This IP address has been reported a total of 458
times from 212 distinct
sources.
139.59.160.149 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
spam or other hacking activities reported by webbfabriken security servers
Attack reported by ... show morespam or other hacking activities reported by webbfabriken security servers
Attack reported by Webbfabiken Security API - WFSecAPI show less
Aug 14 11:31:25 OPSO sshd\[13724\]: Invalid user ethereum from 139.59.160.149 port 60350
Aug 1 ... show moreAug 14 11:31:25 OPSO sshd\[13724\]: Invalid user ethereum from 139.59.160.149 port 60350
Aug 14 11:31:25 OPSO sshd\[13724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.160.149
Aug 14 11:31:28 OPSO sshd\[13724\]: Failed password for invalid user ethereum from 139.59.160.149 port 60350 ssh2
Aug 14 11:37:20 OPSO sshd\[14309\]: Invalid user cardano from 139.59.160.149 port 51766
Aug 14 11:37:20 OPSO sshd\[14309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.160.149 show less
Aug 14 11:30:54 pinkypie sshd[4048149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreAug 14 11:30:54 pinkypie sshd[4048149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.160.149
Aug 14 11:30:56 pinkypie sshd[4048149]: Failed password for invalid user ethereum from 139.59.160.149 port 33906 ssh2
Aug 14 11:36:48 pinkypie sshd[4048366]: Invalid user cardano from 139.59.160.149 port 54000
... show less
Aug 14 09:30:24 mark sshd[831402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreAug 14 09:30:24 mark sshd[831402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.160.149
Aug 14 09:30:26 mark sshd[831402]: Failed password for invalid user ethereum from 139.59.160.149 port 48768 ssh2
Aug 14 09:36:19 mark sshd[862831]: Invalid user cardano from 139.59.160.149 port 38198
Aug 14 09:36:19 mark sshd[862831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.160.149
Aug 14 09:36:21 mark sshd[862831]: Failed password for invalid user cardano from 139.59.160.149 port 38198 ssh2
... show less
Aug 14 16:58:45 instance-20240509-2208 sshd[1717907]: Invalid user node from 139.59.160.149 port 453 ... show moreAug 14 16:58:45 instance-20240509-2208 sshd[1717907]: Invalid user node from 139.59.160.149 port 45380
Aug 14 17:04:37 instance-20240509-2208 sshd[1720587]: Invalid user validator from 139.59.160.149 port 38180
Aug 14 17:16:22 instance-20240509-2208 sshd[1725875]: Invalid user solana from 139.59.160.149 port 35672
Aug 14 17:22:17 instance-20240509-2208 sshd[1728544]: Invalid user sol from 139.59.160.149 port 42500
Aug 14 17:28:10 instance-20240509-2208 sshd[1731186]: Invalid user avax from 139.59.160.149 port 57040
... show less
Brute-ForceSSH
Anonymous
Aug 14 11:14:01 bonsai sshd[31571]: Invalid user solana from 139.59.160.149
Aug 14 11:19:55 bo ... show moreAug 14 11:14:01 bonsai sshd[31571]: Invalid user solana from 139.59.160.149
Aug 14 11:19:55 bonsai sshd[32299]: Invalid user sol from 139.59.160.149
Aug 14 11:25:49 bonsai sshd[567]: Invalid user avax from 139.59.160.149
... show less
2024-08-14T11:00:23.721881+02:00 Linux10 sshd[1872853]: Failed password for invalid user validator f ... show more2024-08-14T11:00:23.721881+02:00 Linux10 sshd[1872853]: Failed password for invalid user validator from 139.59.160.149 port 42898 ssh2
2024-08-14T11:06:13.924783+02:00 Linux10 sshd[1884943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.160.149 user=root
2024-08-14T11:06:15.767876+02:00 Linux10 sshd[1884943]: Failed password for root from 139.59.160.149 port 45312 ssh2
2024-08-14T11:12:06.658942+02:00 Linux10 sshd[1896289]: Invalid user solana from 139.59.160.149 port 58520
2024-08-14T11:12:06.701472+02:00 Linux10 sshd[1896289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.160.149
2024-08-14T11:12:09.007275+02:00 Linux10 sshd[1896289]: Failed password for invalid user solana from 139.59.160.149 port 58520 ssh2
2024-08-14T11:17:59.883107+02:00 Linux10 sshd[1907827]: Invalid user sol from 139.59.160.149 port 41920
2024-08-14T11:17:59.924296+02:00 Linux10 sshd[1907827]: pam_unix(sshd:auth)
... show less
Aug 14 10:56:37 racetecweb sshd[580066]: Invalid user node from 139.59.160.149 port 49348
Aug ... show moreAug 14 10:56:37 racetecweb sshd[580066]: Invalid user node from 139.59.160.149 port 49348
Aug 14 11:08:18 racetecweb sshd[580172]: User root from 139.59.160.149 not allowed because not listed in AllowUsers
Aug 14 11:20:05 racetecweb sshd[580387]: Invalid user sol from 139.59.160.149 port 33082
... show less