This IP address has been reported a total of 11,707
times from 1,408 distinct
sources.
150.139.201.247 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
[rede-176-124] (sshd) Failed SSH login from 150.139.201.247 (CN/China/-): 5 in the last 3600 secs; P ... show more[rede-176-124] (sshd) Failed SSH login from 150.139.201.247 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 20 06:09:46 sshd[2951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247 user=[USERNAME]
Jun 20 06:09:47 sshd[2951]: Failed password for [USERNAME] from 150.139.201.247 port 46978 ssh2
Jun 20 06:25:19 sshd[3832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247 user=[USERNAME]
Jun 20 06:25:21 sshd[3832]: Failed password for [USERNAME] from 150.139.201.247 port 47718 ssh2
Jun 20 06: show less
2025-06-20T07:15:53.884928+02:00 mkc01-us-pop.as202427.net sshd[827178]: Invalid user testuser from ... show more2025-06-20T07:15:53.884928+02:00 mkc01-us-pop.as202427.net sshd[827178]: Invalid user testuser from 150.139.201.247 port 43260
2025-06-20T07:19:33.474511+02:00 mkc01-us-pop.as202427.net sshd[827828]: Invalid user ts3server from 150.139.201.247 port 34666
2025-06-20T07:22:58.379239+02:00 mkc01-us-pop.as202427.net sshd[828474]: User root from 150.139.201.247 not allowed because not listed in AllowUsers
... show less
2025-06-20T05:17:52.894823+02:00 Server sshd[615937]: Failed password for invalid user developer fro ... show more2025-06-20T05:17:52.894823+02:00 Server sshd[615937]: Failed password for invalid user developer from 150.139.201.247 port 41074 ssh2
2025-06-20T05:42:25.535008+02:00 Server sshd[632320]: Invalid user vpnuser from 150.139.201.247 port 46722
2025-06-20T05:42:25.540889+02:00 Server sshd[632320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
2025-06-20T05:42:27.638519+02:00 Server sshd[632320]: Failed password for invalid user vpnuser from 150.139.201.247 port 46722 ssh2
2025-06-20T05:45:13.186225+02:00 Server sshd[634138]: Invalid user User from 150.139.201.247 port 35938
... show less
Jun 20 00:48:34 web4 sshd[2994807]: Failed password for invalid user andrew from 150.139.201.247 por ... show moreJun 20 00:48:34 web4 sshd[2994807]: Failed password for invalid user andrew from 150.139.201.247 port 58020 ssh2
Jun 20 00:54:19 web4 sshd[2995811]: Invalid user postgresql from 150.139.201.247 port 34458
Jun 20 00:54:19 web4 sshd[2995811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
Jun 20 00:54:20 web4 sshd[2995811]: Failed password for invalid user postgresql from 150.139.201.247 port 34458 ssh2
Jun 20 00:59:19 web4 sshd[2996793]: Invalid user nutanix from 150.139.201.247 port 36556 show less
Jun 19 20:28:48 Neptun sshd[1554148]: Connection from 150.139.201.247 port 44800 on 85.215.78.90 por ... show moreJun 19 20:28:48 Neptun sshd[1554148]: Connection from 150.139.201.247 port 44800 on 85.215.78.90 port 22 rdomain ""
Jun 19 20:28:49 Neptun sshd[1554148]: Invalid user hossein from 150.139.201.247 port 44800
... show less
Jun 19 17:33:57 TV-DB1-R630-13 sshd[877418]: pam_unix(sshd:auth): authentication failure; logname= u ... show moreJun 19 17:33:57 TV-DB1-R630-13 sshd[877418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
Jun 19 17:33:59 TV-DB1-R630-13 sshd[877418]: Failed password for invalid user chen from 150.139.201.247 port 39514 ssh2
Jun 19 17:43:22 TV-DB1-R630-13 sshd[877440]: Invalid user zxl from 150.139.201.247 port 51254
Jun 19 17:43:22 TV-DB1-R630-13 sshd[877440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
Jun 19 17:43:24 TV-DB1-R630-13 sshd[877440]: Failed password for invalid user zxl from 150.139.201.247 port 51254 ssh2
... show less
Jun 19 16:31:33 unifi sshd[336874]: Failed password for invalid user ubuntu from 150.139.201.247 por ... show moreJun 19 16:31:33 unifi sshd[336874]: Failed password for invalid user ubuntu from 150.139.201.247 port 51878 ssh2
Jun 19 16:34:54 unifi sshd[336924]: Invalid user alex from 150.139.201.247 port 43168
Jun 19 16:34:54 unifi sshd[336924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
Jun 19 16:34:56 unifi sshd[336924]: Failed password for invalid user alex from 150.139.201.247 port 43168 ssh2
Jun 19 16:38:10 unifi sshd[336946]: Invalid user deploy from 150.139.201.247 port 34454
... show less
2025-06-19T16:21:57.554711+02:00 server sshd[214447]: pam_unix(sshd:auth): authentication failure; l ... show more2025-06-19T16:21:57.554711+02:00 server sshd[214447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
2025-06-19T16:21:59.577768+02:00 server sshd[214447]: Failed password for invalid user packer from 150.139.201.247 port 34552 ssh2
2025-06-19T16:28:27.583506+02:00 server sshd[219899]: Invalid user ubuntu from 150.139.201.247 port 45352
2025-06-19T16:28:27.587379+02:00 server sshd[219899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
2025-06-19T16:28:29.485070+02:00 server sshd[219899]: Failed password for invalid user ubuntu from 150.139.201.247 port 45352 ssh2
... show less
Jun 19 16:14:54 unifi sshd[336639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreJun 19 16:14:54 unifi sshd[336639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
Jun 19 16:14:56 unifi sshd[336639]: Failed password for invalid user frappe-user from 150.139.201.247 port 39030 ssh2
Jun 19 16:18:24 unifi sshd[336706]: Invalid user ubuntu from 150.139.201.247 port 58504
Jun 19 16:18:24 unifi sshd[336706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
Jun 19 16:18:25 unifi sshd[336706]: Failed password for invalid user ubuntu from 150.139.201.247 port 58504 ssh2
... show less
2025-06-19T15:55:26.448965+02:00 server sshd[191513]: Failed password for invalid user ftptest from ... show more2025-06-19T15:55:26.448965+02:00 server sshd[191513]: Failed password for invalid user ftptest from 150.139.201.247 port 47892 ssh2
2025-06-19T15:58:40.454969+02:00 server sshd[194444]: Invalid user user from 150.139.201.247 port 39178
2025-06-19T15:58:40.458905+02:00 server sshd[194444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
2025-06-19T15:58:42.030631+02:00 server sshd[194444]: Failed password for invalid user user from 150.139.201.247 port 39178 ssh2
2025-06-19T16:01:57.343675+02:00 server sshd[197161]: Invalid user ubuntu from 150.139.201.247 port 58696
... show less
Jun 19 15:51:53 unifi sshd[336384]: Failed password for invalid user mongod from 150.139.201.247 por ... show moreJun 19 15:51:53 unifi sshd[336384]: Failed password for invalid user mongod from 150.139.201.247 port 43614 ssh2
Jun 19 15:55:13 unifi sshd[336405]: Invalid user ftptest from 150.139.201.247 port 34902
Jun 19 15:55:13 unifi sshd[336405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
Jun 19 15:55:15 unifi sshd[336405]: Failed password for invalid user ftptest from 150.139.201.247 port 34902 ssh2
Jun 19 15:58:30 unifi sshd[336424]: Invalid user user from 150.139.201.247 port 54420
... show less
2025-06-19T15:39:08.397776+02:00 server sshd[177442]: pam_unix(sshd:auth): authentication failure; l ... show more2025-06-19T15:39:08.397776+02:00 server sshd[177442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247 user=root
2025-06-19T15:39:10.742107+02:00 server sshd[177442]: Failed password for root from 150.139.201.247 port 35052 ssh2
2025-06-19T15:42:24.272840+02:00 server sshd[180109]: Invalid user testik from 150.139.201.247 port 54534
2025-06-19T15:42:24.278190+02:00 server sshd[180109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
2025-06-19T15:42:25.860438+02:00 server sshd[180109]: Failed password for invalid user testik from 150.139.201.247 port 54534 ssh2
... show less
Jun 19 15:35:35 unifi sshd[336248]: Invalid user minecraft from 150.139.201.247 port 59004
Jun ... show moreJun 19 15:35:35 unifi sshd[336248]: Invalid user minecraft from 150.139.201.247 port 59004
Jun 19 15:35:35 unifi sshd[336248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247
Jun 19 15:35:37 unifi sshd[336248]: Failed password for invalid user minecraft from 150.139.201.247 port 59004 ssh2
Jun 19 15:38:58 unifi sshd[336301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.201.247 user=root
Jun 19 15:39:00 unifi sshd[336301]: Failed password for root from 150.139.201.247 port 50298 ssh2
... show less
Brute-ForceSSH
Showing 16 to
30
of 11707 reports
Is this your IP? You may request to takedown any associated reports.
We will attempt to verify your ownership. Request Takedown 🚩