This IP address has been reported a total of 143
times from 107 distinct
sources.
42.93.167.40 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Sep 17 14:52:44 mx1vps sshd[18716]: Invalid user postgres from 42.93.167.40 port 10591
Sep 17 ... show moreSep 17 14:52:44 mx1vps sshd[18716]: Invalid user postgres from 42.93.167.40 port 10591
Sep 17 14:53:24 mx1vps sshd[18762]: Invalid user test3 from 42.93.167.40 port 13185
Sep 17 14:54:11 mx1vps sshd[18816]: Invalid user kafka from 42.93.167.40 port 11725
Sep 17 14:54:50 mx1vps sshd[18854]: Invalid user user from 42.93.167.40 port 10261
Sep 17 14:55:39 mx1vps sshd[18910]: Invalid user sammy from 42.93.167.40 port 12948
... show less
2024-09-17T09:22:18.708418+01:00 saccapposh sshd[1728564]: Invalid user ftpuser from 42.93.167.40 po ... show more2024-09-17T09:22:18.708418+01:00 saccapposh sshd[1728564]: Invalid user ftpuser from 42.93.167.40 port 9217
2024-09-17T09:22:50.987118+01:00 saccapposh sshd[1729685]: Invalid user deploy from 42.93.167.40 port 11543
... show less
Sep 17 07:36:25 dagasistemas sshd[12392]: Invalid user reza from 42.93.167.40 port 10956
Sep 1 ... show moreSep 17 07:36:25 dagasistemas sshd[12392]: Invalid user reza from 42.93.167.40 port 10956
Sep 17 07:36:25 dagasistemas sshd[12392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.93.167.40
Sep 17 07:36:27 dagasistemas sshd[12392]: Failed password for invalid user reza from 42.93.167.40 port 10956 ssh2
... show less
Sep 17 07:36:13 ubuntu sshd[2045754]: Invalid user reza from 42.93.167.40 port 13282
Sep 17 07 ... show moreSep 17 07:36:13 ubuntu sshd[2045754]: Invalid user reza from 42.93.167.40 port 13282
Sep 17 07:36:13 ubuntu sshd[2045754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.93.167.40
Sep 17 07:36:15 ubuntu sshd[2045754]: Failed password for invalid user reza from 42.93.167.40 port 13282 ssh2
... show less
(sshd) Failed SSH login from 42.93.167.40 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction ... show more(sshd) Failed SSH login from 42.93.167.40 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: 2024-09-16T23:34:35.917988+00:00 nc1 sshd[230847]: Invalid user alex from 42.93.167.40 port 12266
2024-09-16T23:34:35.921286+00:00 nc1 sshd[230847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.93.167.40
2024-09-16T23:34:38.233275+00:00 nc1 sshd[230847]: Failed password for invalid user alex from 42.93.167.40 port 12266 ssh2
2024-09-16T23:49:28.424264+00:00 nc1 sshd[231612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.93.167.40 user=root
2024-09-16T23:49:30.996843+00:00 nc1 sshd[231612]: Failed password for root from 42.93.167.40 port 9503 ssh2 show less
Sep 16 22:34:00 f2b auth.info sshd[84464]: Invalid user ubuntu from 42.93.167.40 port 13084
Se ... show moreSep 16 22:34:00 f2b auth.info sshd[84464]: Invalid user ubuntu from 42.93.167.40 port 13084
Sep 16 22:34:00 f2b auth.info sshd[84464]: Failed password for invalid user ubuntu from 42.93.167.40 port 13084 ssh2
Sep 16 22:34:00 f2b auth.info sshd[84464]: Disconnected from invalid user ubuntu 42.93.167.40 port 13084 [preauth]
... show less