This IP address has been reported a total of 785
times from 300 distinct
sources.
139.59.26.57 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Apr 25 22:05:36 localhost sshd[3021365]: Invalid user desliga from 139.59.26.57 port 38814
Apr ... show moreApr 25 22:05:36 localhost sshd[3021365]: Invalid user desliga from 139.59.26.57 port 38814
Apr 25 22:06:51 localhost sshd[3021390]: Invalid user sysop from 139.59.26.57 port 59556
Apr 25 22:13:10 localhost sshd[3021527]: Invalid user admin3 from 139.59.26.57 port 37758
Apr 25 22:15:49 localhost sshd[3021616]: Invalid user paola from 139.59.26.57 port 37812
Apr 25 22:17:07 localhost sshd[3021648]: Invalid user nitin from 139.59.26.57 port 42552
... show less
Apr 25 20:20:40 vpn sshd[937312]: Failed password for root from 139.59.26.57 port 35644 ssh2
A ... show moreApr 25 20:20:40 vpn sshd[937312]: Failed password for root from 139.59.26.57 port 35644 ssh2
Apr 25 20:22:07 vpn sshd[937333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.26.57 user=root
Apr 25 20:22:09 vpn sshd[937333]: Failed password for root from 139.59.26.57 port 57230 ssh2
... show less
sshd: : authentication failure; rhost=139.59.26.57 user=root
Apr 25 19:02:42 sshd: Failed p ... show moresshd: : authentication failure; rhost=139.59.26.57 user=root
Apr 25 19:02:42 sshd: Failed password for root from 139.59.26.57 port 33526 show less
Apr 25 19:00:51 Debian-1101-bullseye-amd64-base sshd[541512]: Failed password for root from 139.59.2 ... show moreApr 25 19:00:51 Debian-1101-bullseye-amd64-base sshd[541512]: Failed password for root from 139.59.26.57 port 37724 ssh2
Apr 25 19:00:52 Debian-1101-bullseye-amd64-base sshd[541512]: Disconnected from authenticating user root 139.59.26.57 port 37724 [preauth]
... show less