd[2181408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 12 07:47:43 pbs sshd[2181408]: Failed password for root from 102.134.141.23 port 58966 ssh2
Nov 12 07:50:29 pbs sshd[2184035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 12 07:50:31 pbs sshd[2184035]: Failed password for root from 102.134.141.23 port 57114 ssh2
... show less
2024-11-12T00:09:46.518233-05:00 linux.10ec9d.com sshd[98373]: pam_unix(sshd:auth): authentication f ... show more2024-11-12T00:09:46.518233-05:00 linux.10ec9d.com sshd[98373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
2024-11-12T00:09:48.433981-05:00 linux.10ec9d.com sshd[98373]: Failed password for invalid user root from 102.134.141.23 port 54446 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-11-12T12:14:04.848791+08:00 kltw-debian sshd[502459]: Disconnected from authenticating user roo ... show more2024-11-12T12:14:04.848791+08:00 kltw-debian sshd[502459]: Disconnected from authenticating user root 102.134.141.23 port 47076 [preauth]
2024-11-12T12:17:49.227395+08:00 kltw-debian sshd[502482]: Disconnected from authenticating user root 102.134.141.23 port 53810 [preauth]
2024-11-12T12:20:38.410165+08:00 kltw-debian sshd[502500]: Disconnected from authenticating user root 102.134.141.23 port 53706 [preauth]
2024-11-12T12:23:24.425791+08:00 kltw-debian sshd[502530]: Invalid user deamon_root from 102.134.141.23 port 55278
2024-11-12T12:23:24.803457+08:00 kltw-debian sshd[502530]: Disconnected from invalid user deamon_root 102.134.141.23 port 55278 [preauth]
... show less
Brute-ForceSSH
Anonymous
Nov 11 23:21:21 global2 sshd[23007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreNov 11 23:21:21 global2 sshd[23007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 11 23:21:24 global2 sshd[23007]: Failed password for root from 102.134.141.23 port 47678 ssh2
Nov 11 23:24:12 global2 sshd[23076]: Invalid user deamon_root from 102.134.141.23 port 42810
Nov 11 23:24:12 global2 sshd[23076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23
Nov 11 23:24:14 global2 sshd[23076]: Failed password for invalid user deamon_root from 102.134.141.23 port 42810 ssh2
... show less
This IP was banned by Fail2Ban. Reason: Multiple incorrect password (SSH & BRUTE-FORCE)
SSH
Anonymous
SSH Bruteforce Attempt (failed auth)
Brute-ForceSSH
Anonymous
102.134.141.23 (UG/Uganda/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Po ... show more102.134.141.23 (UG/Uganda/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Nov 11 23:13:47 server2 sshd[26365]: Failed password for root from 27.111.32.174 port 59046 ssh2
Nov 11 23:14:53 server2 sshd[26749]: Failed password for root from 202.8.125.98 port 58496 ssh2
Nov 11 23:14:55 server2 sshd[26758]: Failed password for root from 197.5.145.102 port 19838 ssh2
Nov 11 23:15:16 server2 sshd[27033]: Failed password for root from 119.160.193.12 port 56196 ssh2
Nov 11 23:14:34 server2 sshd[26680]: Failed password for root from 102.134.141.23 port 57628 ssh2
IP Addresses Blocked:
27.111.32.174 (ID/Indonesia/-)
202.8.125.98 (IN/India/-)
197.5.145.102 (TN/Tunisia/-)
119.160.193.12 (IN/India/-) show less
Brute-Force
Anonymous
Nov 11 22:19:48 mail sshd[1918885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 11 22:19:48 mail sshd[1918885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23
Nov 11 22:19:48 mail sshd[1918885]: Invalid user debian from 102.134.141.23 port 48190
Nov 11 22:19:51 mail sshd[1918885]: Failed password for invalid user debian from 102.134.141.23 port 48190 ssh2
... show less
Nov 11 18:44:41 cohoe sshd[2249876]: Failed password for root from 102.134.141.23 port 51852 ssh2<br ... show moreNov 11 18:44:41 cohoe sshd[2249876]: Failed password for root from 102.134.141.23 port 51852 ssh2
Nov 11 18:47:22 cohoe sshd[2250043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 11 18:47:25 cohoe sshd[2250043]: Failed password for root from 102.134.141.23 port 59052 ssh2
Nov 11 18:50:06 cohoe sshd[2250139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 11 18:50:07 cohoe sshd[2250139]: Failed password for root from 102.134.141.23 port 57864 ssh2
... show less
Nov 11 20:43:45 jumarpab sshd[1531835]: Failed password for invalid user deamon from 102.134.141.23 ... show moreNov 11 20:43:45 jumarpab sshd[1531835]: Failed password for invalid user deamon from 102.134.141.23 port 52924 ssh2
Nov 11 20:47:00 jumarpab sshd[1532332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.141.23 user=root
Nov 11 20:47:02 jumarpab sshd[1532332]: Failed password for root from 102.134.141.23 port 56128 ssh2
... show less
Nov 12 00:56:37 archivo-colectivo sshd[210798]: Disconnected from authenticating user root 102.134.1 ... show moreNov 12 00:56:37 archivo-colectivo sshd[210798]: Disconnected from authenticating user root 102.134.141.23 port 60500 [preauth]
Nov 12 01:01:01 archivo-colectivo sshd[210890]: Disconnected from authenticating user root 102.134.141.23 port 53198 [preauth]
Nov 12 01:03:43 archivo-colectivo sshd[210967]: Disconnected from authenticating user root 102.134.141.23 port 39138 [preauth]
... show less