This IP address has been reported a total of 1,663
times from 562 distinct
sources.
139.155.30.57 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 11 14:07:25 ns sshd[8747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tt ... show moreDec 11 14:07:25 ns sshd[8747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.30.57 user=root
Dec 11 14:07:27 ns sshd[8747]: Failed password for root from 139.155.30.57 port 55592 ssh2
... show less
Brute-ForceSSH
Anonymous
Dec 11 12:59:06 rotator sshd\[21834\]: Failed password for root from 139.155.30.57 port 54986 ssh2De ... show moreDec 11 12:59:06 rotator sshd\[21834\]: Failed password for root from 139.155.30.57 port 54986 ssh2Dec 11 13:00:20 rotator sshd\[22280\]: Invalid user fajar from 139.155.30.57Dec 11 13:00:21 rotator sshd\[22280\]: Failed password for invalid user fajar from 139.155.30.57 port 37954 ssh2Dec 11 13:00:55 rotator sshd\[22718\]: Invalid user acer from 139.155.30.57Dec 11 13:00:57 rotator sshd\[22718\]: Failed password for invalid user acer from 139.155.30.57 port 45940 ssh2
... show less
Dec 11 11:41:02 dev0-dcde-rnet sshd[619]: Failed password for root from 139.155.30.57 port 35660 ssh ... show moreDec 11 11:41:02 dev0-dcde-rnet sshd[619]: Failed password for root from 139.155.30.57 port 35660 ssh2
Dec 11 11:51:05 dev0-dcde-rnet sshd[870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.30.57
Dec 11 11:51:07 dev0-dcde-rnet sshd[870]: Failed password for invalid user fa from 139.155.30.57 port 37916 ssh2 show less
2023-12-11T10:37:03.260263instance2 sshd[145203]: Disconnected from authenticating user root 139.155 ... show more2023-12-11T10:37:03.260263instance2 sshd[145203]: Disconnected from authenticating user root 139.155.30.57 port 33242 [preauth]
... show less
Brute-ForceSSH
Anonymous
Dec 11 10:10:55 shared-1 sshd\[2698\]: Invalid user test4 from 139.155.30.57Dec 11 10:11:45 shared-1 ... show moreDec 11 10:10:55 shared-1 sshd\[2698\]: Invalid user test4 from 139.155.30.57Dec 11 10:11:45 shared-1 sshd\[2748\]: Invalid user hengshi from 139.155.30.57
... show less
2023-12-11T10:19:13.318318+01:00 ns1..de sshd[10799]: Disconnected from authenticating user root 139 ... show more2023-12-11T10:19:13.318318+01:00 ns1..de sshd[10799]: Disconnected from authenticating user root 139.155.30.57 port 57692 [preauth]
2023-12-11T10:20:45.232508+01:00 ns1..de sshd[10805]: Disconnected from authenticating user root 139.155.30.57 port 42708 [preauth]
2023-12-11T10:23:45.786924+01:00 ns1..de sshd[10813]: Invalid user admin from 139.155.30.57 port 40958 show less
Dec 11 09:36:39 eu-central-01 sshd[2948192]: Invalid user peter from 139.155.30.57 port 35280
... show moreDec 11 09:36:39 eu-central-01 sshd[2948192]: Invalid user peter from 139.155.30.57 port 35280
Dec 11 09:42:28 eu-central-01 sshd[2948703]: Invalid user es from 139.155.30.57 port 38174
Dec 11 09:43:19 eu-central-01 sshd[2948765]: Invalid user sam from 139.155.30.57 port 49038
Dec 11 09:46:30 eu-central-01 sshd[2949028]: Invalid user user from 139.155.30.57 port 53426
Dec 11 09:47:30 eu-central-01 sshd[2949128]: Invalid user t1 from 139.155.30.57 port 36060
... show less
2023-12-11T08:47:31.245227server01-k3s-pve01-rma-ch.crazycraftland.net sshd[251747]: User root from ... show more2023-12-11T08:47:31.245227server01-k3s-pve01-rma-ch.crazycraftland.net sshd[251747]: User root from 139.155.30.57 not allowed because not listed in AllowUsers
2023-12-11T08:59:15.742102server01-k3s-pve01-rma-ch.crazycraftland.net sshd[252458]: Invalid user richard from 139.155.30.57 port 46454
2023-12-11T09:01:09.163352server01-k3s-pve01-rma-ch.crazycraftland.net sshd[252574]: User root from 139.155.30.57 not allowed because not listed in AllowUsers
... show less
Dec 11 03:28:38 webcore sshd[1667371]: Invalid user wq from 139.155.30.57 port 40702
Dec 11 03 ... show moreDec 11 03:28:38 webcore sshd[1667371]: Invalid user wq from 139.155.30.57 port 40702
Dec 11 03:28:38 webcore sshd[1667371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.30.57
Dec 11 03:28:40 webcore sshd[1667371]: Failed password for invalid user wq from 139.155.30.57 port 40702 ssh2
Dec 11 03:32:19 webcore sshd[1668105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.30.57 user=root
Dec 11 03:32:22 webcore sshd[1668105]: Failed password for root from 139.155.30.57 port 41576 ssh2
... show less