This IP address has been reported a total of 4,349
times from 824 distinct
sources.
139.59.114.137 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-06-14T20:32:03.436270panel sshd[58337]: pam_unix(sshd:auth): authentication failure; logname= u ... show more2025-06-14T20:32:03.436270panel sshd[58337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T20:32:05.548591panel sshd[58337]: Failed password for invalid user omm from 139.59.114.137 port 48416 ssh2
2025-06-14T20:36:32.824005panel sshd[59176]: Invalid user youssef from 139.59.114.137 port 42402
2025-06-14T20:36:32.831963panel sshd[59176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T20:36:35.206110panel sshd[59176]: Failed password for invalid user youssef from 139.59.114.137 port 42402 ssh2
... show less
2025-06-14T19:20:09.031147panel sshd[45195]: pam_unix(sshd:auth): authentication failure; logname= u ... show more2025-06-14T19:20:09.031147panel sshd[45195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T19:20:11.240041panel sshd[45195]: Failed password for invalid user postgres from 139.59.114.137 port 51670 ssh2
2025-06-14T19:24:46.896957panel sshd[45999]: Invalid user titus from 139.59.114.137 port 35376
2025-06-14T19:24:46.903399panel sshd[45999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T19:24:48.138905panel sshd[45999]: Failed password for invalid user titus from 139.59.114.137 port 35376 ssh2
... show less
Jun 14 13:09:48 b146-02 sshd[297323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreJun 14 13:09:48 b146-02 sshd[297323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
Jun 14 13:09:50 b146-02 sshd[297323]: Failed password for invalid user zs from 139.59.114.137 port 47228 ssh2
Jun 14 13:19:32 b146-02 sshd[297943]: Invalid user postgres from 139.59.114.137 port 33286
... show less
2025-06-14T21:08:28.551954+02:00 apollo sshd[3378354]: Invalid user zs from 139.59.114.137 port 4878 ... show more2025-06-14T21:08:28.551954+02:00 apollo sshd[3378354]: Invalid user zs from 139.59.114.137 port 48788
... show less
2025-06-14T18:50:59.544912+00:00 v37833 sshd[371286]: pam_unix(sshd:auth): authentication failure; l ... show more2025-06-14T18:50:59.544912+00:00 v37833 sshd[371286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T18:51:01.508438+00:00 v37833 sshd[371286]: Failed password for invalid user autrede from 139.59.114.137 port 48152 ssh2
2025-06-14T18:55:31.693036+00:00 v37833 sshd[371324]: Invalid user rke from 139.59.114.137 port 38782
2025-06-14T18:55:31.695131+00:00 v37833 sshd[371324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T18:55:33.663229+00:00 v37833 sshd[371324]: Failed password for invalid user rke from 139.59.114.137 port 38782 ssh2
... show less
2025-06-14T18:22:49.168633+00:00 v37833 sshd[370989]: Failed password for invalid user ubuntu from 1 ... show more2025-06-14T18:22:49.168633+00:00 v37833 sshd[370989]: Failed password for invalid user ubuntu from 139.59.114.137 port 36426 ssh2
2025-06-14T18:27:27.933318+00:00 v37833 sshd[371055]: Invalid user yuxiang from 139.59.114.137 port 52216
2025-06-14T18:27:27.935521+00:00 v37833 sshd[371055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T18:27:29.723370+00:00 v37833 sshd[371055]: Failed password for invalid user yuxiang from 139.59.114.137 port 52216 ssh2
2025-06-14T18:32:03.314440+00:00 v37833 sshd[371084]: Invalid user runcloud from 139.59.114.137 port 52376
... show less
2025-06-14T18:04:43.268366+00:00 v37833 sshd[370817]: pam_unix(sshd:auth): authentication failure; l ... show more2025-06-14T18:04:43.268366+00:00 v37833 sshd[370817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T18:04:45.468038+00:00 v37833 sshd[370817]: Failed password for invalid user kp from 139.59.114.137 port 39690 ssh2
2025-06-14T18:09:18.834860+00:00 v37833 sshd[370852]: Invalid user syncuser from 139.59.114.137 port 33304
2025-06-14T18:09:18.837314+00:00 v37833 sshd[370852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T18:09:20.455034+00:00 v37833 sshd[370852]: Failed password for invalid user syncuser from 139.59.114.137 port 33304 ssh2
... show less
2025-06-14T17:37:31.417114+00:00 v37833 sshd[370601]: Failed password for invalid user celeryuser fr ... show more2025-06-14T17:37:31.417114+00:00 v37833 sshd[370601]: Failed password for invalid user celeryuser from 139.59.114.137 port 39210 ssh2
2025-06-14T17:42:03.475148+00:00 v37833 sshd[370657]: Invalid user kim from 139.59.114.137 port 54772
2025-06-14T17:42:03.477247+00:00 v37833 sshd[370657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T17:42:04.974401+00:00 v37833 sshd[370657]: Failed password for invalid user kim from 139.59.114.137 port 54772 ssh2
2025-06-14T17:46:40.893506+00:00 v37833 sshd[370677]: Invalid user scsadmin from 139.59.114.137 port 38300
... show less
2025-06-14T17:19:16.939470+00:00 v37833 sshd[370476]: Invalid user lucas from 139.59.114.137 port 38 ... show more2025-06-14T17:19:16.939470+00:00 v37833 sshd[370476]: Invalid user lucas from 139.59.114.137 port 38394
2025-06-14T17:19:16.941583+00:00 v37833 sshd[370476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T17:19:18.438993+00:00 v37833 sshd[370476]: Failed password for invalid user lucas from 139.59.114.137 port 38394 ssh2
2025-06-14T17:23:59.166361+00:00 v37833 sshd[370505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137 user=root
2025-06-14T17:24:01.511046+00:00 v37833 sshd[370505]: Failed password for root from 139.59.114.137 port 59740 ssh2
... show less
2025-06-14T16:56:29.431462+00:00 v37833 sshd[370314]: pam_unix(sshd:auth): authentication failure; l ... show more2025-06-14T16:56:29.431462+00:00 v37833 sshd[370314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T16:56:31.931621+00:00 v37833 sshd[370314]: Failed password for invalid user riad from 139.59.114.137 port 46836 ssh2
2025-06-14T17:01:03.665093+00:00 v37833 sshd[370344]: Invalid user patrol from 139.59.114.137 port 34456
2025-06-14T17:01:03.667230+00:00 v37833 sshd[370344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
2025-06-14T17:01:05.781805+00:00 v37833 sshd[370344]: Failed password for invalid user patrol from 139.59.114.137 port 34456 ssh2
... show less
Jun 14 10:37:26 b146-InstructorA sshd[2580532]: Failed password for invalid user ubuntu from 139.59. ... show moreJun 14 10:37:26 b146-InstructorA sshd[2580532]: Failed password for invalid user ubuntu from 139.59.114.137 port 47936 ssh2
Jun 14 10:49:39 b146-InstructorA sshd[2581206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137 user=root
Jun 14 10:49:41 b146-InstructorA sshd[2581206]: Failed password for root from 139.59.114.137 port 56300 ssh2
... show less
Jun 14 18:16:17 OPSO sshd\[28125\]: Invalid user rke from 139.59.114.137 port 60160
Jun 14 18: ... show moreJun 14 18:16:17 OPSO sshd\[28125\]: Invalid user rke from 139.59.114.137 port 60160
Jun 14 18:16:17 OPSO sshd\[28125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
Jun 14 18:16:19 OPSO sshd\[28125\]: Failed password for invalid user rke from 139.59.114.137 port 60160 ssh2
Jun 14 18:20:59 OPSO sshd\[28785\]: Invalid user ansadmin from 139.59.114.137 port 48844
Jun 14 18:20:59 OPSO sshd\[28785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137 show less
Jun 14 17:57:17 OPSO sshd\[25336\]: Invalid user develop from 139.59.114.137 port 50336
Jun 14 ... show moreJun 14 17:57:17 OPSO sshd\[25336\]: Invalid user develop from 139.59.114.137 port 50336
Jun 14 17:57:17 OPSO sshd\[25336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137
Jun 14 17:57:19 OPSO sshd\[25336\]: Failed password for invalid user develop from 139.59.114.137 port 50336 ssh2
Jun 14 18:01:46 OPSO sshd\[26125\]: Invalid user telegram from 139.59.114.137 port 36126
Jun 14 18:01:46 OPSO sshd\[26125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.137 show less
SSH
Showing 1 to
15
of 4349 reports
Is this your IP? You may request to takedown any associated reports.
We will attempt to verify your ownership. Request Takedown 🚩