This IP address has been reported a total of 1,797
times from 591 distinct
sources.
139.199.192.171 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 11 01:00:09 moonlight sshd[261085]: Invalid user deamon from 139.199.192.171 port 50294
De ... show moreDec 11 01:00:09 moonlight sshd[261085]: Invalid user deamon from 139.199.192.171 port 50294
Dec 11 01:00:09 moonlight sshd[261085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.171
Dec 11 01:00:09 moonlight sshd[261085]: Invalid user deamon from 139.199.192.171 port 50294
Dec 11 01:00:11 moonlight sshd[261085]: Failed password for invalid user deamon from 139.199.192.171 port 50294 ssh2
Dec 11 01:00:58 moonlight sshd[261130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.171 user=root
Dec 11 01:01:00 moonlight sshd[261130]: Failed password for root from 139.199.192.171 port 58664 ssh2
Dec 11 01:01:41 moonlight sshd[261142]: Invalid user plex from 139.199.192.171 port 38782
... show less
Dec 11 00:58:31 web-main sshd[2611280]: Failed password for root from 139.199.192.171 port 53376 ssh ... show moreDec 11 00:58:31 web-main sshd[2611280]: Failed password for root from 139.199.192.171 port 53376 ssh2
Dec 11 00:59:15 web-main sshd[2611510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.171 user=root
Dec 11 00:59:17 web-main sshd[2611510]: Failed password for root from 139.199.192.171 port 33502 ssh2 show less
Dec 10 **REMOVED** sshd[22525]: Failed password for root from 139.199.192.171 port 32826 ssh2
... show moreDec 10 **REMOVED** sshd[22525]: Failed password for root from 139.199.192.171 port 32826 ssh2
Dec 10 **REMOVED** sshd[22608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.171 user=root
Dec 10 **REMOVED** sshd[22608]: Failed password for root from 139.199.192.171 port 41480 ssh2 show less
Dec 10 20:34:33 [redacted] sshd[119098]: Failed password for root from 139.199.192.171 port 46424 ss ... show moreDec 10 20:34:33 [redacted] sshd[119098]: Failed password for root from 139.199.192.171 port 46424 ssh2
Dec 10 20:39:17 [redacted] sshd[119254]: Invalid user hacker from 139.199.192.171 port 52944
... show less
Dec 10 21:08:54 server2 sshd\[8438\]: Invalid user alvin from 139.199.192.171
Dec 10 21:10:46 ... show moreDec 10 21:08:54 server2 sshd\[8438\]: Invalid user alvin from 139.199.192.171
Dec 10 21:10:46 server2 sshd\[8710\]: User root from 139.199.192.171 not allowed because not listed in AllowUsers
Dec 10 21:11:33 server2 sshd\[8755\]: User root from 139.199.192.171 not allowed because not listed in AllowUsers
Dec 10 21:12:16 server2 sshd\[8808\]: User root from 139.199.192.171 not allowed because not listed in AllowUsers
Dec 10 21:12:55 server2 sshd\[8840\]: Invalid user galea from 139.199.192.171
Dec 10 21:13:37 server2 sshd\[8925\]: User root from 139.199.192.171 not allowed because not listed in AllowUsers show less
Dec 10 19:56:22 [host] sshd[22949]: Failed password for invalid user indico from 139.199.192.171 por ... show moreDec 10 19:56:22 [host] sshd[22949]: Failed password for invalid user indico from 139.199.192.171 por
Dec 10 19:56:23 [host] sshd[22949]: Disconnected from invalid user indico 139.199.192.171 port 52934
Dec 10 19:57:39 [host] sshd[23035]: Invalid user palm from 139.199.192.171 port 44226
Dec 10 19:57:39 [host] sshd[23035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid
Dec 10 19:57:42 [host] sshd[23035]: Failed password for invalid user palm from 139.199.192.171 port show less
Dec 10 19:39:36 [host] sshd[21889]: Invalid user deploy from 139.199.192.171 port 53168
Dec 10 ... show moreDec 10 19:39:36 [host] sshd[21889]: Invalid user deploy from 139.199.192.171 port 53168
Dec 10 19:39:36 [host] sshd[21889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid
Dec 10 19:39:38 [host] sshd[21889]: Failed password for invalid user deploy from 139.199.192.171 por
Dec 10 19:39:38 [host] sshd[21889]: Disconnected from invalid user deploy 139.199.192.171 port 53168
Dec 10 19:40:52 [host] sshd[21950]: Invalid user tool from 139.199.192.171 port 44458 show less
Dec 10 19:20:58 [host] sshd[20708]: Failed password for root from 139.199.192.171 port 53404 ssh2<br ... show moreDec 10 19:20:58 [host] sshd[20708]: Failed password for root from 139.199.192.171 port 53404 ssh2
Dec 10 19:20:58 [host] sshd[20708]: Disconnected from authenticating user root 139.199.192.171 port
Dec 10 19:22:45 [host] sshd[20779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid
Dec 10 19:22:47 [host] sshd[20779]: Failed password for root from 139.199.192.171 port 44710 ssh2
Dec 10 19:22:47 [host] sshd[20779]: Disconnected from authenticating user root 139.199.192.171 port show less
2023-12-10T18:45:58.924402+01:00 rico-j sshd[224926]: Connection from 139.199.192.171 port 59934 on ... show more2023-12-10T18:45:58.924402+01:00 rico-j sshd[224926]: Connection from 139.199.192.171 port 59934 on 5.45.102.214 port 22 rdomain ""
2023-12-10T18:46:00.247940+01:00 rico-j sshd[224926]: User root from 139.199.192.171 not allowed because not listed in AllowUsers
2023-12-10T18:46:50.478632+01:00 rico-j sshd[225327]: Connection from 139.199.192.171 port 44416 on 5.45.102.214 port 22 rdomain ""
2023-12-10T18:46:51.927518+01:00 rico-j sshd[225327]: Invalid user guillaume from 139.199.192.171 port 44416
... show less
Brute-ForceSSH
Anonymous
Dec 10 16:50:29 de-fra2-rpki1 sshd[3897626]: Invalid user administrator from 139.199.192.171 port 33 ... show moreDec 10 16:50:29 de-fra2-rpki1 sshd[3897626]: Invalid user administrator from 139.199.192.171 port 33830
Dec 10 17:03:07 de-fra2-rpki1 sshd[3898086]: Invalid user eric from 139.199.192.171 port 55032
Dec 10 17:04:18 de-fra2-rpki1 sshd[3898101]: Invalid user hari from 139.199.192.171 port 42400
... show less