This IP address has been reported a total of 2,835
times from 807 distinct
sources.
113.134.211.242 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Oct 22 22:47:28 kamergaz sshd[2093929]: Failed password for invalid user paone from 113.134.211.242 ... show moreOct 22 22:47:28 kamergaz sshd[2093929]: Failed password for invalid user paone from 113.134.211.242 port 50316 ssh2
Oct 22 22:51:47 kamergaz sshd[2094968]: Invalid user makehome from 113.134.211.242 port 49362
Oct 22 22:51:47 kamergaz sshd[2094968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
Oct 22 22:51:49 kamergaz sshd[2094968]: Failed password for invalid user makehome from 113.134.211.242 port 49362 ssh2
Oct 22 22:53:35 kamergaz sshd[2095434]: Invalid user aadil from 113.134.211.242 port 48762 show less
2024-10-22T21:45:18.543283 SEMOR-WEB sshd[2578133]: Invalid user paone from 113.134.211.242 port 456 ... show more2024-10-22T21:45:18.543283 SEMOR-WEB sshd[2578133]: Invalid user paone from 113.134.211.242 port 45658
... show less
Brute-ForceSSH
Anonymous
2024-10-22T23:19:25.143050+02:00 ubuntu sshd[23467]: Failed password for invalid user enter from 113 ... show more2024-10-22T23:19:25.143050+02:00 ubuntu sshd[23467]: Failed password for invalid user enter from 113.134.211.242 port 37406 ssh2
2024-10-22T23:24:00.705104+02:00 ubuntu sshd[23493]: Invalid user ubuntu from 113.134.211.242 port 33338
2024-10-22T23:24:00.712132+02:00 ubuntu sshd[23493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
2024-10-22T23:24:02.493306+02:00 ubuntu sshd[23493]: Failed password for invalid user ubuntu from 113.134.211.242 port 33338 ssh2
2024-10-22T23:25:49.968674+02:00 ubuntu sshd[23539]: Invalid user curso from 113.134.211.242 port 33122
... show less
2024-10-22T23:22:26.053036 frenzy sshd[137332]: Failed password for invalid user enter from 113.134. ... show more2024-10-22T23:22:26.053036 frenzy sshd[137332]: Failed password for invalid user enter from 113.134.211.242 port 34658 ssh2
2024-10-22T23:24:56.393181 frenzy sshd[137392]: Invalid user ubuntu from 113.134.211.242 port 40902
2024-10-22T23:24:56.401124 frenzy sshd[137392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
2024-10-22T23:24:58.202578 frenzy sshd[137392]: Failed password for invalid user ubuntu from 113.134.211.242 port 40902 ssh2
... show less
2024-10-22T21:27:16.289998+01:00 hostvu2 sshd[1966971]: Failed password for invalid user web from 11 ... show more2024-10-22T21:27:16.289998+01:00 hostvu2 sshd[1966971]: Failed password for invalid user web from 113.134.211.242 port 37220 ssh2
2024-10-22T21:30:08.467458+01:00 hostvu2 sshd[1967732]: Invalid user info1 from 113.134.211.242 port 45056
2024-10-22T21:30:08.470905+01:00 hostvu2 sshd[1967732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
2024-10-22T21:30:10.222762+01:00 hostvu2 sshd[1967732]: Failed password for invalid user info1 from 113.134.211.242 port 45056 ssh2
2024-10-22T21:31:56.452911+01:00 hostvu2 sshd[1967873]: Invalid user eacpdv from 113.134.211.242 port 44262
... show less
2024-10-22T22:24:47.026563+02:00 sshd[4002540]: Invalid user web from 113.134.211.242 port 33704<br ... show more2024-10-22T22:24:47.026563+02:00 sshd[4002540]: Invalid user web from 113.134.211.242 port 33704
2024-10-22T22:24:47.187010+02:00 sshd[4002540]: Disconnected from invalid user web 113.134.211.242 port 33704 [preauth]
2024-10-22T22:29:21.847133+02:00 sshd[4066141]: Invalid user info1 from 113.134.211.242 port 56442 show less
2024-10-22T14:58:28.674781-05:00 plex sshd[35629]: Invalid user topfan from 113.134.211.242 port 533 ... show more2024-10-22T14:58:28.674781-05:00 plex sshd[35629]: Invalid user topfan from 113.134.211.242 port 53312
2024-10-22T15:00:32.221383-05:00 plex sshd[35633]: Invalid user infernalreza from 113.134.211.242 port 55356
... show less
Cluster member (Omitted) (FR/France/-) said, DENY 113.134.211.242, Reason:[(sshd) Failed SSH login f ... show moreCluster member (Omitted) (FR/France/-) said, DENY 113.134.211.242, Reason:[(sshd) Failed SSH login from 113.134.211.242 (CN/China/-): 2 in the last (Omitted)] show less
2024-10-22T21:25:18.865371+02:00 beastie.lan.nrvl.net sshd[424950]: Invalid user sadaf from 113.134. ... show more2024-10-22T21:25:18.865371+02:00 beastie.lan.nrvl.net sshd[424950]: Invalid user sadaf from 113.134.211.242 port 34042
2024-10-22T21:29:35.426304+02:00 beastie.lan.nrvl.net sshd[425028]: Invalid user bb from 113.134.211.242 port 53714
2024-10-22T21:31:22.139153+02:00 beastie.lan.nrvl.net sshd[425190]: Invalid user jamalsoleimani from 113.134.211.242 port 52878
2024-10-22T21:33:05.829999+02:00 beastie.lan.nrvl.net sshd[425238]: Invalid user malgosia from 113.134.211.242 port 51850
2024-10-22T21:34:45.812674+02:00 beastie.lan.nrvl.net sshd[425287]: Invalid user kav from 113.134.211.242 port 50914
... show less
[rede-44-49] (sshd) Failed SSH login from 113.134.211.242 (CN/China/-): 5 in the last 3600 secs; Por ... show more[rede-44-49] (sshd) Failed SSH login from 113.134.211.242 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Oct 22 15:37:10 sshd[14181]: Invalid user [USERNAME] from 113.134.211.242 port 53356
Oct 22 15:37:12 sshd[14181]: Failed password for invalid user [USERNAME] from 113.134.211.242 port 53356 ssh2
Oct 22 15:42:22 sshd[14600]: Invalid user [USERNAME] from 113.134.211.242 port 51934
Oct 22 15:42:24 sshd[14600]: Failed password for invalid user [USERNAME] from 113.134.211.242 port 51934 ssh2
Oct 22 15:44:08 sshd[14802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= show less