This IP address has been reported a total of 690
times from 47 distinct
sources.
139.59.244.144 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 12 22:37:09 ctl sshd[17663]: Failed password for invalid user lubaproject from 139.59.244.144 po ... show moreDec 12 22:37:09 ctl sshd[17663]: Failed password for invalid user lubaproject from 139.59.244.144 port 59556 ssh2
Dec 12 22:37:09 ctl sshd[17663]: Connection closed by invalid user lubaproject 139.59.244.144 port 59556 [preauth]
Dec 12 22:37:13 ctl sshd[17688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.244.144 user=root
Dec 12 22:37:15 ctl sshd[17688]: Failed password for root from 139.59.244.144 port 33748 ssh2
Dec 12 22:37:15 ctl sshd[17688]: Connection closed by authenticating user root 139.59.244.144 port 33748 [preauth]
... show less
Dec 12 22:05:00 odin sshd[9306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreDec 12 22:05:00 odin sshd[9306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.244.144
Dec 12 22:05:02 odin sshd[9306]: Failed password for invalid user quantumlocker from 139.59.244.144 port 51072 ssh2
Dec 12 22:05:07 odin sshd[9492]: Failed password for root from 139.59.244.144 port 52888 ssh2 show less
Dec1221:44:51server6sshd[3476843]:Invaliduserendlesspoolsticinofrom139.59.244.144port60988Dec1221:57 ... show moreDec1221:44:51server6sshd[3476843]:Invaliduserendlesspoolsticinofrom139.59.244.144port60988Dec1221:57:19server6sshd[3482966]:Invaliduserendlesspoolsticinofrom159.65.225.225port60482Dec1221:36:36server6sshd[3473357]:Invaliduserendlesspoolsticinofrom104.248.149.139port40078Dec1220:58:41server6sshd[3454137]:Invaliduserendlesspoolsticinofrom147.182.230.18port40220Dec1221:42:23server6sshd[3476071]:Invaliduserendlesspoolsticinofrom139.59.212.54port40168IPAddressesBlocked: show less
Dec 12 15:29:16 www4 sshd[763667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreDec 12 15:29:16 www4 sshd[763667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.244.144 user=root
Dec 12 15:29:19 www4 sshd[763667]: Failed password for root from 139.59.244.144 port 41972 ssh2
Dec 12 15:37:18 www4 sshd[764177]: Invalid user bluegate from 139.59.244.144 port 51148
Dec 12 15:37:18 www4 sshd[764177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.244.144
Dec 12 15:37:20 www4 sshd[764177]: Failed password for invalid user bluegate from 139.59.244.144 port 51148 ssh2
... show less
Dec 12 20:34:20 odin sshd[17314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreDec 12 20:34:20 odin sshd[17314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.244.144
Dec 12 20:34:22 odin sshd[17314]: Failed password for invalid user lotprijs from 139.59.244.144 port 41162 ssh2
Dec 12 20:34:31 odin sshd[17332]: Failed password for root from 139.59.244.144 port 44634 ssh2 show less
Brute-ForceSSH
Anonymous
139.59.244.144 (SG/Singapore/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; ... show more139.59.244.144 (SG/Singapore/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Dec 12 14:21:21 server5 sshd[10389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.244.144 user=root
Dec 12 14:20:17 server5 sshd[10157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.10.255 user=root
Dec 12 14:20:18 server5 sshd[10157]: Failed password for root from 167.99.10.255 port 35288 ssh2
Dec 12 14:20:01 server5 sshd[9969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.198.112 user=root
Dec 12 14:20:03 server5 sshd[9969]: Failed password for root from 159.89.198.112 port 58612 ssh2
Dec 12 14:17:42 server5 sshd[9489]: Failed password for root from 54.36.108.223 port 58474 ssh2
Dec 12 20:05:42 santamaria sshd\[5795\]: pam_unix\(sshd:auth\): authentication failure\; logname= ui ... show moreDec 12 20:05:42 santamaria sshd\[5795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.244.144 user=root
Dec 12 20:05:43 santamaria sshd\[5795\]: Failed password for root from 139.59.244.144 port 43288 ssh2
Dec 12 20:05:54 santamaria sshd\[5797\]: Invalid user hunnen from 139.59.244.144
... show less