This IP address has been reported a total of 9,133
times from 1,156 distinct
sources.
159.28.66.99 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
159.28.66.99 (JP/Japan/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports ... show more159.28.66.99 (JP/Japan/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Aug 5 17:27:34 server2 sshd[32125]: Failed password for root from 62.138.0.19 port 42372 ssh2
Aug 5 17:30:35 server2 sshd[32726]: Failed password for root from 103.242.117.140 port 56158 ssh2
Aug 5 17:29:10 server2 sshd[32343]: Failed password for root from 194.50.16.221 port 60072 ssh2
Aug 5 17:29:12 server2 sshd[32391]: Failed password for root from 194.50.16.221 port 39364 ssh2
Aug 5 17:31:18 server2 sshd[417]: Failed password for root from 159.28.66.99 port 58588 ssh2
IP Addresses Blocked:
62.138.0.19 (DE/Germany/-)
103.242.117.140 (IN/India/-)
194.50.16.221 (NL/Netherlands/-) show less
Brute-Force
Anonymous
B: f2b ssh aggressive 3x
Brute-ForceSSH
Anonymous
Aug 5 19:02:42 Ubuntu-Main sshd[413225]: Failed password for ubuntu from 159.28.66.99 port 48144 ss ... show moreAug 5 19:02:42 Ubuntu-Main sshd[413225]: Failed password for ubuntu from 159.28.66.99 port 48144 ssh2
Aug 5 19:02:40 Ubuntu-Main sshd[413225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99 user=ubuntu
Aug 5 19:02:42 Ubuntu-Main sshd[413225]: Failed password for ubuntu from 159.28.66.99 port 48144 ssh2
Aug 5 19:03:31 Ubuntu-Main sshd[413239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99 user=root
Aug 5 19:03:32 Ubuntu-Main sshd[413239]: Failed password for root from 159.28.66.99 port 35852 ssh2
... show less
2024-08-05T18:24:37.351086+02:00 tuz sshd-session[1631397]: Invalid user sgt from 159.28.66.99 port ... show more2024-08-05T18:24:37.351086+02:00 tuz sshd-session[1631397]: Invalid user sgt from 159.28.66.99 port 47182
2024-08-05T18:27:56.650922+02:00 tuz sshd-session[1631678]: Invalid user tios from 159.28.66.99 port 50376
2024-08-05T18:29:06.627486+02:00 tuz sshd-session[1631704]: Invalid user Sean from 159.28.66.99 port 38516
2024-08-05T18:29:59.397115+02:00 tuz sshd-session[1631719]: Invalid user sina from 159.28.66.99 port 54872
2024-08-05T18:34:09.814993+02:00 tuz sshd-session[1632175]: Invalid user ts from 159.28.66.99 port 51946
... show less
Aug 5 15:54:00 de-fra2-ntp1 sshd[1626331]: Invalid user hl from 159.28.66.99 port 49018
Aug ... show moreAug 5 15:54:00 de-fra2-ntp1 sshd[1626331]: Invalid user hl from 159.28.66.99 port 49018
Aug 5 15:54:51 de-fra2-ntp1 sshd[1626419]: Invalid user andy from 159.28.66.99 port 37226
Aug 5 15:58:14 de-fra2-ntp1 sshd[1626863]: Invalid user ubuntu from 159.28.66.99 port 46524
... show less
2024-08-05 09:43:28.177719-0500 localhost sshd\[67436\]: Failed password for root from 159.28.66.99 ... show more2024-08-05 09:43:28.177719-0500 localhost sshd\[67436\]: Failed password for root from 159.28.66.99 port 34830 ssh2
2024-08-05 09:45:42.364522-0500 localhost sshd\[67649\]: Invalid user kkr from 159.28.66.99 port 59824
2024-08-05 09:45:44.394700-0500 localhost sshd\[67649\]: Failed password for invalid user kkr from 159.28.66.99 port 59824 ssh2
... show less
Aug 5 14:04:50 page-lgbt sshd[483195]: Invalid user km from 159.28.66.99 port 32966
Aug 5 14 ... show moreAug 5 14:04:50 page-lgbt sshd[483195]: Invalid user km from 159.28.66.99 port 32966
Aug 5 14:12:08 page-lgbt sshd[483307]: Invalid user support from 159.28.66.99 port 44584
Aug 5 14:12:59 page-lgbt sshd[483349]: Invalid user ase from 159.28.66.99 port 32968
Aug 5 14:13:49 page-lgbt sshd[483360]: Invalid user nishi from 159.28.66.99 port 49580
Aug 5 14:14:41 page-lgbt sshd[483383]: Invalid user ky from 159.28.66.99 port 37964
... show less
Aug 5 16:12:13 SpotlightRP sshd[1300931]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreAug 5 16:12:13 SpotlightRP sshd[1300931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99
Aug 5 16:12:13 SpotlightRP sshd[1300931]: Invalid user support from 159.28.66.99 port 38440
Aug 5 16:12:15 SpotlightRP sshd[1300931]: Failed password for invalid user support from 159.28.66.99 port 38440 ssh2
Aug 5 16:13:03 SpotlightRP sshd[1300965]: Invalid user ase from 159.28.66.99 port 55054
Aug 5 16:13:03 SpotlightRP sshd[1300965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99
Aug 5 16:13:03 SpotlightRP sshd[1300965]: Invalid user ase from 159.28.66.99 port 55054
Aug 5 16:13:05 SpotlightRP sshd[1300965]: Failed password for invalid user ase from 159.28.66.99 port 55054 ssh2
... show less
2024-08-05T16:12:00.597903+02:00 runner3 sshd[1564412]: pam_unix(sshd:auth): authentication failure; ... show more2024-08-05T16:12:00.597903+02:00 runner3 sshd[1564412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99 user=root
2024-08-05T16:12:02.229226+02:00 runner3 sshd[1564412]: Failed password for root from 159.28.66.99 port 48320 ssh2
2024-08-05T16:12:51.281684+02:00 runner3 sshd[1565131]: Invalid user support from 159.28.66.99 port 36702
2024-08-05T16:12:51.283501+02:00 runner3 sshd[1565131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99
2024-08-05T16:12:52.915631+02:00 runner3 sshd[1565131]: Failed password for invalid user support from 159.28.66.99 port 36702 ssh2
... show less
Aug 5 13:04:42 hardcore-tesla sshd[3335920]: pam_unix(sshd:auth): authentication failure; logname= ... show moreAug 5 13:04:42 hardcore-tesla sshd[3335920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99 user=root
Aug 5 13:04:44 hardcore-tesla sshd[3335920]: Failed password for root from 159.28.66.99 port 53414 ssh2
Aug 5 13:05:34 hardcore-tesla sshd[3335929]: Invalid user aaaa from 159.28.66.99 port 41808
Aug 5 13:05:34 hardcore-tesla sshd[3335929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99
Aug 5 13:05:37 hardcore-tesla sshd[3335929]: Failed password for invalid user aaaa from 159.28.66.99 port 41808 ssh2
... show less
Aug 5 06:58:40 b146-25 sshd[1665958]: Failed password for invalid user adminit from 159.28.66.99 po ... show moreAug 5 06:58:40 b146-25 sshd[1665958]: Failed password for invalid user adminit from 159.28.66.99 port 56998 ssh2
Aug 5 07:04:41 b146-25 sshd[1666872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99 user=root
Aug 5 07:04:42 b146-25 sshd[1666872]: Failed password for root from 159.28.66.99 port 49412 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 5 11:49:13 pylos sshd[2715422]: Invalid user pyt from 159.28.66.99 port 49762
Aug 5 11:5 ... show moreAug 5 11:49:13 pylos sshd[2715422]: Invalid user pyt from 159.28.66.99 port 49762
Aug 5 11:57:03 pylos sshd[2715438]: Invalid user jason from 159.28.66.99 port 52694
Aug 5 11:57:55 pylos sshd[2715444]: Invalid user mohsen from 159.28.66.99 port 40844
... show less