This IP address has been reported a total of 8,248
times from 1,131 distinct
sources.
139.59.56.53 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Feb 17 09:21:11 bla016-truserv-jhb1-001 sshd[965231]: Invalid user web2 from 139.59.56.53 port 47376 ... show moreFeb 17 09:21:11 bla016-truserv-jhb1-001 sshd[965231]: Invalid user web2 from 139.59.56.53 port 47376
Feb 17 09:21:11 bla016-truserv-jhb1-001 sshd[965231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
Feb 17 09:21:11 bla016-truserv-jhb1-001 sshd[965231]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53 user=web2
Feb 17 09:21:13 bla016-truserv-jhb1-001 sshd[965231]: Failed password for invalid user web2 from 139.59.56.53 port 47376 ssh2
Feb 17 09:22:16 bla016-truserv-jhb1-001 sshd[966673]: Invalid user user from 139.59.56.53 port 37566
... show less
DATE:2024-02-17 07:41:33, IP:139.59.56.53, PORT:ssh SSH brute force auth on honeypot server (epe-hon ... show moreDATE:2024-02-17 07:41:33, IP:139.59.56.53, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq) show less
2024-02-17T06:54:00.068869+01:00 vmd69965.contaboserver.net sshd[3767388]: Invalid user server from ... show more2024-02-17T06:54:00.068869+01:00 vmd69965.contaboserver.net sshd[3767388]: Invalid user server from 139.59.56.53 port 33332
2024-02-17T07:00:15.533834+01:00 vmd69965.contaboserver.net sshd[3769284]: Invalid user devadmin from 139.59.56.53 port 38318
2024-02-17T07:01:20.150462+01:00 vmd69965.contaboserver.net sshd[3769439]: Invalid user admin from 139.59.56.53 port 56364
2024-02-17T07:02:25.079046+01:00 vmd69965.contaboserver.net sshd[3769603]: Invalid user hduser from 139.59.56.53 port 46180
2024-02-17T07:03:24.021021+01:00 vmd69965.contaboserver.net sshd[3769710]: Invalid user wpuser from 139.59.56.53 port 35990
... show less
Feb 16 20:35:34 danielgomez sshd[252451]: Invalid user guest from 139.59.56.53 port 38866
Feb ... show moreFeb 16 20:35:34 danielgomez sshd[252451]: Invalid user guest from 139.59.56.53 port 38866
Feb 16 20:36:39 danielgomez sshd[252509]: Connection from 139.59.56.53 port 56936 on 140.82.19.86 port 5131 rdomain ""
Feb 16 20:36:40 danielgomez sshd[252509]: Invalid user admin from 139.59.56.53 port 56936 show less
2024-02-17T04:33:49.926924+00:00 bluefire sshd[3029385]: pam_unix(sshd:auth): authentication failure ... show more2024-02-17T04:33:49.926924+00:00 bluefire sshd[3029385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
2024-02-17T04:33:51.837644+00:00 bluefire sshd[3029385]: Failed password for invalid user postgres from 139.59.56.53 port 55232 ssh2
2024-02-17T04:35:54.319671+00:00 bluefire sshd[3029813]: Invalid user guest from 139.59.56.53 port 51640
... show less
Brute-ForceSSH
Anonymous
2024-02-17T04:55:10.493661+01:00 dns sshd[72175]: Invalid user vagrant from 139.59.56.53 port 49354< ... show more2024-02-17T04:55:10.493661+01:00 dns sshd[72175]: Invalid user vagrant from 139.59.56.53 port 49354
2024-02-17T04:57:44.000750+01:00 dns sshd[72204]: Invalid user deploy from 139.59.56.53 port 48746
2024-02-17T04:58:44.928059+01:00 dns sshd[72262]: Invalid user es from 139.59.56.53 port 38282
... show less
Feb 17 03:17:44 sg-mirror sshd[1954046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreFeb 17 03:17:44 sg-mirror sshd[1954046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
Feb 17 03:17:46 sg-mirror sshd[1954046]: Failed password for invalid user mineraft from 139.59.56.53 port 38676 ssh2
... show less
2024-02-17T03:42:44.196678+01:00 Linux12 sshd[2921849]: Failed password for invalid user hduser from ... show more2024-02-17T03:42:44.196678+01:00 Linux12 sshd[2921849]: Failed password for invalid user hduser from 139.59.56.53 port 47962 ssh2
2024-02-17T03:43:44.398419+01:00 Linux12 sshd[2922650]: Invalid user oracle from 139.59.56.53 port 38028
2024-02-17T03:43:44.400911+01:00 Linux12 sshd[2922650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
2024-02-17T03:43:45.895093+01:00 Linux12 sshd[2922650]: Failed password for invalid user oracle from 139.59.56.53 port 38028 ssh2
2024-02-17T03:44:43.455840+01:00 Linux12 sshd[2923499]: Invalid user zhangxiaoy from 139.59.56.53 port 56324
2024-02-17T03:44:43.458734+01:00 Linux12 sshd[2923499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
2024-02-17T03:44:45.384895+01:00 Linux12 sshd[2923499]: Failed password for invalid user zhangxiaoy from 139.59.56.53 port 56324 ssh2
2024-02-17T03:45:39.862493+01:00 Linux12 sshd[2924612]: Invalid user nvidia
... show less
spam or other hacking activities reported by webbfabriken security servers
Attack reported by ... show morespam or other hacking activities reported by webbfabriken security servers
Attack reported by Webbfabiken Security API - WFSecAPI show less
(sshd) Failed SSH login from 139.59.56.53 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction ... show more(sshd) Failed SSH login from 139.59.56.53 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Feb 17 00:00:24 23276 sshd[18760]: Invalid user user2 from 139.59.56.53 port 34624
Feb 17 00:00:26 23276 sshd[18760]: Failed password for invalid user user2 from 139.59.56.53 port 34624 ssh2
Feb 17 00:01:23 23276 sshd[18817]: Invalid user postgres from 139.59.56.53 port 53058
Feb 17 00:01:25 23276 sshd[18817]: Failed password for invalid user postgres from 139.59.56.53 port 53058 ssh2
Feb 17 00:02:21 23276 sshd[18858]: Invalid user devuser from 139.59.56.53 port 43258 show less
2024-02-16T23:52:08.413608ipam sshd[208334]: Failed password for invalid user glassfish from 139.59. ... show more2024-02-16T23:52:08.413608ipam sshd[208334]: Failed password for invalid user glassfish from 139.59.56.53 port 49466 ssh2
2024-02-16T23:58:55.497462ipam sshd[208697]: Invalid user ubuntu from 139.59.56.53 port 49038
2024-02-16T23:58:55.499757ipam sshd[208697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
2024-02-16T23:58:57.406845ipam sshd[208697]: Failed password for invalid user ubuntu from 139.59.56.53 port 49038 ssh2
2024-02-17T00:01:52.635873ipam sshd[208926]: Invalid user devuser from 139.59.56.53 port 47864
... show less
Brute-ForceSSH
Anonymous
Feb 17 09:42:14 mail sshd[3640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreFeb 17 09:42:14 mail sshd[3640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
Feb 17 09:42:16 mail sshd[3640]: Failed password for invalid user user from 139.59.56.53 port 47534 ssh2 show less
2024-02-16T22:39:11.865190aviel900 sshd[62240]: Failed password for invalid user vagrant from 139.59 ... show more2024-02-16T22:39:11.865190aviel900 sshd[62240]: Failed password for invalid user vagrant from 139.59.56.53 port 53526 ssh2
2024-02-16T22:42:10.012977aviel900 sshd[62291]: Invalid user administrator from 139.59.56.53 port 55786
2024-02-16T22:42:10.015060aviel900 sshd[62291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
2024-02-16T22:42:12.068351aviel900 sshd[62291]: Failed password for invalid user administrator from 139.59.56.53 port 55786 ssh2
2024-02-16T22:44:09.259467aviel900 sshd[62434]: Invalid user admingolden from 139.59.56.53 port 35396
... show less
Feb 16 15:13:54 [redacted] sshd[23745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreFeb 16 15:13:54 [redacted] sshd[23745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.53
Feb 16 15:13:56 [redacted] sshd[23745]: Failed password for invalid user admin from 139.59.56.53 port 39748 ssh2
Feb 16 15:13:56 [redacted] sshd[23745]: Disconnected from 139.59.56.53 port 39748 [preauth] show less