This IP address has been reported a total of 461
times from 174 distinct
sources.
139.59.245.165 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
$f2bV_matches
Brute-Force
Anonymous
2023-03-06T18:54:06.391900v22019037947384217 sshd[11429]: Invalid user ubnt from 139.59.245.165 port ... show more2023-03-06T18:54:06.391900v22019037947384217 sshd[11429]: Invalid user ubnt from 139.59.245.165 port 50220
2023-03-06T18:54:06.556401v22019037947384217 sshd[11429]: Disconnected from 139.59.245.165 port 50220 [preauth]
2023-03-06T18:54:07.843152v22019037947384217 sshd[11431]: Invalid user admin from 139.59.245.165 port 55132
... show less
Brute-ForceSSH
Anonymous
2023-03-06T18:51:50.471424hz01.yumiweb.com sshd[6444]: Invalid user ubnt from 139.59.245.165 port 58 ... show more2023-03-06T18:51:50.471424hz01.yumiweb.com sshd[6444]: Invalid user ubnt from 139.59.245.165 port 58366
2023-03-06T18:51:51.944179hz01.yumiweb.com sshd[6446]: Invalid user admin from 139.59.245.165 port 34070
2023-03-06T18:51:55.070497hz01.yumiweb.com sshd[6450]: Invalid user 1234 from 139.59.245.165 port 43324
... show less
2023-03-06T18:24:39.559984premilloweb sshd[9583]: pam_unix(sshd:auth): authentication failure; logna ... show more2023-03-06T18:24:39.559984premilloweb sshd[9583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.245.165
2023-03-06T18:24:41.902882premilloweb sshd[9583]: Failed password for invalid user ubnt from 139.59.245.165 port 60148 ssh2
2023-03-06T18:24:43.419658premilloweb sshd[9585]: Invalid user admin from 139.59.245.165 port 52982
... show less
2023-03-06T19:21:37.106095anubis.d-serv.eu sshd[40427]: Invalid user admin from 139.59.245.165 port ... show more2023-03-06T19:21:37.106095anubis.d-serv.eu sshd[40427]: Invalid user admin from 139.59.245.165 port 60552
2023-03-06T19:21:37.108866anubis.d-serv.eu sshd[40427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.245.165
2023-03-06T19:21:39.130503anubis.d-serv.eu sshd[40427]: Failed password for invalid user admin from 139.59.245.165 port 60552 ssh2
2023-03-06T19:21:41.797015anubis.d-serv.eu sshd[41959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.245.165 user=root
2023-03-06T19:21:43.702517anubis.d-serv.eu sshd[41959]: Failed password for root from 139.59.245.165 port 51966 ssh2
... show less
Mar 6 19:14:01 server2 sshd\[1538\]: Invalid user ubnt from 139.59.245.165
Mar 6 19:14:02 se ... show moreMar 6 19:14:01 server2 sshd\[1538\]: Invalid user ubnt from 139.59.245.165
Mar 6 19:14:02 server2 sshd\[1568\]: Invalid user admin from 139.59.245.165
Mar 6 19:14:04 server2 sshd\[1570\]: User root from 139.59.245.165 not allowed because not listed in AllowUsers
Mar 6 19:14:05 server2 sshd\[1572\]: Invalid user 1234 from 139.59.245.165
Mar 6 19:14:07 server2 sshd\[1574\]: Invalid user usuario from 139.59.245.165
Mar 6 19:14:08 server2 sshd\[1576\]: Invalid user support from 139.59.245.165 show less
2023-03-06T16:59:06.510769voip.dilenatech.com sshd[15083]: pam_unix(sshd:auth): authentication failu ... show more2023-03-06T16:59:06.510769voip.dilenatech.com sshd[15083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.245.165
2023-03-06T16:59:08.733209voip.dilenatech.com sshd[15083]: Failed password for invalid user ubnt from 139.59.245.165 port 33802 ssh2
2023-03-06T16:59:10.735023voip.dilenatech.com sshd[15085]: Invalid user admin from 139.59.245.165 port 52894
... show less
2023-03-06T16:55:51.568122shield sshd\[23367\]: Invalid user ubnt from 139.59.245.165 port 51224<br ... show more2023-03-06T16:55:51.568122shield sshd\[23367\]: Invalid user ubnt from 139.59.245.165 port 51224
2023-03-06T16:55:51.576652shield sshd\[23367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.245.165
2023-03-06T16:55:53.027012shield sshd\[23367\]: Failed password for invalid user ubnt from 139.59.245.165 port 51224 ssh2
2023-03-06T16:55:55.110094shield sshd\[23394\]: Invalid user admin from 139.59.245.165 port 40386
2023-03-06T16:55:55.120081shield sshd\[23394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.245.165 show less
2023-03-07T01:53:32.616814mustar-kr-sora sshd[28937]: Invalid user ubnt from 139.59.245.165 port 358 ... show more2023-03-07T01:53:32.616814mustar-kr-sora sshd[28937]: Invalid user ubnt from 139.59.245.165 port 35802
2023-03-07T01:53:33.271086mustar-kr-sora sshd[28939]: Invalid user admin from 139.59.245.165 port 38512
2023-03-07T01:53:34.561949mustar-kr-sora sshd[28943]: Invalid user 1234 from 139.59.245.165 port 44728
2023-03-07T01:53:35.220419mustar-kr-sora sshd[28945]: Invalid user usuario from 139.59.245.165 port 47602
2023-03-07T01:53:35.995131mustar-kr-sora sshd[28947]: Invalid user support from 139.59.245.165 port 51126
... show less