This IP address has been reported a total of 11,795
times from 1,226 distinct
sources.
5.42.86.64 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856 ... show moreDec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856
Dec 5 12:47:28 v2202111159968167802 sshd[749914]: Invalid user fatima from 5.42.86.64 port 41750
Dec 5 12:49:11 v2202111159968167802 sshd[750068]: Invalid user monitor from 5.42.86.64 port 36444
Dec 5 12:50:55 v2202111159968167802 sshd[750257]: Invalid user ubuntu from 5.42.86.64 port 48302
Dec 5 12:52:41 v2202111159968167802 sshd[750379]: Invalid user ruiyang from 5.42.86.64 port 60112
... show less
Dec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856 ... show moreDec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856
Dec 5 12:47:28 v2202111159968167802 sshd[749914]: Invalid user fatima from 5.42.86.64 port 41750
Dec 5 12:49:11 v2202111159968167802 sshd[750068]: Invalid user monitor from 5.42.86.64 port 36444
Dec 5 12:50:55 v2202111159968167802 sshd[750257]: Invalid user ubuntu from 5.42.86.64 port 48302
Dec 5 12:52:41 v2202111159968167802 sshd[750379]: Invalid user ruiyang from 5.42.86.64 port 60112
... show less
Dec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856 ... show moreDec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856
Dec 5 12:47:28 v2202111159968167802 sshd[749914]: Invalid user fatima from 5.42.86.64 port 41750
Dec 5 12:49:11 v2202111159968167802 sshd[750068]: Invalid user monitor from 5.42.86.64 port 36444
Dec 5 12:50:55 v2202111159968167802 sshd[750257]: Invalid user ubuntu from 5.42.86.64 port 48302
Dec 5 12:52:41 v2202111159968167802 sshd[750379]: Invalid user ruiyang from 5.42.86.64 port 60112
... show less
Dec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856 ... show moreDec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856
Dec 5 12:47:28 v2202111159968167802 sshd[749914]: Invalid user fatima from 5.42.86.64 port 41750
Dec 5 12:49:11 v2202111159968167802 sshd[750068]: Invalid user monitor from 5.42.86.64 port 36444
Dec 5 12:50:55 v2202111159968167802 sshd[750257]: Invalid user ubuntu from 5.42.86.64 port 48302
Dec 5 12:52:41 v2202111159968167802 sshd[750379]: Invalid user ruiyang from 5.42.86.64 port 60112
... show less
Dec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856 ... show moreDec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856
Dec 5 12:47:28 v2202111159968167802 sshd[749914]: Invalid user fatima from 5.42.86.64 port 41750
Dec 5 12:49:11 v2202111159968167802 sshd[750068]: Invalid user monitor from 5.42.86.64 port 36444
Dec 5 12:50:55 v2202111159968167802 sshd[750257]: Invalid user ubuntu from 5.42.86.64 port 48302
Dec 5 12:52:41 v2202111159968167802 sshd[750379]: Invalid user ruiyang from 5.42.86.64 port 60112
... show less
Dec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856 ... show moreDec 5 12:44:56 v2202111159968167802 sshd[749518]: Invalid user tht from 5.42.86.64 port 54856
Dec 5 12:47:28 v2202111159968167802 sshd[749914]: Invalid user fatima from 5.42.86.64 port 41750
Dec 5 12:49:11 v2202111159968167802 sshd[750068]: Invalid user monitor from 5.42.86.64 port 36444
Dec 5 12:50:55 v2202111159968167802 sshd[750257]: Invalid user ubuntu from 5.42.86.64 port 48302
Dec 5 12:52:41 v2202111159968167802 sshd[750379]: Invalid user ruiyang from 5.42.86.64 port 60112
... show less
Dec 6 20:22:17 wworkflows sshd[659167]: Failed password for root from 5.42.86.64 port 40466 ssh2<br ... show moreDec 6 20:22:17 wworkflows sshd[659167]: Failed password for root from 5.42.86.64 port 40466 ssh2
Dec 6 20:24:10 wworkflows sshd[659487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.86.64 user=root
Dec 6 20:24:12 wworkflows sshd[659487]: Failed password for root from 5.42.86.64 port 48600 ssh2
... show less
2024-12-06T20:59:29.085837+02:00 sshd[1236450]: Failed password for root from 5.42.86.64 port 60872 ... show more2024-12-06T20:59:29.085837+02:00 sshd[1236450]: Failed password for root from 5.42.86.64 port 60872 ssh2
2024-12-06T21:01:31.984296+02:00 sshd[1241580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.86.64 user=root
2024-12-06T21:01:34.151801+02:00 sshd[1241580]: Failed password for root from 5.42.86.64 port 34024 ssh2
2024-12-06T21:03:22.531590+02:00 sshd[1246147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.86.64 user=root
2024-12-06T21:03:24.609603+02:00 sshd[1246147]: Failed password for root from 5.42.86.64 port 45188 ssh2
... show less