This IP address has been reported a total of 289
times from 200 distinct
sources.
94.141.102.140 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Sep 20 13:24:53 admin sshd[2591393]: Failed password for root from 94.141.102.140 port 39236 ssh2<br ... show moreSep 20 13:24:53 admin sshd[2591393]: Failed password for root from 94.141.102.140 port 39236 ssh2
Sep 20 13:25:18 admin sshd[2592129]: Invalid user dusan from 94.141.102.140 port 55930
Sep 20 13:25:18 admin sshd[2592129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.141.102.140
Sep 20 13:25:18 admin sshd[2592129]: Invalid user dusan from 94.141.102.140 port 55930
Sep 20 13:25:21 admin sshd[2592129]: Failed password for invalid user dusan from 94.141.102.140 port 55930 ssh2
... show less
2024-09-20T12:48:15.797337+02:00 ns402 sshd[1513329]: Connection closed by invalid user eve 94.141.1 ... show more2024-09-20T12:48:15.797337+02:00 ns402 sshd[1513329]: Connection closed by invalid user eve 94.141.102.140 port 37536 [preauth]
2024-09-20T12:48:25.307282+02:00 ns402 sshd[1513364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.141.102.140 user=root
2024-09-20T12:48:27.266743+02:00 ns402 sshd[1513364]: Failed password for root from 94.141.102.140 port 57468 ssh2
2024-09-20T12:48:28.701052+02:00 ns402 sshd[1513364]: Connection closed by authenticating user root 94.141.102.140 port 57468 [preauth]
2024-09-20T12:48:39.187145+02:00 ns402 sshd[1513400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.141.102.140 user=root
2024-09-20T12:48:41.401874+02:00 ns402 sshd[1513400]: Failed password for root from 94.141.102.140 port 41016 ssh2
2024-09-20T12:48:42.628038+02:00 ns402 sshd[1513400]: Connection closed by authenticating user root 94.141.102.140 port 41016 [preauth]
2024-09-20T12:48:55.222863+02:00 n
... show less
2024-09-20T12:36:23.229079 frenzy sshd[59319]: Failed password for invalid user library from 94.141. ... show more2024-09-20T12:36:23.229079 frenzy sshd[59319]: Failed password for invalid user library from 94.141.102.140 port 34804 ssh2
2024-09-20T12:36:34.654960 frenzy sshd[59321]: Invalid user bjzk1 from 94.141.102.140 port 57826
2024-09-20T12:36:34.661153 frenzy sshd[59321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.141.102.140
2024-09-20T12:36:37.011738 frenzy sshd[59321]: Failed password for invalid user bjzk1 from 94.141.102.140 port 57826 ssh2
... show less