This IP address has been reported a total of 6,839
times from 1,040 distinct
sources.
139.59.74.33 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2024-02-24T07:50:40Z and 2024-02- ... show moreCowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2024-02-24T07:50:40Z and 2024-02-24T07:59:12Z show less
Feb 24 06:33:50 de-fra2-flow1 sshd[3931145]: Invalid user acs from 139.59.74.33 port 59464
Feb ... show moreFeb 24 06:33:50 de-fra2-flow1 sshd[3931145]: Invalid user acs from 139.59.74.33 port 59464
Feb 24 06:54:40 de-fra2-flow1 sshd[3931768]: Invalid user odoo15 from 139.59.74.33 port 43714
Feb 24 06:56:43 de-fra2-flow1 sshd[3931774]: Invalid user test from 139.59.74.33 port 41380
... show less
Feb 24 06:44:57 bronx sshd[108364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreFeb 24 06:44:57 bronx sshd[108364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.33 user=root
Feb 24 06:44:59 bronx sshd[108364]: Failed password for root from 139.59.74.33 port 52546 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-02-23T20:24:40.233482 hermes.derrytech.com sshd[1111467]: Invalid user ubuntu from 139.59.74.33 ... show more2024-02-23T20:24:40.233482 hermes.derrytech.com sshd[1111467]: Invalid user ubuntu from 139.59.74.33 port 50490
2024-02-23T20:26:05.633125 hermes.derrytech.com sshd[1111501]: Invalid user ubuntu from 139.59.74.33 port 41302
2024-02-23T20:26:05.633125 hermes.derrytech.com sshd[1111501]: Invalid user ubuntu from 139.59.74.33 port 41302
... show less
Brute-ForceSSH
Anonymous
2024-02-23T18:57:01.074764 hermes.derrytech.com sshd[1105468]: Invalid user mysql2 from 139.59.74.33 ... show more2024-02-23T18:57:01.074764 hermes.derrytech.com sshd[1105468]: Invalid user mysql2 from 139.59.74.33 port 39540
2024-02-23T19:01:01.567879 hermes.derrytech.com sshd[1105782]: Invalid user gpadmin from 139.59.74.33 port 35046
2024-02-23T19:01:01.567879 hermes.derrytech.com sshd[1105782]: Invalid user gpadmin from 139.59.74.33 port 35046
2024-02-23T19:02:23.713256 hermes.derrytech.com sshd[1105816]: Invalid user guest from 139.59.74.33 port 60898
... show less
Brute-ForceSSH
Anonymous
2024-02-23T18:26:47.099045 hermes.derrytech.com sshd[1103470]: Invalid user ubuntu from 139.59.74.33 ... show more2024-02-23T18:26:47.099045 hermes.derrytech.com sshd[1103470]: Invalid user ubuntu from 139.59.74.33 port 45644
2024-02-23T18:32:13.390195 hermes.derrytech.com sshd[1103803]: Invalid user elcsoft from 139.59.74.33 port 39720
2024-02-23T18:34:57.754965 hermes.derrytech.com sshd[1104052]: Invalid user ftpadmin1 from 139.59.74.33 port 58388
2024-02-23T18:37:46.376703 hermes.derrytech.com sshd[1104121]: Invalid user guest from 139.59.74.33 port 44968
2024-02-23T18:39:08.264164 hermes.derrytech.com sshd[1104360]: Invalid user ubuntu from 139.59.74.33 port 45214
... show less
Feb 24 02:08:03 edge-hiv-tpa01 sshd[682581]: Invalid user ubuntu from 139.59.74.33 port 44912
... show moreFeb 24 02:08:03 edge-hiv-tpa01 sshd[682581]: Invalid user ubuntu from 139.59.74.33 port 44912
Feb 24 02:14:46 edge-hiv-tpa01 sshd[682711]: Invalid user gitea from 139.59.74.33 port 41546
Feb 24 02:16:06 edge-hiv-tpa01 sshd[682743]: Invalid user test2 from 139.59.74.33 port 59172
... show less
(sshd) Failed SSH login from 139.59.74.33 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction ... show more(sshd) Failed SSH login from 139.59.74.33 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Feb 23 20:01:01 16678 sshd[20445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.33 user=root
Feb 23 20:01:02 16678 sshd[20445]: Failed password for root from 139.59.74.33 port 51526 ssh2
Feb 23 20:05:00 16678 sshd[20874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.33 user=root
Feb 23 20:05:03 16678 sshd[20874]: Failed password for root from 139.59.74.33 port 57564 ssh2
Feb 23 20:06:25 16678 sshd[21088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.33 user=root show less
Feb 23 22:15:41 admin sshd[3805740]: Failed password for invalid user mytest from 139.59.74.33 port ... show moreFeb 23 22:15:41 admin sshd[3805740]: Failed password for invalid user mytest from 139.59.74.33 port 46330 ssh2
Feb 23 22:16:36 admin sshd[3806432]: Invalid user ubuntu from 139.59.74.33 port 34786
Feb 23 22:16:36 admin sshd[3806432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.33
Feb 23 22:16:36 admin sshd[3806432]: Invalid user ubuntu from 139.59.74.33 port 34786
Feb 23 22:16:38 admin sshd[3806432]: Failed password for invalid user ubuntu from 139.59.74.33 port 34786 ssh2
... show less