This IP address has been reported a total of 44,756
times from 2,012 distinct
sources.
119.252.143.6 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
Jan 24 11:40:56 wolf1 sshd[3435977]: Invalid user admin from 119.252.143.6 port 58601
Jan 24 1 ... show moreJan 24 11:40:56 wolf1 sshd[3435977]: Invalid user admin from 119.252.143.6 port 58601
Jan 24 11:43:18 wolf1 sshd[3436112]: Invalid user debian from 119.252.143.6 port 18527
Jan 24 11:44:31 wolf1 sshd[3436217]: Invalid user ftpuser from 119.252.143.6 port 30250
Jan 24 11:45:44 wolf1 sshd[3436294]: Invalid user test from 119.252.143.6 port 41971
Jan 24 11:46:56 wolf1 sshd[3436368]: Invalid user hysteria from 119.252.143.6 port 53696
... show less
DDoS AttackFTP Brute-ForcePort ScanHackingSQL InjectionSpoofingBrute-ForceBad Web BotSSHIoT Targeted
2025-01-24T11:42:46.434474+01:00 vm-197198 sshd[467017]: Invalid user debian from 119.252.143.6 port ... show more2025-01-24T11:42:46.434474+01:00 vm-197198 sshd[467017]: Invalid user debian from 119.252.143.6 port 37551
2025-01-24T11:43:59.708062+01:00 vm-197198 sshd[467038]: Connection from 119.252.143.6 port 49274 on 95.138.193.99 port 22 rdomain ""
2025-01-24T11:44:00.713937+01:00 vm-197198 sshd[467038]: Invalid user ftpuser from 119.252.143.6 port 49274
... show less
2025-01-24T08:56:28.587369+00:00 widevents-matomo sshd[532192]: Invalid user it from 119.252.143.6 p ... show more2025-01-24T08:56:28.587369+00:00 widevents-matomo sshd[532192]: Invalid user it from 119.252.143.6 port 10717
2025-01-24T08:58:39.163251+00:00 widevents-matomo sshd[532298]: Invalid user herb from 119.252.143.6 port 26423
2025-01-24T09:00:15.192988+00:00 widevents-matomo sshd[614299]: Invalid user oss from 119.252.143.6 port 39885
... show less
2025-01-24T10:55:07.542660+02:00 FutureRP sshd[72002]: Failed password for invalid user it from 119. ... show more2025-01-24T10:55:07.542660+02:00 FutureRP sshd[72002]: Failed password for invalid user it from 119.252.143.6 port 27908 ssh2
2025-01-24T10:58:14.941840+02:00 FutureRP sshd[72122]: Invalid user herb from 119.252.143.6 port 48080
2025-01-24T10:58:14.958463+02:00 FutureRP sshd[72122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6
2025-01-24T10:58:16.778667+02:00 FutureRP sshd[72122]: Failed password for invalid user herb from 119.252.143.6 port 48080 ssh2
2025-01-24T10:59:52.422899+02:00 FutureRP sshd[72183]: Invalid user oss from 119.252.143.6 port 61545
... show less
Jan 24 05:54:43 fisher sshd[32616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreJan 24 05:54:43 fisher sshd[32616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6
Jan 24 05:54:44 fisher sshd[32616]: Failed password for invalid user it from 119.252.143.6 port 42974 ssh2
... show less
Jan 24 00:51:56 b146-57 sshd[3623406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreJan 24 00:51:56 b146-57 sshd[3623406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6
Jan 24 00:51:58 b146-57 sshd[3623406]: Failed password for invalid user dns from 119.252.143.6 port 39383 ssh2
Jan 24 00:53:47 b146-57 sshd[3623601]: Invalid user PlcmSpIp from 119.252.143.6 port 55562
... show less
Jan 24 08:39:21 fw01 sshd[2144178]: Invalid user server from 119.252.143.6 port 48604
Jan 24 0 ... show moreJan 24 08:39:21 fw01 sshd[2144178]: Invalid user server from 119.252.143.6 port 48604
Jan 24 08:40:52 fw01 sshd[2144429]: Invalid user steam from 119.252.143.6 port 62190
Jan 24 08:40:52 fw01 sshd[2144429]: Invalid user steam from 119.252.143.6 port 62190
... show less
Jan 24 08:27:17 fshubvidspace sshd[1639474]: Invalid user user1 from 119.252.143.6 port 46428
... show moreJan 24 08:27:17 fshubvidspace sshd[1639474]: Invalid user user1 from 119.252.143.6 port 46428
Jan 24 08:27:17 fshubvidspace sshd[1639474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6
Jan 24 08:27:17 fshubvidspace sshd[1639474]: Invalid user user1 from 119.252.143.6 port 46428
Jan 24 08:27:19 fshubvidspace sshd[1639474]: Failed password for invalid user user1 from 119.252.143.6 port 46428 ssh2
Jan 24 08:28:46 fshubvidspace sshd[1639857]: Invalid user sammy from 119.252.143.6 port 60015
... show less
Jan 24 07:58:28 fw01 sshd[2136393]: Invalid user debian from 119.252.143.6 port 13576
Jan 24 0 ... show moreJan 24 07:58:28 fw01 sshd[2136393]: Invalid user debian from 119.252.143.6 port 13576
Jan 24 08:01:39 fw01 sshd[2136901]: Invalid user deploy from 119.252.143.6 port 34279
Jan 24 08:03:12 fw01 sshd[2137149]: Invalid user ubuntu from 119.252.143.6 port 47878
Jan 24 08:04:42 fw01 sshd[2137510]: Invalid user admin from 119.252.143.6 port 61467
... show less
Jan 24 08:01:09 fshubvidspace sshd[1632817]: Invalid user deploy from 119.252.143.6 port 27789 ... show moreJan 24 08:01:09 fshubvidspace sshd[1632817]: Invalid user deploy from 119.252.143.6 port 27789
Jan 24 08:01:09 fshubvidspace sshd[1632817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6
Jan 24 08:01:09 fshubvidspace sshd[1632817]: Invalid user deploy from 119.252.143.6 port 27789
Jan 24 08:01:11 fshubvidspace sshd[1632817]: Failed password for invalid user deploy from 119.252.143.6 port 27789 ssh2
Jan 24 08:02:41 fshubvidspace sshd[1633208]: Invalid user ubuntu from 119.252.143.6 port 41386
... show less
Jan 23 21:12:11 cohoe sshd[3252208]: Failed password for invalid user tm from 119.252.143.6 port 294 ... show moreJan 23 21:12:11 cohoe sshd[3252208]: Failed password for invalid user tm from 119.252.143.6 port 29419 ssh2
Jan 23 21:16:21 cohoe sshd[3252411]: Invalid user pi from 119.252.143.6 port 54364
Jan 23 21:16:21 cohoe sshd[3252411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6
Jan 23 21:16:23 cohoe sshd[3252411]: Failed password for invalid user pi from 119.252.143.6 port 54364 ssh2
Jan 23 21:17:52 cohoe sshd[3252434]: Invalid user polaris from 119.252.143.6 port 11457
... show less
Brute-ForceSSH
Anonymous
Jan 24 05:14:35 f2b auth.info sshd[327123]: Invalid user tm from 119.252.143.6 port 23874
Jan ... show moreJan 24 05:14:35 f2b auth.info sshd[327123]: Invalid user tm from 119.252.143.6 port 23874
Jan 24 05:14:35 f2b auth.info sshd[327123]: Failed password for invalid user tm from 119.252.143.6 port 23874 ssh2
Jan 24 05:14:35 f2b auth.info sshd[327123]: Disconnected from invalid user tm 119.252.143.6 port 23874 [preauth]
... show less
Jan 24 05:02:58 vps-9 sshd[2107079]: Failed password for invalid user signage from 119.252.143.6 por ... show moreJan 24 05:02:58 vps-9 sshd[2107079]: Failed password for invalid user signage from 119.252.143.6 port 22962 ssh2
Jan 24 05:04:48 vps-9 sshd[2107189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6 user=root
Jan 24 05:04:50 vps-9 sshd[2107189]: Failed password for root from 119.252.143.6 port 38708 ssh2
... show less