This IP address has been reported a total of 85
times from 61 distinct
sources.
142.93.219.213 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 6 09:24:36 vps-3cf7b8c3 sshd[2291695]: Invalid user test from 142.93.219.213 port 40302
N ... show moreNov 6 09:24:36 vps-3cf7b8c3 sshd[2291695]: Invalid user test from 142.93.219.213 port 40302
Nov 6 09:24:36 vps-3cf7b8c3 sshd[2291695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 6 09:24:38 vps-3cf7b8c3 sshd[2291695]: Failed password for invalid user test from 142.93.219.213 port 40302 ssh2
... show less
Nov 6 09:23:10 fail2ban sshd[919625]: Failed password for root from 142.93.219.213 port 56932 ssh2< ... show moreNov 6 09:23:10 fail2ban sshd[919625]: Failed password for root from 142.93.219.213 port 56932 ssh2
Nov 6 09:24:34 fail2ban sshd[919640]: Invalid user test from 142.93.219.213 port 58226
... show less
Nov 6 07:48:36 noiseless-sink sshd[2424966]: pam_unix(sshd:auth): authentication failure; logname= ... show moreNov 6 07:48:36 noiseless-sink sshd[2424966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 6 07:48:37 noiseless-sink sshd[2424966]: Failed password for invalid user test from 142.93.219.213 port 49298 ssh2
Nov 6 07:48:41 noiseless-sink sshd[2424968]: Invalid user admin from 142.93.219.213 port 57632
Nov 6 07:48:41 noiseless-sink sshd[2424968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 6 07:48:43 noiseless-sink sshd[2424968]: Failed password for invalid user admin from 142.93.219.213 port 57632 ssh2
... show less
Nov 6 07:47:15 dev sshd[703694]: Failed password for root from 142.93.219.213 port 34722 ssh2 ... show moreNov 6 07:47:15 dev sshd[703694]: Failed password for root from 142.93.219.213 port 34722 ssh2
Nov 6 07:48:37 dev sshd[703700]: Invalid user test from 142.93.219.213 port 50086
... show less
Brute-ForceSSH
Anonymous
2024-11-06T08:47:08.246288+01:00 svr10 sshd[3139590]: pam_unix(sshd:auth): authentication failure; l ... show more2024-11-06T08:47:08.246288+01:00 svr10 sshd[3139590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213 user=root
2024-11-06T08:47:10.093706+01:00 svr10 sshd[3139590]: Failed password for root from 142.93.219.213 port 51144 ssh2
2024-11-06T08:47:10.607508+01:00 svr10 sshd[3139590]: Connection closed by authenticating user root 142.93.219.213 port 51144 [preauth]
... show less
2024-11-06T07:58:51.965395 pclab24.pl sshd[3698047]: Failed password for test from 142.93.219.213 po ... show more2024-11-06T07:58:51.965395 pclab24.pl sshd[3698047]: Failed password for test from 142.93.219.213 port 58034 ssh2
2024-11-06T07:58:55.116830 pclab24.pl sshd[3698066]: Invalid user admin from 142.93.219.213 port 38348
2024-11-06T07:58:55.372314 pclab24.pl sshd[3698066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T07:58:57.729557 pclab24.pl sshd[3698066]: Failed password for invalid user admin from 142.93.219.213 port 38348 ssh2
2024-11-06T07:59:00.331078 pclab24.pl sshd[3698083]: Invalid user omsagent from 142.93.219.213 port 46894
... show less