This IP address has been reported a total of 2,835
times from 807 distinct
sources.
113.134.211.242 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-10-22T17:31:39.638495+02:00 microfood-srv sshd[584817]: Invalid user rs from 113.134.211.242 po ... show more2024-10-22T17:31:39.638495+02:00 microfood-srv sshd[584817]: Invalid user rs from 113.134.211.242 port 40716
2024-10-22T17:32:43.881883+02:00 microfood-srv sshd[585403]: Invalid user sd from 113.134.211.242 port 55078
2024-10-22T17:35:57.088999+02:00 microfood-srv sshd[587060]: Invalid user orion from 113.134.211.242 port 41540
... show less
2024-10-22T11:24:43.623364-04:00 prod-1 sshd[159616]: Disconnected from authenticating user root 113 ... show more2024-10-22T11:24:43.623364-04:00 prod-1 sshd[159616]: Disconnected from authenticating user root 113.134.211.242 port 36622 [preauth]
2024-10-22T11:31:30.768517-04:00 prod-1 sshd[160603]: Invalid user rs from 113.134.211.242 port 44094
2024-10-22T11:31:31.023591-04:00 prod-1 sshd[160603]: Disconnected from invalid user rs 113.134.211.242 port 44094 [preauth]
2024-10-22T11:31:58.089320-04:00 prod-1 sshd[160450]: Connection closed by 113.134.211.242 port 57950 [preauth]
2024-10-22T11:32:38.766046-04:00 prod-1 sshd[160800]: Invalid user sd from 113.134.211.242 port 58460
... show less
Brute-ForceSSH
Anonymous
2024-10-22T17:30:21.699659+02:00 mail.chill.at sshd[1188879]: pam_unix(sshd:auth): authentication fa ... show more2024-10-22T17:30:21.699659+02:00 mail.chill.at sshd[1188879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
2024-10-22T17:30:24.151724+02:00 mail.chill.at sshd[1188879]: Failed password for invalid user tamara from 113.134.211.242 port 53020 ssh2
2024-10-22T17:31:33.726564+02:00 mail.chill.at sshd[1188921]: Invalid user rs from 113.134.211.242 port 39162
2024-10-22T17:31:33.737496+02:00 mail.chill.at sshd[1188921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
2024-10-22T17:31:36.073275+02:00 mail.chill.at sshd[1188921]: Failed password for invalid user rs from 113.134.211.242 port 39162 ssh2 show less
2024-10-22T12:27:13.220479-03:00 salada-de-fruta sshd[810302]: Disconnected from authenticating user ... show more2024-10-22T12:27:13.220479-03:00 salada-de-fruta sshd[810302]: Disconnected from authenticating user root 113.134.211.242 port 59878 [preauth]
... show less
Oct 22 16:57:18 hades sshd[913633]: Invalid user mhd from 113.134.211.242 port 42738
Oct 22 16 ... show moreOct 22 16:57:18 hades sshd[913633]: Invalid user mhd from 113.134.211.242 port 42738
Oct 22 16:57:18 hades sshd[913632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
Oct 22 16:57:20 hades sshd[913632]: Failed password for invalid user mhd from 113.134.211.242 port 42736 ssh2
... show less
Oct 22 07:44:40 LU-VPS01 sshd[9431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreOct 22 07:44:40 LU-VPS01 sshd[9431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
Oct 22 07:44:42 LU-VPS01 sshd[9431]: Failed password for invalid user anuar from 113.134.211.242 port 42240 ssh2
Oct 22 07:46:31 LU-VPS01 sshd[9485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
... show less
Brute-ForceSSH
Anonymous
2024-10-22T16:18:21.283732 - sshd[3984974]: Failed password for invalid user hamilton from 113.134.2 ... show more2024-10-22T16:18:21.283732 - sshd[3984974]: Failed password for invalid user hamilton from 113.134.211.242 port 39788 ssh2
2024-10-22T16:28:04.261237 - sshd[3985098]: Invalid user peach from 113.134.211.242 port 36886
2024-10-22T16:28:04.265695 - sshd[3985098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
2024-10-22T16:28:06.023932 - sshd[3985098]: Failed password for invalid user peach from 113.134.211.242 port 36886 ssh2
2024-10-22T16:29:49.814893 - sshd[3985110]: Invalid user proberto from 113.134.211.242 port 34172
... show less
2024-10-22T14:19:08.735676+00:00 arch.xny sshd[601557]: Failed password for invalid user hamilton fr ... show more2024-10-22T14:19:08.735676+00:00 arch.xny sshd[601557]: Failed password for invalid user hamilton from 113.134.211.242 port 54716 ssh2
2024-10-22T14:24:37.914013+00:00 arch.xny sshd[601588]: Invalid user rwand from 113.134.211.242 port 52120
2024-10-22T14:24:37.925915+00:00 arch.xny sshd[601588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
2024-10-22T14:24:39.600806+00:00 arch.xny sshd[601588]: Failed password for invalid user rwand from 113.134.211.242 port 52120 ssh2
2024-10-22T14:26:29.604591+00:00 arch.xny sshd[601627]: Invalid user twujstary from 113.134.211.242 port 49504
... show less
Oct 22 21:43:42 mocha sshd[3299157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreOct 22 21:43:42 mocha sshd[3299157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
Oct 22 21:43:44 mocha sshd[3299157]: Failed password for invalid user dinas from 113.134.211.242 port 48064 ssh2
Oct 22 21:48:08 mocha sshd[3302816]: Invalid user onboarding from 113.134.211.242 port 37404
... show less