This IP address has been reported a total of 489
times from 295 distinct
sources.
139.59.2.166 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
May 28 23:22:37 hera sshd[714635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreMay 28 23:22:37 hera sshd[714635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 28 23:22:39 hera sshd[714635]: Failed password for invalid user solana from 139.59.2.166 port 53186 ssh2
May 28 23:22:44 hera sshd[714659]: Invalid user latitude from 139.59.2.166 port 46878
... show less
2024-05-28T21:14:06.063447+00:00 vps-6592 sshd[287755]: Failed password for invalid user solana from ... show more2024-05-28T21:14:06.063447+00:00 vps-6592 sshd[287755]: Failed password for invalid user solana from 139.59.2.166 port 51424 ssh2
2024-05-28T21:14:11.614100+00:00 vps-6592 sshd[287757]: Invalid user latitude from 139.59.2.166 port 44918
2024-05-28T21:14:11.756952+00:00 vps-6592 sshd[287757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
2024-05-28T21:14:14.377161+00:00 vps-6592 sshd[287757]: Failed password for invalid user latitude from 139.59.2.166 port 44918 ssh2
2024-05-28T21:14:19.265347+00:00 vps-6592 sshd[287759]: Invalid user nft from 139.59.2.166 port 38408
... show less
May 28 22:05:58 jumphost sshd[1100436]: Connection from 139.59.2.166 port 49496 on 192.168.1.4 port ... show moreMay 28 22:05:58 jumphost sshd[1100436]: Connection from 139.59.2.166 port 49496 on 192.168.1.4 port 22 rdomain ""
May 28 22:05:59 jumphost sshd[1100436]: Invalid user latitude from 139.59.2.166 port 49496
... show less
2024-05-28T21:05:31.397863+00:00 pesterchum sshd[347824]: Connection closed by 139.59.2.166 port 578 ... show more2024-05-28T21:05:31.397863+00:00 pesterchum sshd[347824]: Connection closed by 139.59.2.166 port 57812
2024-05-28T21:05:55.182396+00:00 pesterchum sshd[347826]: Invalid user solana from 139.59.2.166 port 44442
2024-05-28T21:05:55.535101+00:00 pesterchum sshd[347826]: Connection closed by invalid user solana 139.59.2.166 port 44442 [preauth]
... show less
2024-05-28T22:57:41.705501+02:00 tor01-ca-pop.as202427.net sshd[2296705]: Invalid user solana from 1 ... show more2024-05-28T22:57:41.705501+02:00 tor01-ca-pop.as202427.net sshd[2296705]: Invalid user solana from 139.59.2.166 port 43206
2024-05-28T22:57:49.289277+02:00 tor01-ca-pop.as202427.net sshd[2296708]: Invalid user latitude from 139.59.2.166 port 37124
2024-05-28T22:57:57.061873+02:00 tor01-ca-pop.as202427.net sshd[2296712]: Invalid user nft from 139.59.2.166 port 59270
... show less
PBK May 28 22:57:40 websrv01 sshd[1801341]: Failed password for invalid user solana from 139.59.2.16 ... show morePBK May 28 22:57:40 websrv01 sshd[1801341]: Failed password for invalid user solana from 139.59.2.166 port 46068 ssh2
May 28 22:57:45 websrv01 sshd[1801343]: Invalid user latitude from 139.59.2.166 port 39986
May 28 22:57:45 websrv01 sshd[1801343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 28 22:57:47 websrv01 sshd[1801343]: Failed password for invalid user latitude from 139.59.2.166 port 39986 ssh2
May 28 22:57:53 websrv01 sshd[1801348]: Invalid user nft from 139.59.2.166 port 33898 show less
2024-05-28T20:57:40.790354+00:00 SPWSVPN001 sshd[1358405]: Failed password for invalid user solana f ... show more2024-05-28T20:57:40.790354+00:00 SPWSVPN001 sshd[1358405]: Failed password for invalid user solana from 139.59.2.166 port 33260 ssh2
2024-05-28T20:57:45.539180+00:00 SPWSVPN001 sshd[1358479]: Invalid user latitude from 139.59.2.166 port 55410
2024-05-28T20:57:45.719063+00:00 SPWSVPN001 sshd[1358479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
2024-05-28T20:57:47.647546+00:00 SPWSVPN001 sshd[1358479]: Failed password for invalid user latitude from 139.59.2.166 port 55410 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-05-29T04:57:40.919029cvm-3jsy9v825i225.novalocal sshd[25862]: Failed password for invalid user ... show more2024-05-29T04:57:40.919029cvm-3jsy9v825i225.novalocal sshd[25862]: Failed password for invalid user solana from 139.59.2.166 port 51318 ssh2
2024-05-29T04:57:45.705792cvm-3jsy9v825i225.novalocal sshd[25864]: Invalid user latitude from 139.59.2.166 port 45236
2024-05-29T04:57:45.803658cvm-3jsy9v825i225.novalocal sshd[25864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
2024-05-29T04:57:47.731541cvm-3jsy9v825i225.novalocal sshd[25864]: Failed password for invalid user latitude from 139.59.2.166 port 45236 ssh2
... show less
2024-05-29T04:49:19.030618+08:00 raspberrypi sshd[646812]: Invalid user solana from 139.59.2.166 por ... show more2024-05-29T04:49:19.030618+08:00 raspberrypi sshd[646812]: Invalid user solana from 139.59.2.166 port 38670
2024-05-29T04:49:26.849768+08:00 raspberrypi sshd[646824]: Invalid user latitude from 139.59.2.166 port 60638
2024-05-29T04:49:34.674874+08:00 raspberrypi sshd[646836]: Invalid user nft from 139.59.2.166 port 54372
... show less