This IP address has been reported a total of 707
times from 264 distinct
sources.
173.242.117.138 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
2025-02-14T12:40:35.478823+00:00 logger sshd[3562364]: pam_unix(sshd:auth): authentication failure; ... show more2025-02-14T12:40:35.478823+00:00 logger sshd[3562364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138 user=root
2025-02-14T12:40:37.647343+00:00 logger sshd[3562364]: Failed password for root from 173.242.117.138 port 53356 ssh2
... show less
2025-02-14T10:28:29.236015+02:00 wolfemium sshd[3596339]: Failed password for root from 173.242.117. ... show more2025-02-14T10:28:29.236015+02:00 wolfemium sshd[3596339]: Failed password for root from 173.242.117.138 port 34984 ssh2
2025-02-14T10:29:47.466736+02:00 wolfemium sshd[3596524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138 user=root
2025-02-14T10:29:49.478174+02:00 wolfemium sshd[3596524]: Failed password for root from 173.242.117.138 port 34882 ssh2
2025-02-14T10:29:56.471106+02:00 wolfemium sshd[3596446]: Invalid user wang from 173.242.117.138 port 58532
2025-02-14T10:30:09.367628+02:00 wolfemium sshd[3596423]: Invalid user hive from 173.242.117.138 port 38416
... show less
IN01-DRDP-HYD: Blocked by Fail2Ban for SSH Brute Force from 173.242.117.138 at 2025-02-14 01:36:08 U ... show moreIN01-DRDP-HYD: Blocked by Fail2Ban for SSH Brute Force from 173.242.117.138 at 2025-02-14 01:36:08 UTC show less
Brute-ForceSSH
Anonymous
2025-02-14T01:20:30.938167+00:00 Kiyoi sshd[234462]: Failed password for root from 173.242.117.138 p ... show more2025-02-14T01:20:30.938167+00:00 Kiyoi sshd[234462]: Failed password for root from 173.242.117.138 port 56694 ssh2
2025-02-14T01:24:33.203678+00:00 Kiyoi sshd[234949]: Invalid user pi from 173.242.117.138 port 45148
2025-02-14T01:24:48.988690+00:00 Kiyoi sshd[234949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138
2025-02-14T01:24:51.095140+00:00 Kiyoi sshd[234949]: Failed password for invalid user pi from 173.242.117.138 port 45148 ssh2
2025-02-14T01:28:48.193736+00:00 Kiyoi sshd[235491]: Invalid user hive from 173.242.117.138 port 57186
... show less
Feb 14 00:40:28 dsh1621 sshd[3928248]: Failed password for root from 173.242.117.138 port 40074 ssh2 ... show moreFeb 14 00:40:28 dsh1621 sshd[3928248]: Failed password for root from 173.242.117.138 port 40074 ssh2
Feb 14 00:40:50 dsh1621 sshd[3928391]: Invalid user oracle from 173.242.117.138 port 45826
Feb 14 00:40:58 dsh1621 sshd[3928391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138
Feb 14 00:41:00 dsh1621 sshd[3928391]: Failed password for invalid user oracle from 173.242.117.138 port 45826 ssh2
Feb 14 00:41:23 dsh1621 sshd[3928823]: Invalid user rabbitmq from 173.242.117.138 port 59486
... show less
Feb 14 00:16:31 dsh1621 sshd[3912734]: Failed password for invalid user ubnt from 173.242.117.138 po ... show moreFeb 14 00:16:31 dsh1621 sshd[3912734]: Failed password for invalid user ubnt from 173.242.117.138 port 59350 ssh2
Feb 14 00:16:42 dsh1621 sshd[3912831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138
Feb 14 00:16:44 dsh1621 sshd[3912831]: Failed password for invalid user nvidia from 173.242.117.138 port 37692 ssh2
Feb 14 00:17:11 dsh1621 sshd[3913484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138 user=root
Feb 14 00:17:14 dsh1621 sshd[3913484]: Failed password for root from 173.242.117.138 port 58770 ssh2
... show less
Feb 13 23:52:40 dsh1621 sshd[3897548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreFeb 13 23:52:40 dsh1621 sshd[3897548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138
Feb 13 23:52:42 dsh1621 sshd[3897548]: Failed password for invalid user bigdata from 173.242.117.138 port 54612 ssh2
Feb 13 23:53:06 dsh1621 sshd[3897781]: Invalid user plex from 173.242.117.138 port 41424
Feb 13 23:53:06 dsh1621 sshd[3897718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138
Feb 13 23:53:08 dsh1621 sshd[3897718]: Failed password for invalid user oracle from 173.242.117.138 port 34352 ssh2
... show less
Feb 13 23:24:28 dsh1621 sshd[3879695]: Failed password for root from 173.242.117.138 port 59620 ssh2 ... show moreFeb 13 23:24:28 dsh1621 sshd[3879695]: Failed password for root from 173.242.117.138 port 59620 ssh2
Feb 13 23:24:35 dsh1621 sshd[3880033]: Invalid user pi from 173.242.117.138 port 33372
Feb 13 23:24:48 dsh1621 sshd[3880033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138
Feb 13 23:24:49 dsh1621 sshd[3880033]: Failed password for invalid user pi from 173.242.117.138 port 33372 ssh2
Feb 13 23:25:42 dsh1621 sshd[3880359]: Invalid user hive from 173.242.117.138 port 60992
... show less
Brute-ForceSSH
Anonymous
2025-02-13T22:23:51.855710+00:00 xmr sshd[185479]: pam_unix(sshd:auth): authentication failure; logn ... show more2025-02-13T22:23:51.855710+00:00 xmr sshd[185479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.117.138 user=root
2025-02-13T22:23:53.487478+00:00 xmr sshd[185479]: Failed password for root from 173.242.117.138 port 52684 ssh2
... show less