This IP address has been reported a total of 27,891
times from 1,608 distinct
sources.
139.59.16.54 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-24T23:49:44.665847+00:00 mail-backup sshd[7871]: User root from 139.59.16.54 not allowed bec ... show more2024-09-24T23:49:44.665847+00:00 mail-backup sshd[7871]: User root from 139.59.16.54 not allowed because not listed in AllowUsers
2024-09-24T23:50:41.629308+00:00 mail-backup sshd[7875]: User root from 139.59.16.54 not allowed because not listed in AllowUsers
2024-09-24T23:51:26.174138+00:00 mail-backup sshd[7879]: Invalid user adminftp from 139.59.16.54 port 52574 show less
Sep 25 01:44:12 <server> sshd\[17058\]: User root from 139.59.16.54 not allowed because not listed i ... show moreSep 25 01:44:12 <server> sshd\[17058\]: User root from 139.59.16.54 not allowed because not listed in AllowUsersSep 25 01:44:14 <server> sshd\[17058\]: Failed password for invalid user root from 139.59.16.54 port 47594 ssh2
... show less
Sep 25 01:09:09 Administration sshd[84075]: Invalid user test from 139.59.16.54 port 41870
Sep ... show moreSep 25 01:09:09 Administration sshd[84075]: Invalid user test from 139.59.16.54 port 41870
Sep 25 01:09:11 Administration sshd[84075]: Failed password for invalid user test from 139.59.16.54 port 41870 ssh2
Sep 25 01:09:54 Administration sshd[84124]: Invalid user thomas from 139.59.16.54 port 54216
Sep 25 01:09:54 Administration sshd[84124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.54
Sep 25 01:09:54 Administration sshd[84124]: Invalid user thomas from 139.59.16.54 port 54216
Sep 25 01:09:56 Administration sshd[84124]: Failed password for invalid user thomas from 139.59.16.54 port 54216 ssh2
Sep 25 01:10:38 Administration sshd[84178]: Invalid user steam from 139.59.16.54 port 38326
... show less
2024-09-24T22:25:24.051085+02:00 pingusmc sshd-session[871665]: Invalid user chris from 139.59.16.54 ... show more2024-09-24T22:25:24.051085+02:00 pingusmc sshd-session[871665]: Invalid user chris from 139.59.16.54 port 46994
2024-09-24T22:26:49.739571+02:00 pingusmc sshd-session[871825]: Invalid user ronald from 139.59.16.54 port 43468
2024-09-24T22:27:32.803157+02:00 pingusmc sshd-session[871881]: Invalid user david from 139.59.16.54 port 55822
2024-09-24T22:28:13.927964+02:00 pingusmc sshd-session[871966]: Invalid user cacti from 139.59.16.54 port 39942
2024-09-24T22:28:56.058052+02:00 pingusmc sshd-session[872046]: Invalid user admin from 139.59.16.54 port 52294
... show less
2024-09-24T19:49:08.603932+00:00 edge-zap-akl01.int.pdx.net.uk sshd[1534910]: Invalid user admin fro ... show more2024-09-24T19:49:08.603932+00:00 edge-zap-akl01.int.pdx.net.uk sshd[1534910]: Invalid user admin from 139.59.16.54 port 59694
2024-09-24T19:50:49.468983+00:00 edge-zap-akl01.int.pdx.net.uk sshd[1534998]: Invalid user daniel from 139.59.16.54 port 51670
2024-09-24T19:52:19.001501+00:00 edge-zap-akl01.int.pdx.net.uk sshd[1535067]: Invalid user admin from 139.59.16.54 port 49124
... show less
Sep 24 22:47:51 betelgeuse sshd[803268]: Invalid user admin from 139.59.16.54 port 58368
Sep 2 ... show moreSep 24 22:47:51 betelgeuse sshd[803268]: Invalid user admin from 139.59.16.54 port 58368
Sep 24 22:51:32 betelgeuse sshd[884031]: Invalid user daniel from 139.59.16.54 port 39268
... show less