This IP address has been reported a total of 7,305
times from 1,151 distinct
sources.
123.139.116.220 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
(sshd) Failed SSH login from 123.139.116.220 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direct ... show more(sshd) Failed SSH login from 123.139.116.220 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 27 23:26:42 server2 sshd[14666]: Invalid user oem from 123.139.116.220 port 34784
Mar 27 23:26:42 server2 sshd[14666]: Failed password for invalid user oem from 123.139.116.220 port 34784 ssh2
Mar 27 23:32:24 server2 sshd[17011]: Invalid user agetest from 123.139.116.220 port 53452
Mar 27 23:32:24 server2 sshd[17011]: Failed password for invalid user agetest from 123.139.116.220 port 53452 ssh2
Mar 27 23:33:29 server2 sshd[17482]: Invalid user asep from 123.139.116.220 port 42492 show less
2025-03-28T01:53:06.614172+00:00 widevents-nutricionavanzada sshd[1460005]: Invalid user zz from 123 ... show more2025-03-28T01:53:06.614172+00:00 widevents-nutricionavanzada sshd[1460005]: Invalid user zz from 123.139.116.220 port 38112
2025-03-28T01:59:27.917743+00:00 widevents-nutricionavanzada sshd[1460320]: Invalid user margaret from 123.139.116.220 port 41304
2025-03-28T02:00:27.991069+00:00 widevents-nutricionavanzada sshd[1460364]: Invalid user a from 123.139.116.220 port 55836
... show less
2025-03-28T01:18:11.488249+00:00 vault sshd[1547410]: Failed password for invalid user mysql from 12 ... show more2025-03-28T01:18:11.488249+00:00 vault sshd[1547410]: Failed password for invalid user mysql from 123.139.116.220 port 40944 ssh2
2025-03-28T01:22:42.069070+00:00 vault sshd[1576152]: Invalid user bond from 123.139.116.220 port 59762
2025-03-28T01:22:42.077142+00:00 vault sshd[1576152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.139.116.220
2025-03-28T01:22:44.593592+00:00 vault sshd[1576152]: Failed password for invalid user bond from 123.139.116.220 port 59762 ssh2
2025-03-28T01:23:56.870254+00:00 vault sshd[1584215]: Invalid user admin from 123.139.116.220 port 50392
... show less
Mar 27 23:51:43 mk-bgp sshd[4148134]: Invalid user ren from 123.139.116.220 port 49968
Mar 28 ... show moreMar 27 23:51:43 mk-bgp sshd[4148134]: Invalid user ren from 123.139.116.220 port 49968
Mar 28 00:10:28 mk-bgp sshd[4148357]: Invalid user mangodb from 123.139.116.220 port 36112
Mar 28 00:11:23 mk-bgp sshd[4148362]: Invalid user test1 from 123.139.116.220 port 51402
Mar 28 00:12:23 mk-bgp sshd[4148364]: Invalid user sonu from 123.139.116.220 port 38160
Mar 28 00:13:16 mk-bgp sshd[4148369]: Invalid user default from 123.139.116.220 port 53036
... show less
Mar 27 23:31:18 watchtower sshd[3546546]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreMar 27 23:31:18 watchtower sshd[3546546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.139.116.220
Mar 27 23:31:20 watchtower sshd[3546546]: Failed password for invalid user ismiana from 123.139.116.220 port 41326 ssh2
... show less
Detected multiple authentication failures and invalid user attempts from IP address 123.139.116.220 ... show moreDetected multiple authentication failures and invalid user attempts from IP address 123.139.116.220 on [PT] Horse Node. show less
Mar 27 23:08:01 watchtower sshd[3538780]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreMar 27 23:08:01 watchtower sshd[3538780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.139.116.220
Mar 27 23:08:04 watchtower sshd[3538780]: Failed password for invalid user kafka from 123.139.116.220 port 46554 ssh2
... show less
2025-03-27T23:46:13.755511fra01-de-pop.as202427.net sshd[569760]: Invalid user erp from 123.139.116. ... show more2025-03-27T23:46:13.755511fra01-de-pop.as202427.net sshd[569760]: Invalid user erp from 123.139.116.220 port 47272
2025-03-27T23:50:49.635226fra01-de-pop.as202427.net sshd[570483]: Invalid user l from 123.139.116.220 port 49100
2025-03-27T23:51:22.431152fra01-de-pop.as202427.net sshd[570707]: Invalid user xueys from 123.139.116.220 port 54178
... show less
Mar 27 21:57:29 node2 sshd[2494078]: Invalid user cahi from 123.139.116.220 port 44150
Mar 27 ... show moreMar 27 21:57:29 node2 sshd[2494078]: Invalid user cahi from 123.139.116.220 port 44150
Mar 27 22:19:33 node2 sshd[2494231]: Invalid user mud from 123.139.116.220 port 58586
Mar 27 22:20:29 node2 sshd[2494241]: Invalid user suwit from 123.139.116.220 port 43972
... show less
Brute-ForceSSH
Anonymous
Mar 27 17:27:55 vps sshd[14769]: Failed password for invalid user fatemi from 123.139.116.220 port 5 ... show moreMar 27 17:27:55 vps sshd[14769]: Failed password for invalid user fatemi from 123.139.116.220 port 57996 ssh2
Mar 27 17:48:16 vps sshd[15163]: Invalid user bae from 123.139.116.220 port 49330
Mar 27 17:48:16 vps sshd[15163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.139.116.220
Mar 27 17:48:18 vps sshd[15163]: Failed password for invalid user bae from 123.139.116.220 port 49330 ssh2
Mar 27 17:51:56 vps sshd[15204]: Invalid user steam from 123.139.116.220 port 57392
... show less