This IP address has been reported a total of 9,130
times from 1,156 distinct
sources.
159.28.66.99 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Aug 5 05:55:35 b146-52 sshd[813688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreAug 5 05:55:35 b146-52 sshd[813688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99
Aug 5 05:55:38 b146-52 sshd[813688]: Failed password for invalid user pyt from 159.28.66.99 port 42340 ssh2
Aug 5 05:57:38 b146-52 sshd[814036]: Invalid user jason from 159.28.66.99 port 37646
... show less
Aug 5 09:36:31 linux sshd[1809975]: Invalid user sic from 159.28.66.99 port 48112
Aug 5 09:4 ... show moreAug 5 09:36:31 linux sshd[1809975]: Invalid user sic from 159.28.66.99 port 48112
Aug 5 09:42:32 linux sshd[1811924]: Invalid user hen from 159.28.66.99 port 40138
Aug 5 09:44:22 linux sshd[1812534]: Invalid user lixin from 159.28.66.99 port 44762
Aug 5 09:45:09 linux sshd[1812697]: Invalid user administrator from 159.28.66.99 port 32950
Aug 5 09:45:57 linux sshd[1812954]: Invalid user ard from 159.28.66.99 port 49370
... show less
Brute-ForceSSH
Anonymous
Aug 5 10:39:45 d-code sshd[11129]: Invalid user datacenter from 159.28.66.99 port 54398
Aug ... show moreAug 5 10:39:45 d-code sshd[11129]: Invalid user datacenter from 159.28.66.99 port 54398
Aug 5 10:40:37 d-code sshd[11163]: Invalid user cj from 159.28.66.99 port 42620
Aug 5 10:43:04 d-code sshd[11294]: Invalid user test9999 from 159.28.66.99 port 35508
... show less
Brute-ForceSSH
Anonymous
Aug 5 10:21:34 d-code sshd[10440]: Invalid user kerapetse from 159.28.66.99 port 59466
Aug 5 ... show moreAug 5 10:21:34 d-code sshd[10440]: Invalid user kerapetse from 159.28.66.99 port 59466
Aug 5 10:23:11 d-code sshd[10522]: Invalid user vhserver from 159.28.66.99 port 35904
Aug 5 10:24:00 d-code sshd[10560]: Invalid user mattias from 159.28.66.99 port 52354
... show less
2024-08-05T09:20:57.683013+01:00 web1 sshd[4078588]: Invalid user kerapetse from 159.28.66.99 port 5 ... show more2024-08-05T09:20:57.683013+01:00 web1 sshd[4078588]: Invalid user kerapetse from 159.28.66.99 port 54604
2024-08-05T09:22:36.233677+01:00 web1 sshd[4078638]: Invalid user vhserver from 159.28.66.99 port 59278
... show less
Brute-Force
Anonymous
159.28.66.99 (JP/Japan/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports ... show more159.28.66.99 (JP/Japan/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Aug 5 04:10:30 server4 sshd[29157]: Failed password for root from 43.134.108.239 port 60768 ssh2
Aug 5 04:17:02 server4 sshd[29976]: Failed password for root from 159.28.66.99 port 44646 ssh2
Aug 5 04:18:44 server4 sshd[30120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.28.238 user=root
Aug 5 04:10:27 server4 sshd[29157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.108.239 user=root
Aug 5 04:16:04 server4 sshd[29903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.8.170 user=root
Aug 5 04:16:05 server4 sshd[29903]: Failed password for root from 107.172.8.170 port 48338 ssh2
Aug 5 08:47:33 plesk sshd[11809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreAug 5 08:47:33 plesk sshd[11809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99
Aug 5 08:47:35 plesk sshd[11809]: Failed password for invalid user telecomadmin from 159.28.66.99 port 33868 ssh2
Aug 5 08:48:24 plesk sshd[12083]: Invalid user adshare from 159.28.66.99 port 50260
Aug 5 08:48:24 plesk sshd[12083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99
Aug 5 08:48:26 plesk sshd[12083]: Failed password for invalid user adshare from 159.28.66.99 port 50260 ssh2 show less
2024-08-05 01:18:31,444 fail2ban.actions [977]: NOTICE [sshd] Ban 159.28.66.99
Brute-ForceSSH
Anonymous
Aug 5 05:39:33 f2b auth.info sshd[52212]: Failed password for root from 159.28.66.99 port 60352 ssh ... show moreAug 5 05:39:33 f2b auth.info sshd[52212]: Failed password for root from 159.28.66.99 port 60352 ssh2
Aug 5 05:43:15 f2b auth.info sshd[52246]: Failed password for root from 159.28.66.99 port 35630 ssh2
Aug 5 05:44:02 f2b auth.info sshd[52261]: Invalid user duty1 from 159.28.66.99 port 49626
... show less
Aug 5 06:29:23 proxy sshd[92798]: User root from 159.28.66.99 not allowed because not listed in All ... show moreAug 5 06:29:23 proxy sshd[92798]: User root from 159.28.66.99 not allowed because not listed in AllowUsers
Aug 5 06:31:45 proxy sshd[92812]: Invalid user kmk from 159.28.66.99 port 36216
Aug 5 06:32:31 proxy sshd[92840]: Invalid user ubuntu from 159.28.66.99 port 50184
... show less
Aug 5 06:01:03 teamcity sshd[2364380]: Invalid user unity from 159.28.66.99 port 56000
Aug 5 ... show moreAug 5 06:01:03 teamcity sshd[2364380]: Invalid user unity from 159.28.66.99 port 56000
Aug 5 06:04:14 teamcity sshd[2364972]: Invalid user mk from 159.28.66.99 port 56906
Aug 5 06:05:00 teamcity sshd[2365140]: Invalid user bogus from 159.28.66.99 port 43016
... show less
Aug 5 06:01:10 dockerhost sshd[3342325]: Invalid user unity from 159.28.66.99 port 43016
Aug ... show moreAug 5 06:01:10 dockerhost sshd[3342325]: Invalid user unity from 159.28.66.99 port 43016
Aug 5 06:04:21 dockerhost sshd[3349748]: Invalid user mk from 159.28.66.99 port 43920
... show less
Aug 5 06:01:01 t7-core-development sshd[1374492]: pam_unix(sshd:auth): authentication failure; logn ... show moreAug 5 06:01:01 t7-core-development sshd[1374492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99
Aug 5 06:01:01 t7-core-development sshd[1374492]: Invalid user unity from 159.28.66.99 port 46948
Aug 5 06:01:02 t7-core-development sshd[1374492]: Failed password for invalid user unity from 159.28.66.99 port 46948 ssh2
Aug 5 06:01:47 t7-core-development sshd[1374532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99 user=root
Aug 5 06:01:49 t7-core-development sshd[1374532]: Failed password for root from 159.28.66.99 port 33056 ssh2
Aug 5 06:02:33 t7-core-development sshd[1374563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.28.66.99 user=root
Aug 5 06:02:35 t7-core-development sshd[1374563]: Failed password for root from 159.28.66.99 port 47396 ssh2
... show less