This IP address has been reported a total of 854
times from 434 distinct
sources.
139.162.116.20 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 11 19:10:42 ramon sshd[1983133]: Failed password for root from 139.162.116.20 port 46846 ssh2<br ... show moreNov 11 19:10:42 ramon sshd[1983133]: Failed password for root from 139.162.116.20 port 46846 ssh2
Nov 11 19:13:01 ramon sshd[1983261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.116.20 user=root
Nov 11 19:13:03 ramon sshd[1983261]: Failed password for root from 139.162.116.20 port 60034 ssh2
... show less
2024-11-12T02:09:44.861582+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[3447908]: Failed password for ro ... show more2024-11-12T02:09:44.861582+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[3447908]: Failed password for root from 139.162.116.20 port 48468 ssh2
2024-11-12T02:12:06.866749+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[3448451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.116.20 user=root
2024-11-12T02:12:08.685047+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[3448451]: Failed password for root from 139.162.116.20 port 47350 ssh2
... show less
2024-11-12T01:39:40.760957+01:00 secure sshd[5010]: User root from 139.162.116.20 not allowed becaus ... show more2024-11-12T01:39:40.760957+01:00 secure sshd[5010]: User root from 139.162.116.20 not allowed because not listed in AllowUsers
2024-11-12T01:43:36.342262+01:00 secure sshd[5035]: User root from 139.162.116.20 not allowed because not listed in AllowUsers
2024-11-12T01:45:59.588980+01:00 secure sshd[5048]: User root from 139.162.116.20 not allowed because not listed in AllowUsers
... show less
Nov 11 13:34:53 alpha-ef21b5050c sshd[3441774]: Invalid user deamon from 139.162.116.20 port 33548<b ... show moreNov 11 13:34:53 alpha-ef21b5050c sshd[3441774]: Invalid user deamon from 139.162.116.20 port 33548
... show less
2024-11-11T22:43:25.058339+01:00 ruddy-force sshd[971282]: Invalid user stefano from 139.162.116.20 ... show more2024-11-11T22:43:25.058339+01:00 ruddy-force sshd[971282]: Invalid user stefano from 139.162.116.20 port 58404
2024-11-11T22:43:25.061889+01:00 ruddy-force sshd[971282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.116.20
2024-11-11T22:43:27.083930+01:00 ruddy-force sshd[971282]: Failed password for invalid user stefano from 139.162.116.20 port 58404 ssh2
2024-11-11T22:45:44.029578+01:00 ruddy-force sshd[971298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.116.20 user=root
2024-11-11T22:45:45.996200+01:00 ruddy-force sshd[971298]: Failed password for root from 139.162.116.20 port 34320 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-11-11T22:42:00+01:00 lb-1 sshd[150924]: Failed password for root from 139.162.116.20 port 48020 ... show more2024-11-11T22:42:00+01:00 lb-1 sshd[150924]: Failed password for root from 139.162.116.20 port 48020 ssh2
2024-11-11T22:44:22+01:00 lb-1 sshd[151196]: Invalid user stefano from 139.162.116.20 port 54510
2024-11-11T22:44:22+01:00 lb-1 sshd[151196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.116.20
2024-11-11T22:44:23+01:00 lb-1 sshd[151196]: Failed password for invalid user stefano from 139.162.116.20 port 54510 ssh2
... show less