This IP address has been reported a total of 85
times from 61 distinct
sources.
142.93.219.213 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 6 02:42:38 vps-9 sshd[3242976]: Invalid user sol from 142.93.219.213 port 33392
Nov 6 02 ... show moreNov 6 02:42:38 vps-9 sshd[3242976]: Invalid user sol from 142.93.219.213 port 33392
Nov 6 02:42:38 vps-9 sshd[3242976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 6 02:42:40 vps-9 sshd[3242976]: Failed password for invalid user sol from 142.93.219.213 port 33392 ssh2
... show less
Nov 6 02:27:28 vps-9 sshd[3240467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreNov 6 02:27:28 vps-9 sshd[3240467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 6 02:27:31 vps-9 sshd[3240467]: Failed password for invalid user user1 from 142.93.219.213 port 37226 ssh2
Nov 6 02:27:32 vps-9 sshd[3240469]: Invalid user palworld from 142.93.219.213 port 42716
... show less
Nov 6 02:12:21 vps-9 sshd[3238187]: Invalid user test from 142.93.219.213 port 41056
Nov 6 0 ... show moreNov 6 02:12:21 vps-9 sshd[3238187]: Invalid user test from 142.93.219.213 port 41056
Nov 6 02:12:22 vps-9 sshd[3238187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 6 02:12:24 vps-9 sshd[3238187]: Failed password for invalid user test from 142.93.219.213 port 41056 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-11-06T03:11:03.019160+01:00 svr10 sshd[2890526]: pam_unix(sshd:auth): authentication failure; l ... show more2024-11-06T03:11:03.019160+01:00 svr10 sshd[2890526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213 user=root
2024-11-06T03:11:04.563729+01:00 svr10 sshd[2890526]: Failed password for root from 142.93.219.213 port 35406 ssh2
2024-11-06T03:11:05.363825+01:00 svr10 sshd[2890526]: Connection closed by authenticating user root 142.93.219.213 port 35406 [preauth]
... show less
Nov 5 17:34:09 b146-36 sshd[21027]: Invalid user test from 142.93.219.213 port 36918
Nov 5 1 ... show moreNov 5 17:34:09 b146-36 sshd[21027]: Invalid user test from 142.93.219.213 port 36918
Nov 5 17:34:10 b146-36 sshd[21027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 5 17:34:12 b146-36 sshd[21027]: Failed password for invalid user test from 142.93.219.213 port 36918 ssh2
... show less
Report 1425130 with IP 2472680 for SSH brute-force attack by source 2467355 via ssh-honeypot/0.2.0+h ... show moreReport 1425130 with IP 2472680 for SSH brute-force attack by source 2467355 via ssh-honeypot/0.2.0+http show less