This IP address has been reported a total of 2,341
times from 698 distinct
sources.
139.59.56.163 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-12-06T17:33:41.957109lavrinenko.info sshd[630]: Invalid user mortega from 139.59.56.163 port 46 ... show more2024-12-06T17:33:41.957109lavrinenko.info sshd[630]: Invalid user mortega from 139.59.56.163 port 46120
2024-12-06T17:33:41.966376lavrinenko.info sshd[630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.163
2024-12-06T17:33:41.957109lavrinenko.info sshd[630]: Invalid user mortega from 139.59.56.163 port 46120
2024-12-06T17:33:44.555738lavrinenko.info sshd[630]: Failed password for invalid user mortega from 139.59.56.163 port 46120 ssh2
2024-12-06T17:35:34.461909lavrinenko.info sshd[775]: Invalid user reza from 139.59.56.163 port 60244
... show less
2024-12-06T17:02:16.236191lavrinenko.info sshd[32016]: Invalid user codi from 139.59.56.163 port 563 ... show more2024-12-06T17:02:16.236191lavrinenko.info sshd[32016]: Invalid user codi from 139.59.56.163 port 56340
2024-12-06T17:02:17.723644lavrinenko.info sshd[32016]: Failed password for invalid user codi from 139.59.56.163 port 56340 ssh2
2024-12-06T17:04:10.363004lavrinenko.info sshd[32082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.163 user=root
2024-12-06T17:04:12.157429lavrinenko.info sshd[32082]: Failed password for root from 139.59.56.163 port 50846 ssh2
2024-12-06T17:06:06.101520lavrinenko.info sshd[32211]: Invalid user chris from 139.59.56.163 port 48822
... show less
2024-12-06T13:03:41.929876+00:00 edge-noc-mci01.int.pdx.net.uk sshd[3003830]: Invalid user ub from 1 ... show more2024-12-06T13:03:41.929876+00:00 edge-noc-mci01.int.pdx.net.uk sshd[3003830]: Invalid user ub from 139.59.56.163 port 60996
2024-12-06T13:08:40.738869+00:00 edge-noc-mci01.int.pdx.net.uk sshd[3005315]: Invalid user nadia from 139.59.56.163 port 51020
2024-12-06T13:10:32.921361+00:00 edge-noc-mci01.int.pdx.net.uk sshd[3005908]: Invalid user bomber from 139.59.56.163 port 55082
... show less
2024-12-06T13:09:01.337481fra01-de-pop.as202427.net sshd[282050]: User root from 139.59.56.163 not a ... show more2024-12-06T13:09:01.337481fra01-de-pop.as202427.net sshd[282050]: User root from 139.59.56.163 not allowed because not listed in AllowUsers
2024-12-06T13:11:14.833025fra01-de-pop.as202427.net sshd[282637]: User root from 139.59.56.163 not allowed because not listed in AllowUsers
2024-12-06T13:13:09.232941fra01-de-pop.as202427.net sshd[283297]: User root from 139.59.56.163 not allowed because not listed in AllowUsers
... show less
[rede-44-49] (sshd) Failed SSH login from 139.59.56.163 (IN/India/-): 5 in the last 3600 secs; Ports ... show more[rede-44-49] (sshd) Failed SSH login from 139.59.56.163 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 6 07:08:11 sshd[9677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.163 user=[USERNAME]
Dec 6 07:08:12 sshd[9677]: Failed password for [USERNAME] from 139.59.56.163 port 48330 ssh2
Dec 6 07:12:35 sshd[9872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.163 user=[USERNAME]
Dec 6 07:12:37 sshd[9872]: Failed password for [USERNAME] from 139.59.56.163 port 56138 ssh2
Dec 6 07:14:29 ss show less