This IP address has been reported a total of 26,173
times from 1,420 distinct
sources.
142.93.8.99 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Aug 20 21:53:15 RP2 sshd[511725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreAug 20 21:53:15 RP2 sshd[511725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 user=root
Aug 20 21:53:17 RP2 sshd[511725]: Failed password for root from 142.93.8.99 port 54444 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 20 17:50:02 con01 sshd[591315]: Invalid user emil from 142.93.8.99 port 46736
Aug 20 17:50 ... show moreAug 20 17:50:02 con01 sshd[591315]: Invalid user emil from 142.93.8.99 port 46736
Aug 20 17:50:02 con01 sshd[591315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99
Aug 20 17:50:02 con01 sshd[591315]: Invalid user emil from 142.93.8.99 port 46736
Aug 20 17:50:04 con01 sshd[591315]: Failed password for invalid user emil from 142.93.8.99 port 46736 ssh2
Aug 20 17:50:19 con01 sshd[592177]: Invalid user temp123 from 142.93.8.99 port 48986
... show less
(sshd) Failed SSH login from 142.93.8.99 (US/United States/-): 5 in the last 3600 secs; Ports: *; Di ... show more(sshd) Failed SSH login from 142.93.8.99 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 20 18:08:07 s1 sshd[30428]: Invalid user michael from 142.93.8.99 port 39980
Aug 20 18:08:10 s1 sshd[30428]: Failed password for invalid user michael from 142.93.8.99 port 39980 ssh2
Aug 20 18:18:47 s1 sshd[530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 user=root
Aug 20 18:18:49 s1 sshd[530]: Failed password for root from 142.93.8.99 port 36816 ssh2
Aug 20 18:19:01 s1 sshd[637]: Invalid user ftpuser from 142.93.8.99 port 39362 show less
Aug 20 14:45:06 Digitalogic sshd[66945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreAug 20 14:45:06 Digitalogic sshd[66945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99
Aug 20 14:45:07 Digitalogic sshd[66945]: Failed password for invalid user tammie from 142.93.8.99 port 38138 ssh2
Aug 20 14:45:08 Digitalogic sshd[66945]: Disconnected from invalid user tammie 142.93.8.99 port 38138 [preauth]
... show less
Aug 20 09:12:55 pornomens sshd[739294]: Invalid user mud from 142.93.8.99 port 39498
Aug 20 09 ... show moreAug 20 09:12:55 pornomens sshd[739294]: Invalid user mud from 142.93.8.99 port 39498
Aug 20 09:12:55 pornomens sshd[739294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99
Aug 20 09:12:57 pornomens sshd[739294]: Failed password for invalid user mud from 142.93.8.99 port 39498 ssh2
Aug 20 09:14:45 pornomens sshd[739308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 user=root
Aug 20 09:14:47 pornomens sshd[739308]: Failed password for root from 142.93.8.99 port 49712 ssh2
... show less
Aug 19 09:50:38 thevastnessof sshd[135462]: Failed password for invalid user tomcat from 142.93.8.99 ... show moreAug 19 09:50:38 thevastnessof sshd[135462]: Failed password for invalid user tomcat from 142.93.8.99 port 56156 ssh2
Aug 19 09:50:49 thevastnessof sshd[135504]: Connection from 142.93.8.99 port 58678 on 172.105.171.124 port 2222 rdomain ""
Aug 19 09:50:50 thevastnessof sshd[135504]: Invalid user sockduser from 142.93.8.99 port 58678
Aug 19 09:50:50 thevastnessof sshd[135504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99
Aug 19 09:50:52 thevastnessof sshd[135504]: Failed password for invalid user sockduser from 142.93.8.99 port 58678 ssh2
... show less