This IP address has been reported a total of 41 times from 22 distinct sources.
139.99.170.193 was first reported on , and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Feb 3 16:19:28 web01.agentur-b-2.de sshd[937794]: Invalid user lighthouse from 139.99.170.193 port ... show moreFeb 3 16:19:28 web01.agentur-b-2.de sshd[937794]: Invalid user lighthouse from 139.99.170.193 port 28900
Feb 3 16:19:29 web01.agentur-b-2.de sshd[937794]: Disconnected from invalid user lighthouse 139.99.170.193 port 28900 [preauth]
Feb 3 16:23:02 web01.agentur-b-2.de sshd[938831]: Disconnected from authenticating user root 139.99.170.193 port 36034 [preauth]
Feb 3 16:25:06 web01.agentur-b-2.de sshd[939722]: Invalid user postgres from 139.99.170.193 port 11788
Feb 3 16:25:07 web01.agentur-b-2.de sshd[939722]: Disconnected from invalid user postgres 139.99.170.193 port 11788 [preauth] show less
Feb 3 08:23:07 web01.agentur-b-2.de sshd[594235]: Disconnected from authenticating user root 139.99 ... show moreFeb 3 08:23:07 web01.agentur-b-2.de sshd[594235]: Disconnected from authenticating user root 139.99.170.193 port 32610 [preauth]
Feb 3 08:28:36 web01.agentur-b-2.de sshd[595797]: Disconnected from authenticating user root 139.99.170.193 port 64640 [preauth]
Feb 3 08:30:31 web01.agentur-b-2.de sshd[596572]: Disconnected from authenticating user root 139.99.170.193 port 47228 [preauth]
Feb 3 08:32:29 web01.agentur-b-2.de sshd[596971]: Disconnected from authenticating user root 139.99.170.193 port 32622 [preauth]
Feb 3 08:34:26 web01.agentur-b-2.de sshd[597439]: Disconnected from authenticating user root 139.99.170.193 port 27142 [preauth] show less
Feb 3 08:23:07 web01.agentur-b-2.de sshd[594235]: Disconnected from authenticating user root 139.99 ... show moreFeb 3 08:23:07 web01.agentur-b-2.de sshd[594235]: Disconnected from authenticating user root 139.99.170.193 port 32610 [preauth]
Feb 3 08:28:36 web01.agentur-b-2.de sshd[595797]: Disconnected from authenticating user root 139.99.170.193 port 64640 [preauth]
Feb 3 08:30:31 web01.agentur-b-2.de sshd[596572]: Disconnected from authenticating user root 139.99.170.193 port 47228 [preauth]
Feb 3 08:32:29 web01.agentur-b-2.de sshd[596971]: Disconnected from authenticating user root 139.99.170.193 port 32622 [preauth]
Feb 3 08:34:26 web01.agentur-b-2.de sshd[597439]: Disconnected from authenticating user root 139.99.170.193 port 27142 [preauth] show less
Feb 3 08:23:07 web01.agentur-b-2.de sshd[594235]: Disconnected from authenticating user root 139.99 ... show moreFeb 3 08:23:07 web01.agentur-b-2.de sshd[594235]: Disconnected from authenticating user root 139.99.170.193 port 32610 [preauth]
Feb 3 08:28:36 web01.agentur-b-2.de sshd[595797]: Disconnected from authenticating user root 139.99.170.193 port 64640 [preauth]
Feb 3 08:30:31 web01.agentur-b-2.de sshd[596572]: Disconnected from authenticating user root 139.99.170.193 port 47228 [preauth]
Feb 3 08:32:29 web01.agentur-b-2.de sshd[596971]: Disconnected from authenticating user root 139.99.170.193 port 32622 [preauth]
Feb 3 08:34:26 web01.agentur-b-2.de sshd[597439]: Disconnected from authenticating user root 139.99.170.193 port 27142 [preauth] show less
Feb 3 16:15:35 antti-vps2 sshd[3260333]: Invalid user postgres from 139.99.170.193 port 51772 ... show moreFeb 3 16:15:35 antti-vps2 sshd[3260333]: Invalid user postgres from 139.99.170.193 port 51772
Feb 3 16:17:26 antti-vps2 sshd[3261226]: Connection from 139.99.170.193 port 61308 on 10.0.0.124 port 22 rdomain ""
Feb 3 16:17:28 antti-vps2 sshd[3261226]: Invalid user user from 139.99.170.193 port 61308
Feb 3 16:19:15 antti-vps2 sshd[3262404]: Connection from 139.99.170.193 port 44172 on 10.0.0.124 port 22 rdomain ""
Feb 3 16:19:17 antti-vps2 sshd[3262404]: User root from 139.99.170.193 not allowed because none of user's groups are listed in AllowGroups
... show less
139.99.170.193 (AU/Australia/vps-b5f65267.vps.ovh.ca), 5 distributed sshd attacks on account [alex] ... show more139.99.170.193 (AU/Australia/vps-b5f65267.vps.ovh.ca), 5 distributed sshd attacks on account [alex] in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_DISTATTACK; Logs: Feb 3 10:04:48 16365 sshd[25691]: Invalid user alex from 135.181.154.212 port 54828
Feb 3 10:11:32 16365 sshd[26224]: Invalid user alex from 139.99.170.193 port 62012
Feb 3 10:06:11 16365 sshd[25843]: Failed password for invalid user alex from 198.12.114.231 port 57502 ssh2
Feb 3 10:06:09 16365 sshd[25843]: Invalid user alex from 198.12.114.231 port 57502
Feb 3 10:04:50 16365 sshd[25691]: Failed password for invalid user alex from 135.181.154.212 port 54828 ssh2
IP Addresses Blocked:
135.181.154.212 (FI/Finland/static.212.154.181.135.clients.your-server.de) show less
(sshd) Failed SSH login from 139.99.170.193 (AU/Australia/vps-b5f65267.vps.ovh.ca): 5 in the last 36 ... show more(sshd) Failed SSH login from 139.99.170.193 (AU/Australia/vps-b5f65267.vps.ovh.ca): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Feb 3 09:19:33 20083 sshd[2734]: Invalid user lighthouse from 139.99.170.193 port 18826
Feb 3 09:19:35 20083 sshd[2734]: Failed password for invalid user lighthouse from 139.99.170.193 port 18826 ssh2
Feb 3 09:23:03 20083 sshd[3020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193 user=root
Feb 3 09:23:06 20083 sshd[3020]: Failed password for root from 139.99.170.193 port 55680 ssh2
Feb 3 09:25:08 20083 sshd[3159]: Invalid user postgres from 139.99.170.193 port 29120 show less
Feb 3 16:06:42 master01vp sshd[1201824]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreFeb 3 16:06:42 master01vp sshd[1201824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193 user=root
Feb 3 16:06:43 master01vp sshd[1201824]: Failed password for root from 139.99.170.193 port 48582 ssh2
Feb 3 16:08:39 master01vp sshd[1202775]: Invalid user user from 139.99.170.193 port 14274 show less
Feb 3 15:49:47 vulcan sshd[1975569]: Failed password for root from 139.99.170.193 port 34884 ssh2<b ... show moreFeb 3 15:49:47 vulcan sshd[1975569]: Failed password for root from 139.99.170.193 port 34884 ssh2
Feb 3 15:52:19 vulcan sshd[1976269]: Invalid user admin from 139.99.170.193 port 57468
Feb 3 15:52:19 vulcan sshd[1976269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193
Feb 3 15:52:20 vulcan sshd[1976269]: Failed password for invalid user admin from 139.99.170.193 port 57468 ssh2
Feb 3 15:54:28 vulcan sshd[1976566]: Invalid user admin from 139.99.170.193 port 47292 show less
Feb 3 15:30:09 vulcan sshd[1967472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreFeb 3 15:30:09 vulcan sshd[1967472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193 user=root
Feb 3 15:30:10 vulcan sshd[1967472]: Failed password for root from 139.99.170.193 port 45328 ssh2
Feb 3 15:32:47 vulcan sshd[1967817]: Invalid user ali from 139.99.170.193 port 48756
Feb 3 15:32:47 vulcan sshd[1967817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193
Feb 3 15:32:49 vulcan sshd[1967817]: Failed password for invalid user ali from 139.99.170.193 port 48756 ssh2 show less
Lines containing failures of 139.99.170.193 (max 1000)
Feb 3 08:59:59 cumulus sshd[10519]: AD ... show moreLines containing failures of 139.99.170.193 (max 1000)
Feb 3 08:59:59 cumulus sshd[10519]: AD user alex from 139.99.170.193 port 14576
Feb 3 08:59:59 cumulus sshd[10519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193
Feb 3 09:00:02 cumulus sshd[10519]: Failed password for AD user alex from 139.99.170.193 port 14576 ssh2
Feb 3 09:00:05 cumulus sshd[10519]: Received disconnect from 139.99.170.193 port 14576:11: Bye Bye [preauth]
Feb 3 09:00:05 cumulus sshd[10519]: Disconnected from AD user alex 139.99.170.193 port 14576 [preauth]
Feb 3 09:05:12 cumulus sshd[11065]: AD user lighthouse from 139.99.170.193 port 45072
Feb 3 09:05:12 cumulus sshd[11065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193
Feb 3 09:05:15 cumulus sshd[11065]: Failed password for AD user lighthouse from 139.99.170.193 port 45072 ssh2
Feb 3 09:05:17 cumulus sshd[11065]: Received di........
------------------------------ show less
Feb 3 15:05:41 vulcan sshd[1960513]: Invalid user lighthouse from 139.99.170.193 port 16080
F ... show moreFeb 3 15:05:41 vulcan sshd[1960513]: Invalid user lighthouse from 139.99.170.193 port 16080
Feb 3 15:05:41 vulcan sshd[1960513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193
Feb 3 15:05:43 vulcan sshd[1960513]: Failed password for invalid user lighthouse from 139.99.170.193 port 16080 ssh2
Feb 3 15:07:43 vulcan sshd[1960838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.170.193 user=root
Feb 3 15:07:45 vulcan sshd[1960838]: Failed password for root from 139.99.170.193 port 22172 ssh2 show less