This IP address has been reported a total of 2,031
times from 643 distinct
sources.
139.99.187.91 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Mar 2 08:45:19 h2930838 sshd[23733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 2 08:45:19 h2930838 sshd[23733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91
Mar 2 08:45:21 h2930838 sshd[23733]: Failed password for invalid user sebastian from 139.99.187.91 port 49662 ssh2 show less
Mar 2 07:05:33 CVM46267 sshd[2133990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMar 2 07:05:33 CVM46267 sshd[2133990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91
Mar 2 07:05:35 CVM46267 sshd[2133990]: Failed password for invalid user myftp from 139.99.187.91 port 36974 ssh2
Mar 2 07:11:11 CVM46267 sshd[2134691]: Invalid user administrator from 139.99.187.91 port 49212
... show less
2025-03-02T07:37:34.270254+01:00 deb sshd[365558]: Failed password for invalid user sreejith from 13 ... show more2025-03-02T07:37:34.270254+01:00 deb sshd[365558]: Failed password for invalid user sreejith from 139.99.187.91 port 54142 ssh2
2025-03-02T07:38:57.938470+01:00 deb sshd[365577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91 user=root
2025-03-02T07:38:59.792547+01:00 deb sshd[365577]: Failed password for root from 139.99.187.91 port 42592 ssh2
2025-03-02T07:40:26.805057+01:00 deb sshd[365594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91 user=root
2025-03-02T07:40:28.545232+01:00 deb sshd[365594]: Failed password for root from 139.99.187.91 port 56518 ssh2
... show less
2025-03-02T07:22:59.640666+01:00 deb sshd[365400]: Invalid user peertube from 139.99.187.91 port 337 ... show more2025-03-02T07:22:59.640666+01:00 deb sshd[365400]: Invalid user peertube from 139.99.187.91 port 33718
2025-03-02T07:22:59.642459+01:00 deb sshd[365400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91
2025-03-02T07:23:01.980227+01:00 deb sshd[365400]: Failed password for invalid user peertube from 139.99.187.91 port 33718 ssh2
2025-03-02T07:24:33.524166+01:00 deb sshd[365416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91 user=root
2025-03-02T07:24:35.434948+01:00 deb sshd[365416]: Failed password for root from 139.99.187.91 port 50700 ssh2
... show less
2025-03-02T06:22:23.198231+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[861644]: pam_unix(sshd:auth): au ... show more2025-03-02T06:22:23.198231+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[861644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91 user=root
2025-03-02T06:22:25.124485+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[861644]: Failed password for root from 139.99.187.91 port 60888 ssh2
2025-03-02T06:23:53.381081+00:00 edge-ntt-vie01.int.pdx.net.uk sshd[861970]: Invalid user peertube from 139.99.187.91 port 43086
... show less
2025-03-02T06:31:48.069567+01:00 v1735003841 sshd[1176648]: pam_unix(sshd:auth): authentication fail ... show more2025-03-02T06:31:48.069567+01:00 v1735003841 sshd[1176648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91 user=root
2025-03-02T06:31:49.815372+01:00 v1735003841 sshd[1176648]: Failed password for root from 139.99.187.91 port 47348 ssh2
2025-03-02T06:33:22.423286+01:00 v1735003841 sshd[1176851]: Invalid user oracle from 139.99.187.91 port 35008
2025-03-02T06:33:22.425464+01:00 v1735003841 sshd[1176851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91
2025-03-02T06:33:25.074669+01:00 v1735003841 sshd[1176851]: Failed password for invalid user oracle from 139.99.187.91 port 35008 ssh2
... show less
Brute-ForceSSH
Anonymous
2025-03-02T00:26:06.389887 SPARTAN sshd[14756]: Invalid user user1 from 139.99.187.91 port 53056<br ... show more2025-03-02T00:26:06.389887 SPARTAN sshd[14756]: Invalid user user1 from 139.99.187.91 port 53056
2025-03-02T00:26:06.395327 SPARTAN sshd[14756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip91.ip-139-99-187.net
2025-03-02T00:26:07.865579 SPARTAN sshd[14756]: Failed password for invalid user user1 from 139.99.187.91 port 53056 ssh2
2025-03-02T00:31:22.512973 SPARTAN sshd[17624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip91.ip-139-99-187.net user=root
2025-03-02T00:31:24.376689 SPARTAN sshd[17624]: Failed password for root from 139.99.187.91 port 43852 ssh2
... show less
Mar 2 06:25:14 Hestia sshd[1129221]: Invalid user user1 from 139.99.187.91 port 41454
Mar 2 ... show moreMar 2 06:25:14 Hestia sshd[1129221]: Invalid user user1 from 139.99.187.91 port 41454
Mar 2 06:25:14 Hestia sshd[1129221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91
Mar 2 06:25:14 Hestia sshd[1129221]: Invalid user user1 from 139.99.187.91 port 41454
Mar 2 06:25:16 Hestia sshd[1129221]: Failed password for invalid user user1 from 139.99.187.91 port 41454 ssh2
Mar 2 06:31:11 Hestia sshd[1144958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91 user=root
Mar 2 06:31:13 Hestia sshd[1144958]: Failed password for root from 139.99.187.91 port 40766 ssh2
... show less
Mar 2 06:43:51 exoticrp sshd[31909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 2 06:43:51 exoticrp sshd[31909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91
Mar 2 06:43:51 exoticrp sshd[31909]: Invalid user ftpuser1 from 139.99.187.91 port 40986
Mar 2 06:43:54 exoticrp sshd[31909]: Failed password for invalid user ftpuser1 from 139.99.187.91 port 40986 ssh2
Mar 2 06:45:19 exoticrp sshd[31997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91 user=root
Mar 2 06:45:22 exoticrp sshd[31997]: Failed password for root from 139.99.187.91 port 56994 ssh2
Mar 2 06:46:46 exoticrp sshd[32085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.187.91 user=root
Mar 2 06:46:48 exoticrp sshd[32085]: Failed password for root from 139.99.187.91 port 36026 ssh2
... show less