This IP address has been reported a total of 86
times from 65 distinct
sources.
150.139.220.13 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 14 05:32:54 vpn sshd[20112]: Failed password for root from 150.139.220.13 port 33028 ssh2
... show moreDec 14 05:32:54 vpn sshd[20112]: Failed password for root from 150.139.220.13 port 33028 ssh2
Dec 14 05:32:57 vpn sshd[20131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.220.13 user=root
Dec 14 05:32:59 vpn sshd[20131]: Failed password for root from 150.139.220.13 port 36224 ssh2
Dec 14 05:33:01 vpn sshd[20153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.220.13 user=root
Dec 14 05:33:03 vpn sshd[20153]: Failed password for root from 150.139.220.13 port 39584 ssh2 show less
Dec 14 05:11:23 monitoring sshd[3006264]: Failed password for root from 150.139.220.13 port 41488 ss ... show moreDec 14 05:11:23 monitoring sshd[3006264]: Failed password for root from 150.139.220.13 port 41488 ssh2
Dec 14 05:11:25 monitoring sshd[3006275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.220.13 user=root
Dec 14 05:11:28 monitoring sshd[3006275]: Failed password for root from 150.139.220.13 port 44764 ssh2
Dec 14 05:11:32 monitoring sshd[3006298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.139.220.13 user=root
Dec 14 05:11:33 monitoring sshd[3006298]: Failed password for root from 150.139.220.13 port 49424 ssh2
... show less