This IP address has been reported a total of 489
times from 295 distinct
sources.
139.59.2.166 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
May 28 20:52:41 bla016-truserv-jhb1-001 sshd[721915]: Invalid user latitude from 139.59.2.166 port 4 ... show moreMay 28 20:52:41 bla016-truserv-jhb1-001 sshd[721915]: Invalid user latitude from 139.59.2.166 port 42550
May 28 20:52:41 bla016-truserv-jhb1-001 sshd[721915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 28 20:52:42 bla016-truserv-jhb1-001 sshd[721915]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166 user=latitude
May 28 20:52:43 bla016-truserv-jhb1-001 sshd[721915]: Failed password for invalid user latitude from 139.59.2.166 port 42550 ssh2
May 28 20:52:48 bla016-truserv-jhb1-001 sshd[722102]: Invalid user nft from 139.59.2.166 port 37116
... show less
May 28 14:52:33 www4 sshd[605626]: Failed password for invalid user solana from 139.59.2.166 port 49 ... show moreMay 28 14:52:33 www4 sshd[605626]: Failed password for invalid user solana from 139.59.2.166 port 49342 ssh2
May 28 14:52:39 www4 sshd[605635]: Invalid user latitude from 139.59.2.166 port 43910
May 28 14:52:39 www4 sshd[605635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 28 14:52:41 www4 sshd[605635]: Failed password for invalid user latitude from 139.59.2.166 port 43910 ssh2
May 28 14:52:46 www4 sshd[605637]: Invalid user nft from 139.59.2.166 port 38476
... show less
sshd[177752]: Invalid user solana from 139.59.2.166 port 44690
sshd[177752]: pam_unix(sshd:aut ... show moresshd[177752]: Invalid user solana from 139.59.2.166 port 44690
sshd[177752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
sshd[177752]: Failed password for invalid user solana from 139.59.2.166 port 44690 ssh2
sshd[177781]: Invalid user latitude from 139.59.2.166 port 39258 show less
May 28 21:44:09 Xenoserver sshd[3789689]: Invalid user solana from 139.59.2.166 port 33130
May ... show moreMay 28 21:44:09 Xenoserver sshd[3789689]: Invalid user solana from 139.59.2.166 port 33130
May 28 21:44:17 Xenoserver sshd[3789736]: Invalid user latitude from 139.59.2.166 port 56582
May 28 21:44:25 Xenoserver sshd[3789774]: Invalid user nft from 139.59.2.166 port 51794
... show less
2024-05-28T18:44:06.083499+00:00 edge-hur-fmt01.int.pdx.net.uk sshd[1334073]: Invalid user solana fr ... show more2024-05-28T18:44:06.083499+00:00 edge-hur-fmt01.int.pdx.net.uk sshd[1334073]: Invalid user solana from 139.59.2.166 port 46226
2024-05-28T18:44:13.470215+00:00 edge-hur-fmt01.int.pdx.net.uk sshd[1334075]: Invalid user latitude from 139.59.2.166 port 41444
2024-05-28T18:44:21.266405+00:00 edge-hur-fmt01.int.pdx.net.uk sshd[1334077]: Invalid user nft from 139.59.2.166 port 36658
... show less
(sshd) Failed SSH login from 139.59.2.166 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction ... show more(sshd) Failed SSH login from 139.59.2.166 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 28 20:35:23 da057 sshd[3432461]: Did not receive identification string from 139.59.2.166 port 45308
May 28 20:35:49 da057 sshd[3432739]: Invalid user solana from 139.59.2.166 port 46888
May 28 20:35:57 da057 sshd[3432818]: Invalid user latitude from 139.59.2.166 port 42400
May 28 20:36:04 da057 sshd[3433017]: Invalid user nft from 139.59.2.166 port 37918
May 28 20:36:12 da057 sshd[3433064]: Invalid user node from 139.59.2.166 port 33430 show less
May 28 18:35:52 VM916511679F64A7B sshd[178591]: Invalid user solana from 139.59.2.166 port 47284<br ... show moreMay 28 18:35:52 VM916511679F64A7B sshd[178591]: Invalid user solana from 139.59.2.166 port 47284
May 28 18:36:00 VM916511679F64A7B sshd[178593]: Invalid user latitude from 139.59.2.166 port 42796
May 28 18:36:07 VM916511679F64A7B sshd[178595]: Invalid user nft from 139.59.2.166 port 38314
May 28 18:36:14 VM916511679F64A7B sshd[178597]: Invalid user node from 139.59.2.166 port 33830
May 28 18:36:21 VM916511679F64A7B sshd[178599]: Invalid user jito-validator from 139.59.2.166 port 57572
... show less
May 28 20:35:56 unifi sshd[2527287]: Failed password for invalid user solana from 139.59.2.166 port ... show moreMay 28 20:35:56 unifi sshd[2527287]: Failed password for invalid user solana from 139.59.2.166 port 33362 ssh2
May 28 20:36:02 unifi sshd[2527292]: Invalid user latitude from 139.59.2.166 port 57114
May 28 20:36:02 unifi sshd[2527292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 28 20:36:03 unifi sshd[2527292]: Failed password for invalid user latitude from 139.59.2.166 port 57114 ssh2
May 28 20:36:09 unifi sshd[2527294]: Invalid user nft from 139.59.2.166 port 52624
... show less
2024-05-28T21:35:53.506976+03:00 kiv01.hacktegic.com sshd[2012825]: Invalid user solana from 139.59. ... show more2024-05-28T21:35:53.506976+03:00 kiv01.hacktegic.com sshd[2012825]: Invalid user solana from 139.59.2.166 port 36496
2024-05-28T21:35:53.792155+03:00 kiv01.hacktegic.com sshd[2012825]: Connection closed by invalid user solana 139.59.2.166 port 36496 [preauth]
2024-05-28T21:36:00.954187+03:00 kiv01.hacktegic.com sshd[2012830]: Invalid user latitude from 139.59.2.166 port 60240
... show less
2024-05-28T20:35:53.771738+02:00 pve sshd[2446861]: pam_unix(sshd:auth): authentication failure; log ... show more2024-05-28T20:35:53.771738+02:00 pve sshd[2446861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
2024-05-28T20:35:55.484021+02:00 pve sshd[2446861]: Failed password for invalid user solana from 139.59.2.166 port 38576 ssh2
2024-05-28T20:36:00.900549+02:00 pve sshd[2446907]: Invalid user latitude from 139.59.2.166 port 34088
... show less
2024-05-28T19:35:49.782608 AdbuseHP sshd[420377]: Invalid user solana from 139.59.2.166 port 47090<b ... show more2024-05-28T19:35:49.782608 AdbuseHP sshd[420377]: Invalid user solana from 139.59.2.166 port 47090
... show less
2024-05-28T20:26:54.930093+02:00 pi sshd[776084]: Invalid user solana from 139.59.2.166 port 35016<b ... show more2024-05-28T20:26:54.930093+02:00 pi sshd[776084]: Invalid user solana from 139.59.2.166 port 35016
2024-05-28T20:27:03.809151+02:00 pi sshd[776096]: Invalid user latitude from 139.59.2.166 port 41102
2024-05-28T20:27:11.951111+02:00 pi sshd[776110]: Invalid user nft from 139.59.2.166 port 47178
2024-05-28T20:27:20.051689+02:00 pi sshd[776122]: Invalid user node from 139.59.2.166 port 53250
2024-05-28T20:27:28.006357+02:00 pi sshd[776136]: Invalid user jito-validator from 139.59.2.166 port 59324 show less
May 28 21:27:01 hasankayra04 sshd[451489]: Invalid user latitude from 139.59.2.166 port 42522
... show moreMay 28 21:27:01 hasankayra04 sshd[451489]: Invalid user latitude from 139.59.2.166 port 42522
May 28 21:27:02 hasankayra04 sshd[451489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.166
May 28 21:27:01 hasankayra04 sshd[451489]: Invalid user latitude from 139.59.2.166 port 42522
May 28 21:27:04 hasankayra04 sshd[451489]: Failed password for invalid user latitude from 139.59.2.166 port 42522 ssh2
May 28 21:27:10 hasankayra04 sshd[451492]: Invalid user nft from 139.59.2.166 port 48596
... show less