This IP address has been reported a total of 469
times from 285 distinct
sources.
139.59.80.210 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 13 08:07:56 yoda sshd[2349792]: Invalid user jito from 139.59.80.210 port 38622
Nov 13 08: ... show moreNov 13 08:07:56 yoda sshd[2349792]: Invalid user jito from 139.59.80.210 port 38622
Nov 13 08:07:59 yoda sshd[2349792]: Failed password for invalid user jito from 139.59.80.210 port 38622 ssh2
Nov 13 08:08:05 yoda sshd[2350122]: Invalid user fil from 139.59.80.210 port 42972
... show less
2024-11-13T06:59:41.860624+00:00 Linux09 sshd[3507933]: Failed password for invalid user fil from 13 ... show more2024-11-13T06:59:41.860624+00:00 Linux09 sshd[3507933]: Failed password for invalid user fil from 139.59.80.210 port 54634 ssh2
2024-11-13T06:59:48.330430+00:00 Linux09 sshd[3508431]: Invalid user node from 139.59.80.210 port 59266
2024-11-13T06:59:48.673156+00:00 Linux09 sshd[3508431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.210
2024-11-13T06:59:51.145715+00:00 Linux09 sshd[3508431]: Failed password for invalid user node from 139.59.80.210 port 59266 ssh2
2024-11-13T06:59:57.222398+00:00 Linux09 sshd[3508945]: Invalid user fil from 139.59.80.210 port 35664
2024-11-13T06:59:57.522596+00:00 Linux09 sshd[3508945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.210
2024-11-13T06:59:59.563592+00:00 Linux09 sshd[3508945]: Failed password for invalid user fil from 139.59.80.210 port 35664 ssh2
2024-11-13T07:00:05.277496+00:00 Linux09 sshd[3509414]: Invalid user validator from 139.59
... show less
Nov 13 06:59:39 host sshd[3730669]: Failed password for invalid user jito from 139.59.80.210 port 37 ... show moreNov 13 06:59:39 host sshd[3730669]: Failed password for invalid user jito from 139.59.80.210 port 37102 ssh2
Nov 13 06:59:46 host sshd[3730681]: Invalid user fil from 139.59.80.210 port 41734
Nov 13 06:59:46 host sshd[3730681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.210
Nov 13 06:59:49 host sshd[3730681]: Failed password for invalid user fil from 139.59.80.210 port 41734 ssh2
Nov 13 06:59:55 host sshd[3730687]: Invalid user node from 139.59.80.210 port 46362
... show less
2024-11-13T07:59:39.346566+01:00 hera sshd[855360]: Failed password for invalid user jito from 139.5 ... show more2024-11-13T07:59:39.346566+01:00 hera sshd[855360]: Failed password for invalid user jito from 139.59.80.210 port 39674 ssh2
2024-11-13T07:59:45.584186+01:00 hera sshd[855362]: Invalid user fil from 139.59.80.210 port 44306
2024-11-13T07:59:45.902375+01:00 hera sshd[855362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.210
2024-11-13T07:59:47.963559+01:00 hera sshd[855362]: Failed password for invalid user fil from 139.59.80.210 port 44306 ssh2
2024-11-13T07:59:54.516201+01:00 hera sshd[855368]: Invalid user node from 139.59.80.210 port 48932
... show less
Nov 13 06:59:37 web3 sshd[2863620]: Failed password for invalid user jito from 139.59.80.210 port 47 ... show moreNov 13 06:59:37 web3 sshd[2863620]: Failed password for invalid user jito from 139.59.80.210 port 47752 ssh2
Nov 13 06:59:43 web3 sshd[2863625]: Invalid user fil from 139.59.80.210 port 52384
Nov 13 06:59:43 web3 sshd[2863625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.210
Nov 13 06:59:45 web3 sshd[2863625]: Failed password for invalid user fil from 139.59.80.210 port 52384 ssh2
Nov 13 06:59:52 web3 sshd[2863629]: Invalid user node from 139.59.80.210 port 57010 show less
2024-11-13T06:59:32.850447+00:00 prod-3 sshd[1596079]: Invalid user jito from 139.59.80.210 port 411 ... show more2024-11-13T06:59:32.850447+00:00 prod-3 sshd[1596079]: Invalid user jito from 139.59.80.210 port 41198
2024-11-13T06:59:33.264308+00:00 prod-3 sshd[1596079]: Connection closed by invalid user jito 139.59.80.210 port 41198 [preauth]
2024-11-13T06:59:41.859299+00:00 prod-3 sshd[1596130]: Invalid user fil from 139.59.80.210 port 45824
2024-11-13T06:59:42.187040+00:00 prod-3 sshd[1596130]: Connection closed by invalid user fil 139.59.80.210 port 45824 [preauth]
2024-11-13T06:59:50.820000+00:00 prod-3 sshd[1596132]: Invalid user node from 139.59.80.210 port 50456
... show less
Nov 12 22:59:37 nunnother sshd\[1688\]: Invalid user jito from 139.59.80.210 port 43386
Nov 12 ... show moreNov 12 22:59:37 nunnother sshd\[1688\]: Invalid user jito from 139.59.80.210 port 43386
Nov 12 22:59:38 nunnother sshd\[1688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.210
Nov 12 22:59:39 nunnother sshd\[1688\]: Failed password for invalid user jito from 139.59.80.210 port 43386 ssh2
Nov 12 22:59:46 nunnother sshd\[1701\]: Invalid user fil from 139.59.80.210 port 48018
Nov 12 22:59:47 nunnother sshd\[1701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.210
... show less
Nov 13 06:59:31 staging-api sshd[1375981]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreNov 13 06:59:31 staging-api sshd[1375981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.210
Nov 13 06:59:33 staging-api sshd[1375981]: Failed password for invalid user jito from 139.59.80.210 port 40194 ssh2
Nov 13 06:59:40 staging-api sshd[1376055]: Invalid user fil from 139.59.80.210 port 44822
... show less
Nov 13 07:51:03 ifog sshd[1820845]: Invalid user jito from 139.59.80.210 port 53006
Nov 13 07: ... show moreNov 13 07:51:03 ifog sshd[1820845]: Invalid user jito from 139.59.80.210 port 53006
Nov 13 07:51:13 ifog sshd[1820849]: Invalid user fil from 139.59.80.210 port 57922
Nov 13 07:51:23 ifog sshd[1820859]: Invalid user node from 139.59.80.210 port 34606
... show less