This IP address has been reported a total of 831
times from 297 distinct
sources.
139.59.137.73 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
2025-05-01T22:53:39.147411-07:00 insomnia sshd-session[1265990]: pam_unix(sshd:auth): authentication ... show more2025-05-01T22:53:39.147411-07:00 insomnia sshd-session[1265990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73
2025-05-01T22:53:41.564396-07:00 insomnia sshd-session[1265990]: Failed password for invalid user one from 139.59.137.73 port 34368 ssh2
2025-05-01T22:58:46.215574-07:00 insomnia sshd-session[1266507]: Invalid user himanshu from 139.59.137.73 port 39534
2025-05-01T22:58:46.222781-07:00 insomnia sshd-session[1266507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73
2025-05-01T22:58:48.621046-07:00 insomnia sshd-session[1266507]: Failed password for invalid user himanshu from 139.59.137.73 port 39534 ssh2
... show less
sshd[970867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos ... show moresshd[970867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73 user=root
sshd[970867]: Failed password for root from 139.59.137.73 port 48012 ssh2
sshd[971253]: Invalid user one from 139.59.137.73 port 52664
sshd[971253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73
sshd[971253]: Failed password for invalid user one from 139.59.137.73 port 52664 ssh2 show less
2025-05-02T07:34:15.502606+02:00 ezri sshd[566181]: User root from 139.59.137.73 not allowed because ... show more2025-05-02T07:34:15.502606+02:00 ezri sshd[566181]: User root from 139.59.137.73 not allowed because not listed in AllowUsers
2025-05-02T07:34:15.529494+02:00 ezri sshd[566181]: Disconnected from invalid user root 139.59.137.73 port 35066 [preauth]
2025-05-02T07:42:09.655998+02:00 ezri sshd[566858]: User root from 139.59.137.73 not allowed because not listed in AllowUsers
... show less
2025-05-02T03:40:41.699064+00:00 robotstxt-mantenimiento sshd[364764]: Invalid user minikube from 13 ... show more2025-05-02T03:40:41.699064+00:00 robotstxt-mantenimiento sshd[364764]: Invalid user minikube from 139.59.137.73 port 37214
2025-05-02T03:45:46.719435+00:00 robotstxt-mantenimiento sshd[365024]: Invalid user tomcat from 139.59.137.73 port 59530
2025-05-02T03:50:47.511427+00:00 robotstxt-mantenimiento sshd[365274]: Invalid user ubuntu from 139.59.137.73 port 33778
... show less
2025-05-02T05:28:53.389051+02:00 fusco sshd[3003008]: Failed password for invalid user victor from 1 ... show more2025-05-02T05:28:53.389051+02:00 fusco sshd[3003008]: Failed password for invalid user victor from 139.59.137.73 port 48742 ssh2
2025-05-02T05:36:18.073656+02:00 fusco sshd[3013387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73 user=root
2025-05-02T05:36:20.242982+02:00 fusco sshd[3013387]: Failed password for root from 139.59.137.73 port 60760 ssh2
... show less
[rede-arem1] (sshd) Failed SSH login from 139.59.137.73 (DE/Germany/-): 5 in the last 3600 secs; Por ... show more[rede-arem1] (sshd) Failed SSH login from 139.59.137.73 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 1 23:34:15 sshd[12092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73 user=[USERNAME]
May 1 23:34:17 sshd[12092]: Failed password for [USERNAME] from 139.59.137.73 port 41190 ssh2
May 1 23:39:12 sshd[12228]: Invalid user [USERNAME] from 139.59.137.73 port 35520
May 1 23:39:14 sshd[12228]: Failed password for invalid user [USERNAME] from 139.59.137.73 port 35520 ssh2
May 1 23:44:09 sshd[12403]: pam_unix(sshd:auth): authentication f show less
2025-05-02T01:34:51.136590+00:00 ccoo-database-dev sshd[797165]: Invalid user kafka from 139.59.137. ... show more2025-05-02T01:34:51.136590+00:00 ccoo-database-dev sshd[797165]: Invalid user kafka from 139.59.137.73 port 55004
2025-05-02T01:39:50.042508+00:00 ccoo-database-dev sshd[797370]: Invalid user testing from 139.59.137.73 port 52164
2025-05-02T01:44:40.676779+00:00 ccoo-database-dev sshd[797555]: Invalid user dennis from 139.59.137.73 port 34390
... show less
[rede-arem1] (sshd) Failed SSH login from 139.59.137.73 (DE/Germany/-): 5 in the last 3600 secs; Por ... show more[rede-arem1] (sshd) Failed SSH login from 139.59.137.73 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 1 22:16:30 sshd[9666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73 user=[USERNAME]
May 1 22:16:32 sshd[9666]: Failed password for [USERNAME] from 139.59.137.73 port 55620 ssh2
May 1 22:25:49 sshd[9950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73 user=[USERNAME]
May 1 22:25:51 sshd[9950]: Failed password for [USERNAME] from 139.59.137.73 port 59312 ssh2
May 1 22:30:52 ss show less
Port Scan
Anonymous
139.59.137.73 (DE/Germany/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Po ... show more139.59.137.73 (DE/Germany/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: May 1 21:12:03 server2 sshd[1865]: Failed password for root from 45.232.73.84 port 39460 ssh2
May 1 21:19:05 server2 sshd[3806]: Failed password for root from 139.59.137.73 port 35842 ssh2
May 1 21:21:58 server2 sshd[4751]: Failed password for root from 152.32.172.117 port 39312 ssh2
May 1 21:12:39 server2 sshd[2021]: Failed password for root from 155.248.164.42 port 33986 ssh2
May 1 21:11:16 server2 sshd[1609]: Failed password for root from 212.159.71.187 port 34836 ssh2
2025-05-01T23:47:12.946707+00:00 ephialtes2 sshd[3298856]: Failed password for invalid user dev from ... show more2025-05-01T23:47:12.946707+00:00 ephialtes2 sshd[3298856]: Failed password for invalid user dev from 139.59.137.73 port 34028 ssh2
2025-05-02T00:21:53.541054+00:00 ephialtes2 sshd[3309399]: Invalid user vuser from 139.59.137.73 port 46772
2025-05-02T00:21:53.541054+00:00 ephialtes2 sshd[3309399]: Invalid user vuser from 139.59.137.73 port 46772
2025-05-02T00:21:53.542192+00:00 ephialtes2 sshd[3309399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73
2025-05-02T00:21:55.311568+00:00 ephialtes2 sshd[3309399]: Failed password for invalid user vuser from 139.59.137.73 port 46772 ssh2
... show less
Brute-ForceSSH
Anonymous
2025-05-01T23:32:37.925020+00:00 ephialtes2 sshd[3294567]: Failed password for invalid user test fro ... show more2025-05-01T23:32:37.925020+00:00 ephialtes2 sshd[3294567]: Failed password for invalid user test from 139.59.137.73 port 54344 ssh2
2025-05-01T23:39:10.954229+00:00 ephialtes2 sshd[3296505]: Invalid user supermaint from 139.59.137.73 port 36686
2025-05-01T23:39:10.955632+00:00 ephialtes2 sshd[3296505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.137.73
2025-05-01T23:39:13.538069+00:00 ephialtes2 sshd[3296505]: Failed password for invalid user supermaint from 139.59.137.73 port 36686 ssh2
2025-05-01T23:47:10.468253+00:00 ephialtes2 sshd[3298856]: Invalid user dev from 139.59.137.73 port 34028
... show less
2025-05-01T23:25:00.899493+00:00 nzxldotspace sshd[1535193]: Invalid user test from 139.59.137.73 po ... show more2025-05-01T23:25:00.899493+00:00 nzxldotspace sshd[1535193]: Invalid user test from 139.59.137.73 port 41362
2025-05-01T23:36:55.002827+00:00 nzxldotspace sshd[1535390]: Invalid user supermaint from 139.59.137.73 port 52880
2025-05-01T23:44:54.291424+00:00 nzxldotspace sshd[1535478]: Invalid user dev from 139.59.137.73 port 50394
... show less
2025-05-02T01:26:52.770288+02:00 yucca sshd[1282263]: Invalid user test from 139.59.137.73 port 4244 ... show more2025-05-02T01:26:52.770288+02:00 yucca sshd[1282263]: Invalid user test from 139.59.137.73 port 42442
... show less
Brute-ForceSSH
Showing 61 to
75
of 831 reports
Is this your IP? You may request to takedown any associated reports.
We will attempt to verify your ownership. Request Takedown 🚩