This IP address has been reported a total of 192
times from 134 distinct
sources.
124.238.113.134 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
This IP address carried out 5 SSH credential attack (attempts) on 25-02-2025. For more information o ... show moreThis IP address carried out 5 SSH credential attack (attempts) on 25-02-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
2025-02-19 13:56:10,053 fail2ban.actions [519056]: NOTICE [pam-generic] Ban 124.238.113.134< ... show more2025-02-19 13:56:10,053 fail2ban.actions [519056]: NOTICE [pam-generic] Ban 124.238.113.134
2025-02-19 13:56:11,264 fail2ban.actions [519056]: NOTICE [sshd] Ban 124.238.113.134 show less
ThreatBook Intelligence: Scanner,Zombie more details on https://threatbook.io/ip/124.238.113.134<br ... show moreThreatBook Intelligence: Scanner,Zombie more details on https://threatbook.io/ip/124.238.113.134
2025-02-25 07:42:41 ["uname -s -m"]
2025-02-25 17:28:52 ["uname -s -m"]
2025-02-25 02:45:36 ["uname -s -m"] show less
2025-02-25T17:40:02.137865-08:00 SJC-NB sshd[858686]: Failed password for root from 124.238.113.134 ... show more2025-02-25T17:40:02.137865-08:00 SJC-NB sshd[858686]: Failed password for root from 124.238.113.134 port 44452 ssh2
2025-02-25T17:40:09.144236-08:00 SJC-NB sshd[858971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
2025-02-25T17:40:10.939220-08:00 SJC-NB sshd[858971]: Failed password for root from 124.238.113.134 port 48134 ssh2
... show less
2025-02-25T17:00:15.915704+01:00 s1 sshd[672130]: Failed password for root from 124.238.113.134 port ... show more2025-02-25T17:00:15.915704+01:00 s1 sshd[672130]: Failed password for root from 124.238.113.134 port 49642 ssh2
2025-02-25T17:00:23.641003+01:00 s1 sshd[672132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
2025-02-25T17:00:25.255144+01:00 s1 sshd[672132]: Failed password for root from 124.238.113.134 port 56686 ssh2
... show less
Feb 25 21:15:51 localhost sshd[95887]: Failed password for root from 124.238.113.134 port 33772 ssh2 ... show moreFeb 25 21:15:51 localhost sshd[95887]: Failed password for root from 124.238.113.134 port 33772 ssh2
Feb 25 21:16:05 localhost sshd[95891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 21:16:07 localhost sshd[95891]: Failed password for root from 124.238.113.134 port 38256 ssh2
... show less
Feb 25 14:14:39 4429 sshd[177177]: Failed password for root from 124.238.113.134 port 43514 ssh2<br ... show moreFeb 25 14:14:39 4429 sshd[177177]: Failed password for root from 124.238.113.134 port 43514 ssh2
Feb 25 14:15:02 4429 sshd[177195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 14:15:03 4429 sshd[177195]: Failed password for root from 124.238.113.134 port 48960 ssh2
... show less
Feb 25 07:07:21 host1 sshd[1301919]: Failed password for root from 124.238.113.134 port 38036 ssh2<b ... show moreFeb 25 07:07:21 host1 sshd[1301919]: Failed password for root from 124.238.113.134 port 38036 ssh2
Feb 25 07:07:37 host1 sshd[1301926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 07:07:39 host1 sshd[1301926]: Failed password for root from 124.238.113.134 port 42108 ssh2
Feb 25 07:08:00 host1 sshd[1301948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 07:08:02 host1 sshd[1301948]: Failed password for root from 124.238.113.134 port 50700 ssh2
... show less
Feb 25 03:08:38 det01 sshd[2376427]: Failed password for root from 124.238.113.134 port 42100 ssh2<b ... show moreFeb 25 03:08:38 det01 sshd[2376427]: Failed password for root from 124.238.113.134 port 42100 ssh2
Feb 25 03:08:54 det01 sshd[2376429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 03:08:56 det01 sshd[2376429]: Failed password for root from 124.238.113.134 port 47598 ssh2
Feb 25 03:09:24 det01 sshd[2376431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 03:09:26 det01 sshd[2376431]: Failed password for root from 124.238.113.134 port 56918 ssh2
... show less
Feb 25 00:53:22 router sshd[68294]: Failed password for root from 124.238.113.134 port 36860 ssh2<br ... show moreFeb 25 00:53:22 router sshd[68294]: Failed password for root from 124.238.113.134 port 36860 ssh2
Feb 25 00:53:27 router sshd[68296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 00:53:29 router sshd[68296]: Failed password for root from 124.238.113.134 port 40208 ssh2
Feb 25 00:53:46 router sshd[68300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 00:53:48 router sshd[68300]: Failed password for root from 124.238.113.134 port 48206 ssh2
... show less
Feb 25 01:24:12 athena sshd[824786]: Failed password for root from 124.238.113.134 port 45936 ssh2<b ... show moreFeb 25 01:24:12 athena sshd[824786]: Failed password for root from 124.238.113.134 port 45936 ssh2
Feb 25 01:24:15 athena sshd[824848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 01:24:16 athena sshd[824848]: Failed password for root from 124.238.113.134 port 52980 ssh2
Feb 25 01:24:21 athena sshd[824889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.134 user=root
Feb 25 01:24:23 athena sshd[824889]: Failed password for root from 124.238.113.134 port 57224 ssh2
... show less