This IP address has been reported a total of 51
times from 42 distinct
sources.
120.157.139.67 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-12-09T02:33:26.108388+01:00 fusco sshd[2175977]: pam_unix(sshd:auth): authentication failure; l ... show more2024-12-09T02:33:26.108388+01:00 fusco sshd[2175977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.139.67
2024-12-09T02:33:28.242150+01:00 fusco sshd[2175977]: Failed password for invalid user a from 120.157.139.67 port 40094 ssh2
2024-12-09T02:33:32.717588+01:00 fusco sshd[2175979]: Invalid user ubnt from 120.157.139.67 port 40108
... show less
Dec 8 18:44:38 santamaria sshd\[27165\]: Invalid user a from 120.157.139.67
Dec 8 18:44:38 s ... show moreDec 8 18:44:38 santamaria sshd\[27165\]: Invalid user a from 120.157.139.67
Dec 8 18:44:38 santamaria sshd\[27165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.139.67
Dec 8 18:44:41 santamaria sshd\[27165\]: Failed password for invalid user a from 120.157.139.67 port 44808 ssh2
... show less
Brute-ForceSSH
Anonymous
Dec 7 04:24:49 v sshd\[5175\]: Invalid user a from 120.157.139.67 port 47304
Dec 7 04:24:50 ... show moreDec 7 04:24:49 v sshd\[5175\]: Invalid user a from 120.157.139.67 port 47304
Dec 7 04:24:50 v sshd\[5175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.139.67
Dec 7 04:24:52 v sshd\[5175\]: Failed password for invalid user a from 120.157.139.67 port 47304 ssh2
... show less
Report 1493896 with IP 2503179 for SSH brute-force attack by source 2497854 via ssh-honeypot/0.2.0+h ... show moreReport 1493896 with IP 2503179 for SSH brute-force attack by source 2497854 via ssh-honeypot/0.2.0+http show less
Dec 6 18:02:14 dev-server sshd[241086]: Invalid user ubnt from 120.157.139.67 port 33424
Dec ... show moreDec 6 18:02:14 dev-server sshd[241086]: Invalid user ubnt from 120.157.139.67 port 33424
Dec 6 18:02:17 dev-server sshd[241086]: Failed password for invalid user ubnt from 120.157.139.67 port 33424 ssh2
Dec 6 18:02:22 dev-server sshd[241091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.139.67 user=root
Dec 6 18:02:24 dev-server sshd[241091]: Failed password for root from 120.157.139.67 port 35586 ssh2
Dec 6 18:02:31 dev-server sshd[241100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.139.67 user=root
Dec 6 18:02:33 dev-server sshd[241100]: Failed password for root from 120.157.139.67 port 55478 ssh2
Dec 6 18:02:37 dev-server sshd[241107]: Invalid user orangepi from 120.157.139.67 port 55494
... show less
Dec 4 02:27:47 b146-38 sshd[2118094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreDec 4 02:27:47 b146-38 sshd[2118094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.139.67
Dec 4 02:27:49 b146-38 sshd[2118094]: Failed password for invalid user a from 120.157.139.67 port 39238 ssh2
Dec 4 02:27:52 b146-38 sshd[2118115]: Invalid user ubnt from 120.157.139.67 port 49062
... show less
2024-12-03T21:21:57.483851 rhel-20gb-ash-1 sshd[185620]: error: kex_exchange_identification: Connect ... show more2024-12-03T21:21:57.483851 rhel-20gb-ash-1 sshd[185620]: error: kex_exchange_identification: Connection closed by remote host
2024-12-03T21:21:57.483883 rhel-20gb-ash-1 sshd[185620]: Connection closed by 120.157.139.67 port 33918
... show less
2024-12-02T02:22:29.839805+01:00 khatuna sshd[673585]: Invalid user ubnt from 120.157.139.67 port 41 ... show more2024-12-02T02:22:29.839805+01:00 khatuna sshd[673585]: Invalid user ubnt from 120.157.139.67 port 41678
2024-12-02T02:22:30.209828+01:00 khatuna sshd[673585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.139.67
2024-12-02T02:22:32.112372+01:00 khatuna sshd[673585]: Failed password for invalid user ubnt from 120.157.139.67 port 41678 ssh2
2024-12-02T02:22:36.433634+01:00 khatuna sshd[673658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.139.67 user=root
2024-12-02T02:22:38.160574+01:00 khatuna sshd[673658]: Failed password for root from 120.157.139.67 port 46522 ssh2
... show less