This IP address has been reported a total of 1,627
times from 413 distinct
sources.
193.122.108.42 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
May 4 23:38:57 mail sshd[888750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreMay 4 23:38:57 mail sshd[888750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 4 23:38:59 mail sshd[888750]: Failed password for invalid user abraham from 193.122.108.42 port 41672 ssh2
May 4 23:41:01 mail sshd[889174]: Invalid user v from 193.122.108.42 port 33026
May 4 23:41:01 mail sshd[889174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 4 23:41:04 mail sshd[889174]: Failed password for invalid user v from 193.122.108.42 port 33026 ssh2
... show less
May 4 23:18:38 localhost sshd[3094077]: Failed password for invalid user elisa from 193.122.108.42 ... show moreMay 4 23:18:38 localhost sshd[3094077]: Failed password for invalid user elisa from 193.122.108.42 port 44918 ssh2
May 4 23:22:37 localhost sshd[3094107]: Invalid user nexus from 193.122.108.42 port 56006
May 4 23:22:37 localhost sshd[3094107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 4 23:22:39 localhost sshd[3094107]: Failed password for invalid user nexus from 193.122.108.42 port 56006 ssh2
May 4 23:24:50 localhost sshd[3094110]: Invalid user kevin from 193.122.108.42 port 47364
... show less
Brute-ForceSSH
Anonymous
May 4 23:17:05 mail sshd[886917]: Failed password for invalid user elisa from 193.122.108.42 port 6 ... show moreMay 4 23:17:05 mail sshd[886917]: Failed password for invalid user elisa from 193.122.108.42 port 60842 ssh2
May 4 23:22:14 mail sshd[887360]: Invalid user nexus from 193.122.108.42 port 54372
May 4 23:22:14 mail sshd[887360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 4 23:22:15 mail sshd[887360]: Failed password for invalid user nexus from 193.122.108.42 port 54372 ssh2
May 4 23:24:25 mail sshd[887379]: Invalid user kevin from 193.122.108.42 port 45730
... show less
May 5 00:14:18 host1 sshd[306159]: Invalid user zs from 193.122.108.42 port 58504
May 5 00:1 ... show moreMay 5 00:14:18 host1 sshd[306159]: Invalid user zs from 193.122.108.42 port 58504
May 5 00:14:18 host1 sshd[306159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 5 00:14:18 host1 sshd[306159]: Invalid user zs from 193.122.108.42 port 58504
May 5 00:14:21 host1 sshd[306159]: Failed password for invalid user zs from 193.122.108.42 port 58504 ssh2
May 5 00:18:39 host1 sshd[306524]: Invalid user usuario1 from 193.122.108.42 port 42272
... show less
May 04 17:14:09 askasleikir sshd[8858]: Failed password for invalid user zs from 193.122.108.42 port ... show moreMay 04 17:14:09 askasleikir sshd[8858]: Failed password for invalid user zs from 193.122.108.42 port 42546 ssh2
May 04 17:08:51 askasleikir sshd[8830]: Failed password for invalid user test1 from 193.122.108.42 port 46346 ssh2 show less
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 193.122.108.42 (KR/South Korea/Seoul/Seoul/-)
2022-05-04T12:03:29.197138home-v098.sailx.co sshd[246770]: Failed password for root from 193.122.108 ... show more2022-05-04T12:03:29.197138home-v098.sailx.co sshd[246770]: Failed password for root from 193.122.108.42 port 36260 ssh2
2022-05-04T12:05:46.436780home-v098.sailx.co sshd[246798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
2022-05-04T12:05:48.156436home-v098.sailx.co sshd[246798]: Failed password for root from 193.122.108.42 port 56462 ssh2
2022-05-04T12:08:08.436326home-v098.sailx.co sshd[246810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
2022-05-04T12:08:10.316642home-v098.sailx.co sshd[246810]: Failed password for root from 193.122.108.42 port 48424 ssh2
... show less
May 4 18:44:22 ns04 sshd[1644131]: Failed password for invalid user rajesh from 193.122.108.42 port ... show moreMay 4 18:44:22 ns04 sshd[1644131]: Failed password for invalid user rajesh from 193.122.108.42 port 36640 ssh2
May 4 18:46:26 ns04 sshd[1644174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
May 4 18:46:28 ns04 sshd[1644174]: Failed password for root from 193.122.108.42 port 56404 ssh2
May 4 18:48:32 ns04 sshd[1644240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
May 4 18:48:33 ns04 sshd[1644240]: Failed password for root from 193.122.108.42 port 47942 ssh2
... show less
May 4 18:29:47 ns04 sshd[1643858]: Failed password for invalid user teamspeak3 from 193.122.108.42 ... show moreMay 4 18:29:47 ns04 sshd[1643858]: Failed password for invalid user teamspeak3 from 193.122.108.42 port 39432 ssh2
May 4 18:31:51 ns04 sshd[1643914]: Invalid user hadoop from 193.122.108.42 port 59198
May 4 18:31:51 ns04 sshd[1643914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 4 18:31:51 ns04 sshd[1643914]: Invalid user hadoop from 193.122.108.42 port 59198
May 4 18:31:54 ns04 sshd[1643914]: Failed password for invalid user hadoop from 193.122.108.42 port 59198 ssh2
... show less
May 4 18:00:10 ns04 sshd[1643217]: Invalid user isa from 193.122.108.42 port 44956
May 4 18: ... show moreMay 4 18:00:10 ns04 sshd[1643217]: Invalid user isa from 193.122.108.42 port 44956
May 4 18:00:10 ns04 sshd[1643217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 4 18:00:10 ns04 sshd[1643217]: Invalid user isa from 193.122.108.42 port 44956
May 4 18:00:12 ns04 sshd[1643217]: Failed password for invalid user isa from 193.122.108.42 port 44956 ssh2
May 4 18:02:12 ns04 sshd[1643300]: Invalid user play from 193.122.108.42 port 36496
... show less
Brute-ForceSSH
Anonymous
May 4 15:50:27 bgvacc sshd[2640947]: Invalid user postgres from 193.122.108.42 port 40206
May ... show moreMay 4 15:50:27 bgvacc sshd[2640947]: Invalid user postgres from 193.122.108.42 port 40206
May 4 15:50:29 bgvacc sshd[2640947]: Failed password for invalid user postgres from 193.122.108.42 port 40206 ssh2
... show less
May 4 16:39:53 raison sshd[28601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreMay 4 16:39:53 raison sshd[28601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 4 16:39:55 raison sshd[28601]: Failed password for invalid user speedtest from 193.122.108.42 port 58768 ssh2
May 4 16:46:33 raison sshd[28875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
... show less
May 4 14:40:15 controldedominiosdg sshd[27933]: Invalid user test from 193.122.108.42 port 43168<br ... show moreMay 4 14:40:15 controldedominiosdg sshd[27933]: Invalid user test from 193.122.108.42 port 43168
May 4 14:40:15 controldedominiosdg sshd[27933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42
May 4 14:40:17 controldedominiosdg sshd[27933]: Failed password for invalid user test from 193.122.108.42 port 43168 ssh2
... show less
May 2 10:43:01 Linux02 sshd[3040971]: Failed password for r.r from 193.122.108.42 port 36058 ssh2<b ... show moreMay 2 10:43:01 Linux02 sshd[3040971]: Failed password for r.r from 193.122.108.42 port 36058 ssh2
May 2 10:45:42 Linux02 sshd[3054429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=r.r
May 2 10:45:44 Linux02 sshd[3054429]: Failed password for r.r from 193.122.108.42 port 59384 ssh2
May 2 10:48:22 Linux02 sshd[3067852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=r.r
May 2 10:48:24 Linux02 sshd[3067852]: Failed password for r.r from 193.122.108.42 port 54484 ssh2
May 2 10:51:06 Linux02 sshd[3082014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=r.r
May 2 10:51:08 Linux02 sshd[3082014]: Failed password for r.r from 193.122.108.42 port 49566 ssh2
May 2 10:53:56 Linux02 sshd[3096162]: AD user nmsguest from 193.122.108.42 port 44660
May 2 10:53:56 Linux02 sshd[3096162]: pam_uni........
------------------------------ show less
May 4 21:02:25 web1 sshd[9910]: Failed password for root from 193.122.108.42 port 55262 ssh2
... show moreMay 4 21:02:25 web1 sshd[9910]: Failed password for root from 193.122.108.42 port 55262 ssh2
May 4 21:04:14 web1 sshd[10879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
May 4 21:04:15 web1 sshd[10879]: Failed password for root from 193.122.108.42 port 43012 ssh2
May 4 21:06:00 web1 sshd[11553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
May 4 21:06:02 web1 sshd[11553]: Failed password for root from 193.122.108.42 port 58984 ssh2
... show less