This IP address has been reported a total of 704
times from 416 distinct
sources.
142.93.129.88 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Sep 29 11:05:47 mailstore sshd[3991560]: Connection closed by 142.93.129.88 port 54434
Sep 29 ... show moreSep 29 11:05:47 mailstore sshd[3991560]: Connection closed by 142.93.129.88 port 54434
Sep 29 11:06:12 mailstore sshd[3991566]: Invalid user jito from 142.93.129.88 port 38946
Sep 29 11:06:25 mailstore sshd[3991568]: Invalid user fil from 142.93.129.88 port 43672
Sep 29 11:06:37 mailstore sshd[3991573]: Invalid user fil from 142.93.129.88 port 48396
... show less
Sep 29 17:06:05 raspberrypi sshd[329354]: Invalid user jito from 142.93.129.88 port 41758
Sep ... show moreSep 29 17:06:05 raspberrypi sshd[329354]: Invalid user jito from 142.93.129.88 port 41758
Sep 29 17:06:05 raspberrypi sshd[329354]: Connection closed by invalid user jito 142.93.129.88 port 41758 [preauth]
Sep 29 17:06:19 raspberrypi sshd[329359]: Invalid user fil from 142.93.129.88 port 46484
Sep 29 17:06:20 raspberrypi sshd[329359]: Connection closed by invalid user fil 142.93.129.88 port 46484 [preauth]
Sep 29 17:06:31 raspberrypi sshd[329362]: Invalid user fil from 142.93.129.88 port 51210
... show less
2024-09-29T10:06:13.141497-05:00 nio.local.lan sshd[64651]: Invalid user jito from 142.93.129.88 por ... show more2024-09-29T10:06:13.141497-05:00 nio.local.lan sshd[64651]: Invalid user jito from 142.93.129.88 port 38258
2024-09-29T10:06:14.138028-05:00 nio.local.lan sshd[64651]: Connection closed by invalid user jito 142.93.129.88 port 38258 [preauth]
... show less
Dec 17 15:16:02 controldedominiosdg sshd[6031]: pam_unix(sshd:auth): authentication failure; logname ... show moreDec 17 15:16:02 controldedominiosdg sshd[6031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.129.88 user=root
Dec 17 15:16:04 controldedominiosdg sshd[6031]: Failed password for root from 142.93.129.88 port 48648 ssh2
Dec 17 15:24:49 controldedominiosdg sshd[6264]: Invalid user ubuntu from 142.93.129.88 port 33746
Dec 17 15:24:49 controldedominiosdg sshd[6264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.129.88
Dec 17 15:24:51 controldedominiosdg sshd[6264]: Failed password for invalid user ubuntu from 142.93.129.88 port 33746 ssh2
... show less
Dec 16 21:35:12 Linux04 sshd[2186648]: Invalid user ec2-user from 142.93.129.88 port 37496
Dec ... show moreDec 16 21:35:12 Linux04 sshd[2186648]: Invalid user ec2-user from 142.93.129.88 port 37496
Dec 16 21:35:12 Linux04 sshd[2186648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.129.88
Dec 16 21:35:14 Linux04 sshd[2186648]: Failed password for invalid user ec2-user from 142.93.129.88 port 37496 ssh2
Dec 16 21:43:49 Linux04 sshd[2232451]: Invalid user proxmox from 142.93.129.88 port 60440
Dec 16 21:43:49 Linux04 sshd[2232451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.129.88
Dec 16 21:43:52 Linux04 sshd[2232451]: Failed password for invalid user proxmox from 142.93.129.88 port 60440 ssh2
Dec 16 21:52:27 Linux04 sshd[2299845]: Invalid user tomcat from 142.93.129.88 port 55152
Dec 16 21:52:27 Linux04 sshd[2299845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.129.88
Dec 16 21:52:29 Linux04 sshd[2299845]: Failed password for invalid user t
... show less