This IP address has been reported a total of 2,564
times from 703 distinct
sources.
139.59.71.132 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
This IP address carried out 240 port scanning attempts on 10-03-2025. For more information or to rep ... show moreThis IP address carried out 240 port scanning attempts on 10-03-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
This IP address carried out 60 SSH credential attack (attempts) on 10-03-2025. For more information ... show moreThis IP address carried out 60 SSH credential attack (attempts) on 10-03-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
Mar 10 08:07:08 underverse sshd[1236903]: Failed password for root from 139.59.71.132 port 56214 ssh ... show moreMar 10 08:07:08 underverse sshd[1236903]: Failed password for root from 139.59.71.132 port 56214 ssh2
Mar 10 08:10:38 underverse sshd[1236980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.71.132 user=root
Mar 10 08:10:40 underverse sshd[1236980]: Failed password for root from 139.59.71.132 port 38916 ssh2
Mar 10 08:11:59 underverse sshd[1236996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.71.132 user=root
Mar 10 08:12:00 underverse sshd[1236996]: Failed password for root from 139.59.71.132 port 51232 ssh2
... show less
2025-03-10T21:11:42.943081+08:00 raspberrypi sshd[1786467]: Invalid user testuser from 139.59.71.132 ... show more2025-03-10T21:11:42.943081+08:00 raspberrypi sshd[1786467]: Invalid user testuser from 139.59.71.132 port 47850
2025-03-10T21:15:20.734061+08:00 raspberrypi sshd[1787237]: Invalid user elk from 139.59.71.132 port 51048
... show less
2025-03-10T20:37:48.105912+08:00 raspberrypi sshd[1779432]: Invalid user ambari from 139.59.71.132 p ... show more2025-03-10T20:37:48.105912+08:00 raspberrypi sshd[1779432]: Invalid user ambari from 139.59.71.132 port 33064
2025-03-10T20:39:01.756814+08:00 raspberrypi sshd[1779649]: Invalid user system from 139.59.71.132 port 40264
2025-03-10T20:40:16.976635+08:00 raspberrypi sshd[1779951]: Invalid user aryan from 139.59.71.132 port 42422
... show less
Mar 10 08:12:05 ny01 sshd[477633]: Failed password for root from 139.59.71.132 port 33908 ssh2 ... show moreMar 10 08:12:05 ny01 sshd[477633]: Failed password for root from 139.59.71.132 port 33908 ssh2
Mar 10 08:13:21 ny01 sshd[477801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.71.132 user=root
Mar 10 08:13:24 ny01 sshd[477801]: Failed password for root from 139.59.71.132 port 45084 ssh2
Mar 10 08:14:34 ny01 sshd[478016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.71.132 user=root
Mar 10 08:14:36 ny01 sshd[478016]: Failed password for root from 139.59.71.132 port 53068 ssh2 show less
Mar 10 13:11:58 fshubvidspace sshd[353454]: Failed password for root from 139.59.71.132 port 43880 s ... show moreMar 10 13:11:58 fshubvidspace sshd[353454]: Failed password for root from 139.59.71.132 port 43880 ssh2
Mar 10 13:13:16 fshubvidspace sshd[353756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.71.132 user=root
Mar 10 13:13:18 fshubvidspace sshd[353756]: Failed password for root from 139.59.71.132 port 50518 ssh2
Mar 10 13:14:29 fshubvidspace sshd[354026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.71.132 user=root
Mar 10 13:14:31 fshubvidspace sshd[354026]: Failed password for root from 139.59.71.132 port 43582 ssh2
... show less