This IP address has been reported a total of 18,397
times from 1,311 distinct
sources.
139.59.16.54 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 10 22:09:19 pve sshd[1884001]: Invalid user general from 139.59.16.54 port 38514
Dec 10 22 ... show moreDec 10 22:09:19 pve sshd[1884001]: Invalid user general from 139.59.16.54 port 38514
Dec 10 22:12:58 pve sshd[1891667]: Invalid user brittany from 139.59.16.54 port 47108
Dec 10 22:15:26 pve sshd[1895939]: Invalid user ahmet from 139.59.16.54 port 33940
Dec 10 22:16:39 pve sshd[1901637]: Invalid user sonner from 139.59.16.54 port 55586
Dec 10 22:17:49 pve sshd[1903216]: Invalid user 2 from 139.59.16.54 port 48994
... show less
2023-12-10T20:15:05.754608+01:00 khatuna sshd[1460878]: pam_unix(sshd:auth): authentication failure; ... show more2023-12-10T20:15:05.754608+01:00 khatuna sshd[1460878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54 user=root
2023-12-10T20:15:08.103545+01:00 khatuna sshd[1460878]: Failed password for root from 139.59.16.54 port 48342 ssh2
2023-12-10T20:16:17.584400+01:00 khatuna sshd[1462633]: Invalid user ahmet from 139.59.16.54 port 41756
2023-12-10T20:16:17.587118+01:00 khatuna sshd[1462633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54
2023-12-10T20:16:19.153692+01:00 khatuna sshd[1462633]: Failed password for invalid user ahmet from 139.59.16.54 port 41756 ssh2
... show less
Dec 10 21:46:15 pve sshd[1837990]: Invalid user notice from 139.59.16.54 port 50362
Dec 10 21: ... show moreDec 10 21:46:15 pve sshd[1837990]: Invalid user notice from 139.59.16.54 port 50362
Dec 10 21:47:40 pve sshd[1839425]: Invalid user sdg from 139.59.16.54 port 43796
Dec 10 21:51:12 pve sshd[1843331]: Invalid user cq from 139.59.16.54 port 52270
Dec 10 21:52:23 pve sshd[1845198]: Invalid user aris from 139.59.16.54 port 45670
Dec 10 21:53:34 pve sshd[1846605]: Invalid user jaspreet from 139.59.16.54 port 39068
... show less
139.59.16.54 (139.59.16.54) - SSH Brute force:
Dec 10 21:47:07 XWEB sshd[242948]: Invalid user ... show more139.59.16.54 (139.59.16.54) - SSH Brute force:
Dec 10 21:47:07 XWEB sshd[242948]: Invalid user notice from 139.59.16.54 port 45892
Dec 10 21:47:07 XWEB sshd[242948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54
Dec 10 21:47:10 XWEB sshd[242948]: Failed password for invalid user notice from 139.59.16.54 port 45892 ssh2
... show less
Brute-ForceSSH
Anonymous
Dec 10 17:53:35 de-fra2-dns2 sshd[1860057]: Invalid user alfa from 139.59.16.54 port 34358
Dec ... show moreDec 10 17:53:35 de-fra2-dns2 sshd[1860057]: Invalid user alfa from 139.59.16.54 port 34358
Dec 10 17:54:59 de-fra2-dns2 sshd[1860142]: Invalid user qin from 139.59.16.54 port 59678
Dec 10 17:56:17 de-fra2-dns2 sshd[1860222]: Invalid user ubuntu from 139.59.16.54 port 56758
... show less
2023-12-10T15:38:05.818555+00:00 Linux101 sshd[1500409]: Failed password for invalid user deploy fro ... show more2023-12-10T15:38:05.818555+00:00 Linux101 sshd[1500409]: Failed password for invalid user deploy from 139.59.16.54 port 39730 ssh2
2023-12-10T15:39:20.336546+00:00 Linux101 sshd[1534620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54 user=root
2023-12-10T15:39:22.561355+00:00 Linux101 sshd[1534620]: Failed password for root from 139.59.16.54 port 37130 ssh2
2023-12-10T15:40:38.720710+00:00 Linux101 sshd[1565955]: Invalid user jake from 139.59.16.54 port 34538
2023-12-10T15:40:38.722557+00:00 Linux101 sshd[1565955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54
2023-12-10T15:40:40.654549+00:00 Linux101 sshd[1565955]: Failed password for invalid user jake from 139.59.16.54 port 34538 ssh2
2023-12-10T15:41:57.856353+00:00 Linux101 sshd[1592422]: Invalid user csgoserver from 139.59.16.54 port 60178
2023-12-10T15:41:57.858137+00:00 Linux101 sshd[1592422]: pam_unix(sshd:auth): auth
... show less
Unauthorized connection attempt detected from IP address 139.59.16.54 on port TCP/22
... show moreUnauthorized connection attempt detected from IP address 139.59.16.54 on port TCP/22
Check us on : https://github.com/duggytuxy/malicious_ip_addresses show less
Unauthorized connection attempt detected from IP address 139.59.16.54 on port TCP/22
... show moreUnauthorized connection attempt detected from IP address 139.59.16.54 on port TCP/22
Check us on : https://github.com/duggytuxy/malicious_ip_addresses show less
2023-12-10T17:21:09.001556lavrinenko.info sshd[15535]: Invalid user lch from 139.59.16.54 port 44762 ... show more2023-12-10T17:21:09.001556lavrinenko.info sshd[15535]: Invalid user lch from 139.59.16.54 port 44762
2023-12-10T17:21:09.010161lavrinenko.info sshd[15535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54
2023-12-10T17:21:09.001556lavrinenko.info sshd[15535]: Invalid user lch from 139.59.16.54 port 44762
2023-12-10T17:21:10.792796lavrinenko.info sshd[15535]: Failed password for invalid user lch from 139.59.16.54 port 44762 ssh2
2023-12-10T17:22:27.751241lavrinenko.info sshd[15601]: Invalid user ubuntu from 139.59.16.54 port 42094
... show less
2023-12-10T16:52:09.986101lavrinenko.info sshd[14006]: Failed password for root from 139.59.16.54 po ... show more2023-12-10T16:52:09.986101lavrinenko.info sshd[14006]: Failed password for root from 139.59.16.54 port 46440 ssh2
2023-12-10T16:53:25.700134lavrinenko.info sshd[14087]: Invalid user wanghao from 139.59.16.54 port 43772
2023-12-10T16:53:25.709324lavrinenko.info sshd[14087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54
2023-12-10T16:53:25.700134lavrinenko.info sshd[14087]: Invalid user wanghao from 139.59.16.54 port 43772
2023-12-10T16:53:28.055161lavrinenko.info sshd[14087]: Failed password for invalid user wanghao from 139.59.16.54 port 43772 ssh2
... show less
Dec 10 14:57:25 hosting sshd[3362404]: Invalid user delta from 139.59.16.54 port 52338
Dec 10 ... show moreDec 10 14:57:25 hosting sshd[3362404]: Invalid user delta from 139.59.16.54 port 52338
Dec 10 14:57:25 hosting sshd[3362404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54
Dec 10 14:57:27 hosting sshd[3362404]: Failed password for invalid user delta from 139.59.16.54 port 52338 ssh2 show less
Dec 10 14:14:27 web-main sshd[2420718]: Invalid user transfer from 139.59.16.54 port 58886
Dec ... show moreDec 10 14:14:27 web-main sshd[2420718]: Invalid user transfer from 139.59.16.54 port 58886
Dec 10 14:14:29 web-main sshd[2420718]: Failed password for invalid user transfer from 139.59.16.54 port 58886 ssh2
Dec 10 14:19:54 web-main sshd[2422504]: Invalid user teacher from 139.59.16.54 port 51766 show less