This IP address has been reported a total of 85
times from 61 distinct
sources.
142.93.219.213 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-06T00:46:46.995163+01:00 groves sshd[687093]: Invalid user test from 142.93.219.213 port 445 ... show more2024-11-06T00:46:46.995163+01:00 groves sshd[687093]: Invalid user test from 142.93.219.213 port 44570
2024-11-06T00:46:47.345545+01:00 groves sshd[687093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T00:46:49.573839+01:00 groves sshd[687093]: Failed password for invalid user test from 142.93.219.213 port 44570 ssh2
... show less
Nov 6 00:45:26 [redacted] sshd[1552439]: Failed password for root from 142.93.219.213 port 53144 ss ... show moreNov 6 00:45:26 [redacted] sshd[1552439]: Failed password for root from 142.93.219.213 port 53144 ssh2
Nov 6 00:46:48 [redacted] sshd[1552450]: Invalid user test from 142.93.219.213 port 41986
... show less
2024-11-05T20:38:50.030687-03:00 dns1 sshd[32640]: Failed password for invalid user nagios from 142. ... show more2024-11-05T20:38:50.030687-03:00 dns1 sshd[32640]: Failed password for invalid user nagios from 142.93.219.213 port 58228 ssh2
2024-11-05T20:38:50.563790-03:00 dns1 sshd[32640]: Connection closed by invalid user nagios 142.93.219.213 port 58228 [preauth]
2024-11-05T20:38:52.486990-03:00 dns1 sshd[32643]: Invalid user jack from 142.93.219.213 port 38128
2024-11-05T20:38:52.909257-03:00 dns1 sshd[32643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-05T20:38:55.267185-03:00 dns1 sshd[32643]: Failed password for invalid user jack from 142.93.219.213 port 38128 ssh2 show less
2024-11-05T20:18:22.014841-03:00 dns1 sshd[32527]: Connection closed by authenticating user root 142 ... show more2024-11-05T20:18:22.014841-03:00 dns1 sshd[32527]: Connection closed by authenticating user root 142.93.219.213 port 41210 [preauth]
2024-11-05T20:18:23.200576-03:00 dns1 sshd[32529]: Invalid user ethnode from 142.93.219.213 port 49342
2024-11-05T20:18:23.595098-03:00 dns1 sshd[32529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-05T20:18:25.559959-03:00 dns1 sshd[32529]: Failed password for invalid user ethnode from 142.93.219.213 port 49342 ssh2
2024-11-05T20:18:27.148184-03:00 dns1 sshd[32529]: Connection closed by invalid user ethnode 142.93.219.213 port 49342 [preauth] show less
2024-11-05T19:56:38.427265-03:00 dns1 sshd[32410]: Failed password for root from 142.93.219.213 port ... show more2024-11-05T19:56:38.427265-03:00 dns1 sshd[32410]: Failed password for root from 142.93.219.213 port 52168 ssh2
2024-11-05T19:56:39.874455-03:00 dns1 sshd[32410]: Connection closed by authenticating user root 142.93.219.213 port 52168 [preauth]
2024-11-05T19:58:02.098644-03:00 dns1 sshd[32414]: Invalid user test from 142.93.219.213 port 48592
2024-11-05T19:58:02.844812-03:00 dns1 sshd[32414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-05T19:58:04.854515-03:00 dns1 sshd[32414]: Failed password for invalid user test from 142.93.219.213 port 48592 ssh2 show less
2024-11-05T23:12:52.032507+01:00 srv1 sshd[3422082]: pam_unix(sshd:auth): authentication failure; lo ... show more2024-11-05T23:12:52.032507+01:00 srv1 sshd[3422082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-05T23:12:53.673071+01:00 srv1 sshd[3422082]: Failed password for invalid user test from 142.93.219.213 port 40132 ssh2
2024-11-05T23:12:56.423437+01:00 srv1 sshd[3422151]: Invalid user admin from 142.93.219.213 port 45970
2024-11-05T23:12:56.575736+01:00 srv1 sshd[3422151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-05T23:12:59.101170+01:00 srv1 sshd[3422151]: Failed password for invalid user admin from 142.93.219.213 port 45970 ssh2
... show less
Nov 5 23:12:49 monitoring sshd[587119]: Failed password for invalid user test from 142.93.219.213 p ... show moreNov 5 23:12:49 monitoring sshd[587119]: Failed password for invalid user test from 142.93.219.213 port 53052 ssh2
Nov 5 23:12:52 monitoring sshd[587158]: Invalid user admin from 142.93.219.213 port 58890
Nov 5 23:12:52 monitoring sshd[587158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 5 23:12:52 monitoring sshd[587158]: Invalid user admin from 142.93.219.213 port 58890
Nov 5 23:12:54 monitoring sshd[587158]: Failed password for invalid user admin from 142.93.219.213 port 58890 ssh2
... show less
Nov 5 21:24:17 dabeau sshd[10242]: Invalid user test from 142.93.219.213 port 37232
Nov 5 21 ... show moreNov 5 21:24:17 dabeau sshd[10242]: Invalid user test from 142.93.219.213 port 37232
Nov 5 21:24:17 dabeau sshd[10242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 5 21:24:18 dabeau sshd[10242]: Failed password for invalid user test from 142.93.219.213 port 37232 ssh2
... show less