This IP address has been reported a total of 15,872
times from 1,323 distinct
sources.
5.42.84.61 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 23 14:02:58 h2buntu sshd[3403427]: Failed password for invalid user debian from 5.42.84.61 port ... show moreNov 23 14:02:58 h2buntu sshd[3403427]: Failed password for invalid user debian from 5.42.84.61 port 14114 ssh2
Nov 23 14:04:50 h2buntu sshd[3403643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61 user=root
Nov 23 14:04:53 h2buntu sshd[3403643]: Failed password for root from 5.42.84.61 port 16566 ssh2
... show less
2024-11-23T12:34:13.758026+00:00 edge-hiv-nyc01.int.pdx.net.uk sshd[2834556]: Invalid user tacuser f ... show more2024-11-23T12:34:13.758026+00:00 edge-hiv-nyc01.int.pdx.net.uk sshd[2834556]: Invalid user tacuser from 5.42.84.61 port 33176
2024-11-23T12:37:18.880980+00:00 edge-hiv-nyc01.int.pdx.net.uk sshd[2835229]: Invalid user admin from 5.42.84.61 port 46516
2024-11-23T12:38:41.537334+00:00 edge-hiv-nyc01.int.pdx.net.uk sshd[2835518]: Invalid user es from 5.42.84.61 port 18088
... show less
Detected multiple authentication failures and invalid user attempts from IP address 5.42.84.61 on [P ... show moreDetected multiple authentication failures and invalid user attempts from IP address 5.42.84.61 on [PT] Lis-28 Node. show less
Nov 23 13:13:26 SuspectRP sshd[55819]: Failed password for root from 5.42.84.61 port 63588 ssh2<br / ... show moreNov 23 13:13:26 SuspectRP sshd[55819]: Failed password for root from 5.42.84.61 port 63588 ssh2
Nov 23 13:14:37 SuspectRP sshd[55868]: Invalid user user from 5.42.84.61 port 22586
Nov 23 13:14:37 SuspectRP sshd[55868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61
Nov 23 13:14:37 SuspectRP sshd[55868]: Invalid user user from 5.42.84.61 port 22586
Nov 23 13:14:40 SuspectRP sshd[55868]: Failed password for invalid user user from 5.42.84.61 port 22586 ssh2
Nov 23 13:15:46 SuspectRP sshd[55912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61 user=root
Nov 23 13:15:48 SuspectRP sshd[55912]: Failed password for root from 5.42.84.61 port 47844 ssh2
... show less
Nov 23 13:10:17 lnxweb61 sshd[21572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreNov 23 13:10:17 lnxweb61 sshd[21572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61 user=root
Nov 23 13:10:18 lnxweb61 sshd[21572]: Failed password for root from 5.42.84.61 port 57472 ssh2
Nov 23 13:10:19 lnxweb61 sshd[21572]: Disconnected from authenticating user root 5.42.84.61 port 57472 [preauth]
Nov 23 13:11:30 lnxweb61 sshd[22620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61 user=root
Nov 23 13:11:32 lnxweb61 sshd[22620]: Failed password for root from 5.42.84.61 port 26086 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-11-23T11:42:20.264877+01:00 Ubuntu-Main sshd[404116]: Failed password for invalid user admin fr ... show more2024-11-23T11:42:20.264877+01:00 Ubuntu-Main sshd[404116]: Failed password for invalid user admin from 5.42.84.61 port 39878 ssh2
2024-11-23T11:43:46.378806+01:00 Ubuntu-Main sshd[404121]: Invalid user user from 5.42.84.61 port 56252
2024-11-23T11:43:46.390243+01:00 Ubuntu-Main sshd[404121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61
2024-11-23T11:43:48.154844+01:00 Ubuntu-Main sshd[404121]: Failed password for invalid user user from 5.42.84.61 port 56252 ssh2
2024-11-23T11:45:02.432784+01:00 Ubuntu-Main sshd[404126]: Invalid user sftpuser from 5.42.84.61 port 34060
... show less
Nov 23 11:29:49 lnxmail62 sshd[7699]: Invalid user admin from 5.42.84.61 port 13616
Nov 23 11: ... show moreNov 23 11:29:49 lnxmail62 sshd[7699]: Invalid user admin from 5.42.84.61 port 13616
Nov 23 11:29:49 lnxmail62 sshd[7699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61
Nov 23 11:29:49 lnxmail62 sshd[7699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61
... show less
Nov 23 11:24:05 kvm11438 sshd[114519]: Invalid user teamspeak3 from 5.42.84.61 port 11792
Nov ... show moreNov 23 11:24:05 kvm11438 sshd[114519]: Invalid user teamspeak3 from 5.42.84.61 port 11792
Nov 23 11:24:05 kvm11438 sshd[114519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61
Nov 23 11:24:05 kvm11438 sshd[114519]: Invalid user teamspeak3 from 5.42.84.61 port 11792
Nov 23 11:24:07 kvm11438 sshd[114519]: Failed password for invalid user teamspeak3 from 5.42.84.61 port 11792 ssh2
Nov 23 11:25:15 kvm11438 sshd[115283]: Invalid user web from 5.42.84.61 port 10472
... show less
Nov 23 10:58:53 kvm11438 sshd[101099]: Invalid user oracle from 5.42.84.61 port 61882
Nov 23 1 ... show moreNov 23 10:58:53 kvm11438 sshd[101099]: Invalid user oracle from 5.42.84.61 port 61882
Nov 23 10:58:53 kvm11438 sshd[101099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.84.61
Nov 23 10:58:53 kvm11438 sshd[101099]: Invalid user oracle from 5.42.84.61 port 61882
Nov 23 10:58:55 kvm11438 sshd[101099]: Failed password for invalid user oracle from 5.42.84.61 port 61882 ssh2
Nov 23 11:00:11 kvm11438 sshd[101564]: Invalid user testuser from 5.42.84.61 port 46792
... show less