This IP address has been reported a total of 1,627
times from 413 distinct
sources.
193.122.108.42 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2022-05-02T22:16:02.989006suse-nuc sshd[18483]: User root from 193.122.108.42 not allowed because no ... show more2022-05-02T22:16:02.989006suse-nuc sshd[18483]: User root from 193.122.108.42 not allowed because not listed in AllowUsers
... show less
2022-05-02T18:28:09.381111server2.ebullit.com sshd[32925]: Failed password for root from 193.122.108 ... show more2022-05-02T18:28:09.381111server2.ebullit.com sshd[32925]: Failed password for root from 193.122.108.42 port 47290 ssh2
2022-05-02T18:33:57.322507server2.ebullit.com sshd[37091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
2022-05-02T18:33:59.290969server2.ebullit.com sshd[37091]: Failed password for root from 193.122.108.42 port 38692 ssh2
2022-05-02T18:39:44.129365server2.ebullit.com sshd[705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
2022-05-02T18:39:46.067891server2.ebullit.com sshd[705]: Failed password for root from 193.122.108.42 port 58306 ssh2
... show less
May 2 14:00:37 propaganda sshd[21206]: Connection from 193.122.108.42 port 36180 on 10.0.0.161 port ... show moreMay 2 14:00:37 propaganda sshd[21206]: Connection from 193.122.108.42 port 36180 on 10.0.0.161 port 22 rdomain ""
May 2 14:00:38 propaganda sshd[21206]: Connection closed by 193.122.108.42 port 36180 [preauth] show less
May 2 20:40:11 thevastnessof sshd[2589978]: pam_unix(sshd:auth): authentication failure; logname= u ... show moreMay 2 20:40:11 thevastnessof sshd[2589978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
May 2 20:40:12 thevastnessof sshd[2589978]: Failed password for root from 193.122.108.42 port 50718 ssh2
May 2 20:40:50 thevastnessof sshd[2589981]: Connection from 193.122.108.42 port 55640 on 172.105.171.124 port 2222 rdomain ""
May 2 20:40:54 thevastnessof sshd[2589981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
May 2 20:40:55 thevastnessof sshd[2589981]: Failed password for root from 193.122.108.42 port 55640 ssh2
... show less
May 2 14:49:37 main sshd[17289]: Failed password for invalid user zx from 193.122.108.42 port 47508 ... show moreMay 2 14:49:37 main sshd[17289]: Failed password for invalid user zx from 193.122.108.42 port 47508 ssh2
May 2 15:00:58 main sshd[19627]: Failed password for invalid user cheng from 193.122.108.42 port 36494 ssh2
May 2 15:03:33 main sshd[20570]: Failed password for invalid user daniel from 193.122.108.42 port 32850 ssh2
May 2 15:06:12 main sshd[20622]: Failed password for invalid user scott from 193.122.108.42 port 57442 ssh2
May 2 15:11:48 main sshd[21541]: Failed password for invalid user db2fenc1 from 193.122.108.42 port 50156 ssh2
May 2 15:14:29 main sshd[22626]: Failed password for invalid user fiscal from 193.122.108.42 port 46532 ssh2
May 2 15:17:08 main sshd[22699]: Failed password for invalid user andrei from 193.122.108.42 port 42888 ssh2 show less
(sshd) Failed SSH login from 193.122.108.42 (KR/South Korea/Seoul/Seoul/-/[AS31898 ORACLE-BMC-31898] ... show more(sshd) Failed SSH login from 193.122.108.42 (KR/South Korea/Seoul/Seoul/-/[AS31898 ORACLE-BMC-31898]): 2 in the last 3600 secs show less
2022-05-02T23:24:52.203824edisonarch sshd[2218141]: Failed password for root from 193.122.108.42 por ... show more2022-05-02T23:24:52.203824edisonarch sshd[2218141]: Failed password for root from 193.122.108.42 port 51374 ssh2
2022-05-02T23:30:26.357825edisonarch sshd[2218558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
2022-05-02T23:30:27.953851edisonarch sshd[2218558]: Failed password for root from 193.122.108.42 port 42182 ssh2
2022-05-02T23:33:08.144094edisonarch sshd[2218762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
2022-05-02T23:33:09.982841edisonarch sshd[2218762]: Failed password for root from 193.122.108.42 port 37612 ssh2
... show less
May 2 22:21:08 localhost sshd[927991]: Failed password for root from 193.122.108.42 port 32852 ssh2 ... show moreMay 2 22:21:08 localhost sshd[927991]: Failed password for root from 193.122.108.42 port 32852 ssh2
May 2 22:24:00 localhost sshd[930489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.108.42 user=root
May 2 22:24:02 localhost sshd[930489]: Failed password for root from 193.122.108.42 port 56492 ssh2
... show less