This IP address has been reported a total of 287
times from 183 distinct
sources.
113.142.129.120 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Sep 2 10:54:02 v4bgp sshd[2246546]: Invalid user tester from 113.142.129.120 port 54726
Sep ... show moreSep 2 10:54:02 v4bgp sshd[2246546]: Invalid user tester from 113.142.129.120 port 54726
Sep 2 10:54:02 v4bgp sshd[2246546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.129.120
Sep 2 10:54:04 v4bgp sshd[2246546]: Failed password for invalid user tester from 113.142.129.120 port 54726 ssh2
... show less
Sep 2 03:36:21 splayfoot sshd[808035]: Invalid user hwang from 113.142.129.120 port 32878
Sep ... show moreSep 2 03:36:21 splayfoot sshd[808035]: Invalid user hwang from 113.142.129.120 port 32878
Sep 2 03:48:13 splayfoot sshd[808249]: Invalid user taxi from 113.142.129.120 port 44762
Sep 2 03:57:18 splayfoot sshd[808439]: Invalid user sysadmin from 113.142.129.120 port 35178
... show less
Sep 2 09:48:10 service sshd[247007]: Invalid user taxi from 113.142.129.120 port 39252
Sep 2 ... show moreSep 2 09:48:10 service sshd[247007]: Invalid user taxi from 113.142.129.120 port 39252
Sep 2 09:48:13 service sshd[247007]: Failed password for invalid user taxi from 113.142.129.120 port 39252 ssh2
Sep 2 09:57:15 service sshd[247152]: Invalid user sysadmin from 113.142.129.120 port 57900
... show less
sshd[2787415]: Invalid user debian from 113.142.129.120 port 52034
sshd[2787415]: pam_unix(ssh ... show moresshd[2787415]: Invalid user debian from 113.142.129.120 port 52034
sshd[2787415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.129.120
sshd[2787415]: Failed password for invalid user debian from 113.142.129.120 port 52034 ssh2
sshd[2787565]: Invalid user nagios from 113.142.129.120 port 60488 show less
Sep 2 01:54:50 monitoring sshd[2643517]: Failed password for invalid user niko from 113.142.129.120 ... show moreSep 2 01:54:50 monitoring sshd[2643517]: Failed password for invalid user niko from 113.142.129.120 port 46534 ssh2
Sep 2 01:55:20 monitoring sshd[2643595]: Invalid user autumn from 113.142.129.120 port 50836
Sep 2 01:55:20 monitoring sshd[2643595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.129.120
Sep 2 01:55:20 monitoring sshd[2643595]: Invalid user autumn from 113.142.129.120 port 50836
Sep 2 01:55:22 monitoring sshd[2643595]: Failed password for invalid user autumn from 113.142.129.120 port 50836 ssh2
... show less
Sep 2 01:27:11 server2 sshd\[28405\]: Invalid user armando from 113.142.129.120
Sep 2 01:27: ... show moreSep 2 01:27:11 server2 sshd\[28405\]: Invalid user armando from 113.142.129.120
Sep 2 01:27:30 server2 sshd\[28425\]: Invalid user student2 from 113.142.129.120
Sep 2 01:27:46 server2 sshd\[28429\]: Invalid user mate from 113.142.129.120
Sep 2 01:28:05 server2 sshd\[28434\]: Invalid user jlm from 113.142.129.120
Sep 2 01:28:28 server2 sshd\[28480\]: Invalid user site01 from 113.142.129.120
Sep 2 01:28:40 server2 sshd\[28483\]: User root from 113.142.129.120 not allowed because not listed in AllowUsers show less
2024-09-01T20:25:21.985306+00:00 vps-2fbf7b1a sshd[6323]: pam_unix(sshd:auth): authentication failur ... show more2024-09-01T20:25:21.985306+00:00 vps-2fbf7b1a sshd[6323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.129.120
2024-09-01T20:25:23.693972+00:00 vps-2fbf7b1a sshd[6323]: Failed password for invalid user peter from 113.142.129.120 port 52296 ssh2 show less