This IP address has been reported a total of 26,173
times from 1,420 distinct
sources.
142.93.8.99 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2023-08-23T14:02:41.643264-07:00 oef sshd[23338]: Invalid user sergio from 142.93.8.99 port 51074<br ... show more2023-08-23T14:02:41.643264-07:00 oef sshd[23338]: Invalid user sergio from 142.93.8.99 port 51074
2023-08-23T14:02:41.646943-07:00 oef sshd[23338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99
2023-08-23T14:02:43.503287-07:00 oef sshd[23338]: Failed password for invalid user sergio from 142.93.8.99 port 51074 ssh2
... show less
Aug 23 17:35:04 pornomens sshd[753820]: Failed password for root from 142.93.8.99 port 58160 ssh2<br ... show moreAug 23 17:35:04 pornomens sshd[753820]: Failed password for root from 142.93.8.99 port 58160 ssh2
Aug 23 17:35:43 pornomens sshd[753835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 user=root
Aug 23 17:35:46 pornomens sshd[753835]: Failed password for root from 142.93.8.99 port 34100 ssh2
Aug 23 17:36:00 pornomens sshd[753837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 user=root
Aug 23 17:36:02 pornomens sshd[753837]: Failed password for root from 142.93.8.99 port 36446 ssh2
... show less
Aug 23 06:33:36 gen sshd[180237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreAug 23 06:33:36 gen sshd[180237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99
Aug 23 06:33:38 gen sshd[180237]: Failed password for invalid user yuan from 142.93.8.99 port 35488 ssh2
Aug 23 06:42:23 gen sshd[180409]: Invalid user tempie from 142.93.8.99 port 47084
... show less
Aug 22 06:47:16 v22016083778036931 sshd[3663582]: Failed password for root from 142.93.8.99 port 543 ... show moreAug 22 06:47:16 v22016083778036931 sshd[3663582]: Failed password for root from 142.93.8.99 port 54382 ssh2
Aug 22 06:47:28 v22016083778036931 sshd[3663584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 user=root
Aug 22 06:47:30 v22016083778036931 sshd[3663584]: Failed password for root from 142.93.8.99 port 56814 ssh2
... show less
(sshd) Failed SSH login from 142.93.8.99 (US/United States/-): 5 in the last 3600 secs; Ports: *; Di ... show more(sshd) Failed SSH login from 142.93.8.99 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Aug 22 03:10:39 localhost sshd[2030006]: Invalid user hrtuser from 142.93.8.99 port 48292
Aug 22 03:10:39 localhost sshd[2030006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99
Aug 22 03:10:41 localhost sshd[2030006]: Failed password for invalid user hrtuser from 142.93.8.99 port 48292 ssh2
Aug 22 03:20:07 localhost sshd[2032737]: Invalid user juliette from 142.93.8.99 port 39750
Aug 22 03:20:07 localhost sshd[2032737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 show less
Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2023-08-20T23:11:46Z and 2023-08-2 ... show moreCowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2023-08-20T23:11:46Z and 2023-08-20T23:16:02Z show less