This IP address has been reported a total of 986
times from 500 distinct
sources.
112.91.139.202 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-10-14T20:01:52.449769+00:00 edge-zap-akl01.int.pdx.net.uk sshd[3250391]: Invalid user iervolino ... show more2024-10-14T20:01:52.449769+00:00 edge-zap-akl01.int.pdx.net.uk sshd[3250391]: Invalid user iervolino from 112.91.139.202 port 34330
2024-10-14T20:08:10.628095+00:00 edge-zap-akl01.int.pdx.net.uk sshd[3250780]: Invalid user mike from 112.91.139.202 port 32954
2024-10-14T20:08:41.219490+00:00 edge-zap-akl01.int.pdx.net.uk sshd[3250822]: Invalid user nilram from 112.91.139.202 port 36484
... show less
[rede-164-29] (sshd) Failed SSH login from 112.91.139.202 (CN/China/-): 5 in the last 3600 secs; Por ... show more[rede-164-29] (sshd) Failed SSH login from 112.91.139.202 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Oct 14 14:19:21 sshd[2514]: Invalid user [USERNAME] from 112.91.139.202 port 50738
Oct 14 14:19:23 sshd[2514]: Failed password for invalid user [USERNAME] from 112.91.139.202 port 50738 ssh2
Oct 14 14:43:47 sshd[3677]: Invalid user [USERNAME] from 112.91.139.202 port 48117
Oct 14 14:43:48 sshd[3677]: Failed password for invalid user [USERNAME] from 112.91.139.202 port 48117 ssh2
Oct 14 14:44:37 sshd[3700]: Invalid user [USERNAME] from 112.91.139.202 port 53544 show less
Port Scan
Anonymous
2024-10-14T18:38:42.576861+02:00 lXXX.com sshd[1548830]: Failed password for invalid user dashboard ... show more2024-10-14T18:38:42.576861+02:00 lXXX.com sshd[1548830]: Failed password for invalid user dashboard from 112.91.139.202 port 33871 ssh2
2024-10-14T18:48:40.914818+02:00 lXXX.com sshd[1549907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.91.139.202 user=root
2024-10-14T18:48:43.399821+02:00 lXXX.com sshd[1549907]: Failed password for root from 112.91.139.202 port 51381 ssh2
... show less
Oct 14 18:20:53 * sshd[949001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t ... show moreOct 14 18:20:53 * sshd[949001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.91.139.202
Oct 14 18:20:55 * sshd[949001]: Failed password for invalid user ace from 112.91.139.202 port 60696 ssh2
Oct 14 18:24:55 * sshd[949593]: Invalid user zz from 112.91.139.202 port 51034 show less
Oct 14 11:17:44 mailman sshd[791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreOct 14 11:17:44 mailman sshd[791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.91.139.202
Oct 14 11:17:46 mailman sshd[791]: Failed password for invalid user ace from 112.91.139.202 port 37173 ssh2
Oct 14 11:17:48 mailman sshd[791]: Disconnected from 112.91.139.202 port 37173 [preauth] show less
Oct 14 17:10:05 nsmailweb sshd[1552653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 14 17:10:05 nsmailweb sshd[1552653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.91.139.202
Oct 14 17:10:08 nsmailweb sshd[1552653]: Failed password for invalid user jtribino from 112.91.139.202 port 32840 ssh2
... show less
Oct 5 06:24:01 mc sshd[944100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreOct 5 06:24:01 mc sshd[944100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.91.139.202
Oct 5 06:24:03 mc sshd[944100]: Failed password for invalid user jenkins from 112.91.139.202 port 41500 ssh2
Oct 14 14:46:21 mc sshd[2339198]: Invalid user iranazad from 112.91.139.202 port 40840
... show less