This IP address has been reported a total of 186
times from 117 distinct
sources.
152.42.228.134 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jul 15 07:12:53 instance-20221219-1303 sshd[1501821]: Invalid user sftpuser from 152.42.228.134 port ... show moreJul 15 07:12:53 instance-20221219-1303 sshd[1501821]: Invalid user sftpuser from 152.42.228.134 port 50356
... show less
Jul 15 06:56:52 instance-20221219-1303 sshd[1501472]: Invalid user postgres from 152.42.228.134 port ... show moreJul 15 06:56:52 instance-20221219-1303 sshd[1501472]: Invalid user postgres from 152.42.228.134 port 57578
... show less
2024-07-15T09:19:14.032024 dreamhosting sshd[4693]: Invalid user deploy from 152.42.228.134 port 374 ... show more2024-07-15T09:19:14.032024 dreamhosting sshd[4693]: Invalid user deploy from 152.42.228.134 port 37402
2024-07-15T09:19:14.036274 dreamhosting sshd[4693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.42.228.134
2024-07-15T09:19:15.658247 dreamhosting sshd[4693]: Failed password for invalid user deploy from 152.42.228.134 port 37402 ssh2
2024-07-15T09:20:06.113427 dreamhosting sshd[9220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.42.228.134 user=root
2024-07-15T09:20:07.539405 dreamhosting sshd[9220]: Failed password for root from 152.42.228.134 port 51896 ssh2
... show less
Jul 15 00:15:23 b146-05 sshd[1566045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreJul 15 00:15:23 b146-05 sshd[1566045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.42.228.134
Jul 15 00:15:25 b146-05 sshd[1566045]: Failed password for invalid user student1 from 152.42.228.134 port 54442 ssh2
Jul 15 00:19:35 b146-05 sshd[1566622]: Invalid user deploy from 152.42.228.134 port 54610
... show less
Brute-ForceSSH
Anonymous
152.42.228.134 (US/United States/-), 6 distributed sshd attacks on account [root] in the last 3600 s ... show more152.42.228.134 (US/United States/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Jul 15 01:03:03 server2 sshd[3832]: Failed password for root from 212.113.102.134 port 37456 ssh2
Jul 15 01:03:15 server2 sshd[3951]: Failed password for root from 43.153.194.238 port 48724 ssh2
Jul 15 01:03:17 server2 sshd[3960]: Failed password for root from 212.113.102.134 port 58670 ssh2
Jul 15 01:03:37 server2 sshd[4048]: Failed password for root from 152.42.228.134 port 40428 ssh2
Jul 15 01:03:30 server2 sshd[4026]: Failed password for root from 212.113.102.134 port 59466 ssh2
Jul 15 01:03:21 server2 sshd[3998]: Failed password for root from 181.231.80.71 port 40678 ssh2
IP Addresses Blocked:
212.113.102.134 (RU/Russia/-)
43.153.194.238 (JP/Japan/-) show less
Jul 14 23:53:35 ip-172-31-0-5 sshd[3565588]: Invalid user user from 152.42.228.134 port 57882
... show moreJul 14 23:53:35 ip-172-31-0-5 sshd[3565588]: Invalid user user from 152.42.228.134 port 57882
Jul 14 23:57:14 ip-172-31-0-5 sshd[3577290]: Invalid user test12 from 152.42.228.134 port 42210
Jul 14 23:59:06 ip-172-31-0-5 sshd[3578025]: Invalid user dev from 152.42.228.134 port 45450
Jul 15 00:01:50 ip-172-31-0-5 sshd[3579632]: Invalid user test from 152.42.228.134 port 55508
Jul 15 00:02:50 ip-172-31-0-5 sshd[3579991]: Invalid user testftp from 152.42.228.134 port 51456
... show less