This IP address has been reported a total of 489
times from 295 distinct
sources.
139.59.2.166 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
May 29 03:25:59 203-66-14-22 sshd[3129784]: pam_unix(sshd:auth): authentication failure; logname= ui ... show moreMay 29 03:25:59 203-66-14-22 sshd[3129784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 29 03:26:01 203-66-14-22 sshd[3129784]: Failed password for invalid user solana from 139.59.2.166 port 41578 ssh2
May 29 03:26:07 203-66-14-22 sshd[3129791]: Invalid user latitude from 139.59.2.166 port 36016
... show less
2024-05-28T19:25:55.011428 APOLLO sshd[26898]: pam_unix(sshd:auth): authentication failure; logname= ... show more2024-05-28T19:25:55.011428 APOLLO sshd[26898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
2024-05-28T19:25:57.512014 APOLLO sshd[26898]: Failed password for invalid user solana from 139.59.2.166 port 48286 ssh2
2024-05-28T19:26:02.551430 APOLLO sshd[26900]: Invalid user latitude from 139.59.2.166 port 42726
... show less
2024-05-28T15:25:54.365050-04:00 endlessh-abuse sshd[867105]: pam_unix(sshd:auth): authentication fa ... show more2024-05-28T15:25:54.365050-04:00 endlessh-abuse sshd[867105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
2024-05-28T15:25:56.394530-04:00 endlessh-abuse sshd[867105]: Failed password for invalid user solana from 139.59.2.166 port 58586 ssh2
... show less
2024-05-28T15:17:36.949984-04:00 Fubuki sshd[2962057]: Failed password for invalid user solana from ... show more2024-05-28T15:17:36.949984-04:00 Fubuki sshd[2962057]: Failed password for invalid user solana from 139.59.2.166 port 40716 ssh2
2024-05-28T15:17:42.009293-04:00 Fubuki sshd[2962102]: Invalid user latitude from 139.59.2.166 port 34920
2024-05-28T15:17:42.625623-04:00 Fubuki sshd[2962102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
2024-05-28T15:17:45.115735-04:00 Fubuki sshd[2962102]: Failed password for invalid user latitude from 139.59.2.166 port 34920 ssh2
2024-05-28T15:17:49.825945-04:00 Fubuki sshd[2962218]: Invalid user nft from 139.59.2.166 port 57356
... show less
May 29 06:17:35 electronicohost sshd[1067237]: Failed password for invalid user solana from 139.59.2 ... show moreMay 29 06:17:35 electronicohost sshd[1067237]: Failed password for invalid user solana from 139.59.2.166 port 59066 ssh2
May 29 06:17:40 electronicohost sshd[1067242]: Invalid user latitude from 139.59.2.166 port 53270
May 29 06:17:41 electronicohost sshd[1067242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 29 06:17:42 electronicohost sshd[1067242]: Failed password for invalid user latitude from 139.59.2.166 port 53270 ssh2
May 29 06:17:48 electronicohost sshd[1067244]: Invalid user nft from 139.59.2.166 port 47474 show less
May 29 03:17:33 doubuntu sshd[24609]: Invalid user solana from 139.59.2.166 port 56334
May 29 ... show moreMay 29 03:17:33 doubuntu sshd[24609]: Invalid user solana from 139.59.2.166 port 56334
May 29 03:17:34 doubuntu sshd[24609]: Connection closed by invalid user solana 139.59.2.166 port 56334 [preauth]
May 29 03:17:42 doubuntu sshd[24611]: Invalid user latitude from 139.59.2.166 port 50538
... show less
Brute-ForceSSH
Anonymous
May 28 19:17:35 f2b auth.info sshd[770563]: Invalid user solana from 139.59.2.166 port 45226
M ... show moreMay 28 19:17:35 f2b auth.info sshd[770563]: Invalid user solana from 139.59.2.166 port 45226
May 28 19:17:35 f2b auth.info sshd[770563]: Failed password for invalid user solana from 139.59.2.166 port 45226 ssh2
May 28 19:17:43 f2b auth.info sshd[770565]: Invalid user latitude from 139.59.2.166 port 39434
... show less
May 28 19:09:22 3mod sshd[2198660]: Failed password for invalid user solana from 139.59.2.166 port 3 ... show moreMay 28 19:09:22 3mod sshd[2198660]: Failed password for invalid user solana from 139.59.2.166 port 35048 ssh2
May 28 19:09:26 3mod sshd[2198709]: Invalid user latitude from 139.59.2.166 port 57482
May 28 19:09:27 3mod sshd[2198709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 28 19:09:29 3mod sshd[2198709]: Failed password for invalid user latitude from 139.59.2.166 port 57482 ssh2
May 28 19:09:33 3mod sshd[2198755]: Invalid user nft from 139.59.2.166 port 51680
... show less
2024-05-28T19:00:53.427164 Minecraft sshd[1738891]: Invalid user solana from 139.59.2.166 port 46136 ... show more2024-05-28T19:00:53.427164 Minecraft sshd[1738891]: Invalid user solana from 139.59.2.166 port 46136
2024-05-28T19:00:53.806521 Minecraft sshd[1738891]: Failed password for invalid user solana from 139.59.2.166 port 46136 ssh2
2024-05-28T19:01:01.139667 Minecraft sshd[1738924]: Invalid user latitude from 139.59.2.166 port 40290
2024-05-28T19:01:01.481419 Minecraft sshd[1738924]: Failed password for invalid user latitude from 139.59.2.166 port 40290 ssh2
2024-05-28T19:01:08.888915 Minecraft sshd[1738976]: Invalid user nft from 139.59.2.166 port 34438
... show less
May 28 22:30:53 Digitalogic sshd[206293]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreMay 28 22:30:53 Digitalogic sshd[206293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 28 22:30:54 Digitalogic sshd[206293]: Failed password for invalid user solana from 139.59.2.166 port 60230 ssh2
May 28 22:30:55 Digitalogic sshd[206293]: Connection closed by invalid user solana 139.59.2.166 port 60230 [preauth]
... show less