This IP address has been reported a total of 152
times from 117 distinct
sources.
161.35.139.66 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Oct 2 01:28:43 dabeau sshd[4898]: Invalid user ubuntu from 161.35.139.66 port 52222
Oct 2 01 ... show moreOct 2 01:28:43 dabeau sshd[4898]: Invalid user ubuntu from 161.35.139.66 port 52222
Oct 2 01:28:43 dabeau sshd[4898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66
Oct 2 01:28:46 dabeau sshd[4898]: Failed password for invalid user ubuntu from 161.35.139.66 port 52222 ssh2
... show less
Oct 1 20:24:20 vmi1405600 sshd[2576181]: Failed password for root from 161.35.139.66 port 50504 ssh ... show moreOct 1 20:24:20 vmi1405600 sshd[2576181]: Failed password for root from 161.35.139.66 port 50504 ssh2
Oct 1 20:24:57 vmi1405600 sshd[2576926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Oct 1 20:24:59 vmi1405600 sshd[2576926]: Failed password for root from 161.35.139.66 port 53064 ssh2
... show less
Oct 2 00:24:15 v4bgp sshd[2497969]: Failed password for root from 161.35.139.66 port 43888 ssh2<br ... show moreOct 2 00:24:15 v4bgp sshd[2497969]: Failed password for root from 161.35.139.66 port 43888 ssh2
Oct 2 00:24:51 v4bgp sshd[2497986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Oct 2 00:24:54 v4bgp sshd[2497986]: Failed password for root from 161.35.139.66 port 51628 ssh2
... show less
Oct 1 22:50:48 web-proxy02 sshd[1571766]: Failed password for root from 161.35.139.66 port 59320 ss ... show moreOct 1 22:50:48 web-proxy02 sshd[1571766]: Failed password for root from 161.35.139.66 port 59320 ssh2
Oct 1 22:51:24 web-proxy02 sshd[1571824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Oct 1 22:51:25 web-proxy02 sshd[1571824]: Failed password for root from 161.35.139.66 port 32930 ssh2
... show less
2024-10-02T00:47:14.888520+02:00 ezri sshd[2900235]: User root from 161.35.139.66 not allowed becaus ... show more2024-10-02T00:47:14.888520+02:00 ezri sshd[2900235]: User root from 161.35.139.66 not allowed because not listed in AllowUsers
2024-10-02T00:47:14.978121+02:00 ezri sshd[2900235]: Disconnected from invalid user root 161.35.139.66 port 51306 [preauth]
2024-10-02T00:50:41.752605+02:00 ezri sshd[2900582]: User root from 161.35.139.66 not allowed because not listed in AllowUsers
... show less
Brute-ForceSSH
Anonymous
Oct 1 23:33:43 ho05 sshd[363894]: Failed password for root from 161.35.139.66 port 33802 ssh2 ... show moreOct 1 23:33:43 ho05 sshd[363894]: Failed password for root from 161.35.139.66 port 33802 ssh2
Oct 1 23:34:19 ho05 sshd[366251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Oct 1 23:34:21 ho05 sshd[366251]: Failed password for root from 161.35.139.66 port 51550 ssh2
Oct 1 23:34:55 ho05 sshd[368021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Oct 1 23:34:57 ho05 sshd[368021]: Failed password for root from 161.35.139.66 port 54114 ssh2
... show less
Oct 1 22:17:02 monitoring sshd[1029563]: Failed password for root from 161.35.139.66 port 46050 ssh ... show moreOct 1 22:17:02 monitoring sshd[1029563]: Failed password for root from 161.35.139.66 port 46050 ssh2
Oct 1 22:17:39 monitoring sshd[1029710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Oct 1 22:17:41 monitoring sshd[1029710]: Failed password for root from 161.35.139.66 port 47772 ssh2
Oct 1 22:18:17 monitoring sshd[1029846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Oct 1 22:18:19 monitoring sshd[1029846]: Failed password for root from 161.35.139.66 port 40844 ssh2
... show less
Oct 1 19:34:18 hecnet-us-east-gw sshd[476305]: pam_unix(sshd:auth): authentication failure; logname ... show moreOct 1 19:34:18 hecnet-us-east-gw sshd[476305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Oct 1 19:34:20 hecnet-us-east-gw sshd[476305]: Failed password for invalid user root from 161.35.139.66 port 45864 ssh2
Oct 1 19:34:22 hecnet-us-east-gw sshd[476305]: Disconnected from invalid user root 161.35.139.66 port 45864 [preauth]
... show less