This IP address has been reported a total of 16,625
times from 1,358 distinct
sources.
139.150.69.56 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-10-04T08:01:03.761551+00:00 Linux09 sshd[3157653]: Failed password for invalid user server from ... show more2024-10-04T08:01:03.761551+00:00 Linux09 sshd[3157653]: Failed password for invalid user server from 139.150.69.56 port 48288 ssh2
2024-10-04T08:01:47.488278+00:00 Linux09 sshd[3160057]: Invalid user server from 139.150.69.56 port 60754
2024-10-04T08:01:47.490201+00:00 Linux09 sshd[3160057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
2024-10-04T08:01:48.909375+00:00 Linux09 sshd[3160057]: Failed password for invalid user server from 139.150.69.56 port 60754 ssh2
2024-10-04T08:02:28.787589+00:00 Linux09 sshd[3162691]: Invalid user odoo from 139.150.69.56 port 44980
2024-10-04T08:02:28.789828+00:00 Linux09 sshd[3162691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
2024-10-04T08:02:30.505468+00:00 Linux09 sshd[3162691]: Failed password for invalid user odoo from 139.150.69.56 port 44980 ssh2
2024-10-04T08:03:19.132449+00:00 Linux09 sshd[3165887]: Invalid user deploy from
... show less
2024-10-04T09:59:06.416401+02:00 nc3.motyka.pro sshd[487309]: Invalid user user from 139.150.69.56 p ... show more2024-10-04T09:59:06.416401+02:00 nc3.motyka.pro sshd[487309]: Invalid user user from 139.150.69.56 port 50696
2024-10-04T09:59:06.420910+02:00 nc3.motyka.pro sshd[487309]: Failed password for invalid user user from 139.150.69.56 port 50696 ssh2
2024-10-04T10:01:06.111155+02:00 nc3.motyka.pro sshd[491464]: Invalid user server from 139.150.69.56 port 45016
2024-10-04T10:01:06.115639+02:00 nc3.motyka.pro sshd[491464]: Failed password for invalid user server from 139.150.69.56 port 45016 ssh2
2024-10-04T10:01:51.135515+02:00 nc3.motyka.pro sshd[493126]: Invalid user server from 139.150.69.56 port 57480
... show less
2024-10-04T09:58:35.761792+02:00 berohost-6c24g sshd[14536]: Failed password for invalid user user f ... show more2024-10-04T09:58:35.761792+02:00 berohost-6c24g sshd[14536]: Failed password for invalid user user from 139.150.69.56 port 47326 ssh2
2024-10-04T10:01:02.670501+02:00 berohost-6c24g sshd[19845]: Invalid user server from 139.150.69.56 port 45734
2024-10-04T10:01:02.672388+02:00 berohost-6c24g sshd[19845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
2024-10-04T10:01:04.247354+02:00 berohost-6c24g sshd[19845]: Failed password for invalid user server from 139.150.69.56 port 45734 ssh2
2024-10-04T10:01:48.088553+02:00 berohost-6c24g sshd[21208]: Invalid user server from 139.150.69.56 port 58200
... show less
Oct 4 03:40:10 buttnugget sshd[1424777]: Invalid user sammy from 139.150.69.56 port 52204
Oct ... show moreOct 4 03:40:10 buttnugget sshd[1424777]: Invalid user sammy from 139.150.69.56 port 52204
Oct 4 03:46:16 buttnugget sshd[1427941]: Invalid user guest from 139.150.69.56 port 52542
Oct 4 03:47:05 buttnugget sshd[1428367]: Invalid user postgres from 139.150.69.56 port 36744
... show less
Oct 4 02:16:49 raspberrypi sshd[4879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 4 02:16:49 raspberrypi sshd[4879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
Oct 4 02:16:51 raspberrypi sshd[4879]: Failed password for invalid user es from 139.150.69.56 port 42592 ssh2
Oct 4 02:18:37 raspberrypi sshd[4906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
Oct 4 02:18:39 raspberrypi sshd[4906]: Failed password for invalid user odoo from 139.150.69.56 port 35126 ssh2
Oct 4 02:19:21 raspberrypi sshd[4927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
Oct 4 02:19:23 raspberrypi sshd[4927]: Failed password for invalid user git from 139.150.69.56 port 47328 ssh2 show less
2024-10-04T09:05:03.396050+02:00 hz-vm-web-033 sshd[875267]: pam_unix(sshd:auth): authentication fai ... show more2024-10-04T09:05:03.396050+02:00 hz-vm-web-033 sshd[875267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
2024-10-04T09:05:05.504692+02:00 hz-vm-web-033 sshd[875267]: Failed password for invalid user guest from 139.150.69.56 port 39798 ssh2
2024-10-04T09:05:45.504491+02:00 hz-vm-web-033 sshd[876536]: Invalid user git from 139.150.69.56 port 52122
2024-10-04T09:05:45.506546+02:00 hz-vm-web-033 sshd[876536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
2024-10-04T09:05:47.715402+02:00 hz-vm-web-033 sshd[876536]: Failed password for invalid user git from 139.150.69.56 port 52122 ssh2 show less
Oct 4 08:48:15 HighSpeed sshd[1750815]: Invalid user guest from 139.150.69.56 port 53148
Oct ... show moreOct 4 08:48:15 HighSpeed sshd[1750815]: Invalid user guest from 139.150.69.56 port 53148
Oct 4 08:48:18 HighSpeed sshd[1750815]: Failed password for invalid user guest from 139.150.69.56 port 53148 ssh2
Oct 4 08:49:01 HighSpeed sshd[1750887]: Invalid user ubuntu from 139.150.69.56 port 37290
Oct 4 08:49:01 HighSpeed sshd[1750887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
Oct 4 08:49:01 HighSpeed sshd[1750887]: Invalid user ubuntu from 139.150.69.56 port 37290
Oct 4 08:49:03 HighSpeed sshd[1750887]: Failed password for invalid user ubuntu from 139.150.69.56 port 37290 ssh2
Oct 4 08:49:48 HighSpeed sshd[1750950]: Invalid user hadoop from 139.150.69.56 port 49666
... show less
2024-10-04T08:17:53.689040v22019037947384217 sshd[16560]: Invalid user dev from 139.150.69.56 port 5 ... show more2024-10-04T08:17:53.689040v22019037947384217 sshd[16560]: Invalid user dev from 139.150.69.56 port 52148
2024-10-04T08:17:53.919628v22019037947384217 sshd[16560]: Disconnected from 139.150.69.56 port 52148 [preauth]
2024-10-04T08:19:03.621678v22019037947384217 sshd[16677]: Invalid user odoo from 139.150.69.56 port 39302
... show less
2024-10-04T04:48:29.949735+00:00 mapir-proxmox sshd[3884139]: pam_unix(sshd:auth): authentication fa ... show more2024-10-04T04:48:29.949735+00:00 mapir-proxmox sshd[3884139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.150.69.56
2024-10-04T04:48:31.856922+00:00 mapir-proxmox sshd[3884139]: Failed password for invalid user ftpuser from 139.150.69.56 port 39296 ssh2
2024-10-04T04:50:24.617127+00:00 mapir-proxmox sshd[3900181]: Invalid user debian from 139.150.69.56 port 32832
... show less