This IP address has been reported a total of 152
times from 117 distinct
sources.
161.35.139.66 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-17T11:01:40.961812+01:00 pbs-bit-lib-01.int.pdx.net.uk sshd[1833208]: Invalid user admin1 fr ... show more2024-09-17T11:01:40.961812+01:00 pbs-bit-lib-01.int.pdx.net.uk sshd[1833208]: Invalid user admin1 from 161.35.139.66 port 43368
2024-09-17T11:06:55.852279+01:00 pbs-bit-lib-01.int.pdx.net.uk sshd[1833242]: Invalid user admin1 from 161.35.139.66 port 59350
2024-09-17T11:07:34.955533+01:00 pbs-bit-lib-01.int.pdx.net.uk sshd[1833256]: Invalid user ftpuser from 161.35.139.66 port 37122
... show less
DATE:2024-09-17 12:10:30, IP:161.35.139.66, PORT:ssh SSH brute force auth on honeypot server (epe-ho ... show moreDATE:2024-09-17 12:10:30, IP:161.35.139.66, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq) show less
Sep 17 11:39:33 mail sshd[61191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreSep 17 11:39:33 mail sshd[61191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66
Sep 17 11:39:35 mail sshd[61191]: Failed password for invalid user ftptest from 161.35.139.66 port 42328 ssh2
Sep 17 11:44:14 mail sshd[61471]: Invalid user user from 161.35.139.66 port 34200
... show less
Sep 17 11:38:04 ourumov-web sshd\[9700\]: Invalid user ftptest from 161.35.139.66 port 57122
S ... show moreSep 17 11:38:04 ourumov-web sshd\[9700\]: Invalid user ftptest from 161.35.139.66 port 57122
Sep 17 11:38:04 ourumov-web sshd\[9700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66
Sep 17 11:38:06 ourumov-web sshd\[9700\]: Failed password for invalid user ftptest from 161.35.139.66 port 57122 ssh2
... show less
SSH Brute force: 30 attempts were recorded from 161.35.139.66
2024-09-17T10:46:01+02:00 Invali ... show moreSSH Brute force: 30 attempts were recorded from 161.35.139.66
2024-09-17T10:46:01+02:00 Invalid user admin1 from 161.35.139.66 port 40870
2024-09-17T10:47:02+02:00 Invalid user reza from 161.35.139.66 port 36464
2024-09-17T10:47:47+02:00 Invalid user oracle from 161.35.139.66 port 43158
2024-09-17T10:48:33+02:00 Invalid user frappe from 161.35.139.66 port 48864
2024-09-17T10:49:19+02:00 Invalid user frappe from 161.35.139.66 port 52950
2024-09-17T10:50:05+02:00 Invalid user zhangsan from 161.35.139.66 port 55126
2024-09-17T10:50:48+02:00 Invalid user test from 161.35.139.66 port 50826
2024-09-17T10:51:31+02:00 Invalid user deploy from 161.35.139.66 port 33336
2024-09-17T10:52:20+02:00 Disconnected from authenticating user root 161.35.139.66 port 53920 [preauth]
2024-09-17T10:52:59+02:00 Invalid user user from 161.35.139.66 port 52476
2024-09-17T10:53:42+02:00 Invalid user user from 161.3 show less
(sshd) Failed SSH login from 161.35.139.66 (US/United States/-): 5 in the last 3600 secs; Ports: *; ... show more(sshd) Failed SSH login from 161.35.139.66 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Sep 17 04:15:28 13683 sshd[9215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Sep 17 04:15:30 13683 sshd[9215]: Failed password for root from 161.35.139.66 port 44902 ssh2
Sep 17 04:17:18 13683 sshd[9351]: Invalid user test from 161.35.139.66 port 36582
Sep 17 04:17:19 13683 sshd[9351]: Failed password for invalid user test from 161.35.139.66 port 36582 ssh2
Sep 17 04:17:59 13683 sshd[9359]: Invalid user jenkins from 161.35.139.66 port 48244 show less
Fail2Ban automatic report:
SSH brute-force:
Sep 17 10:42:55 serw sshd[3732453]: Invalid ... show moreFail2Ban automatic report:
SSH brute-force:
Sep 17 10:42:55 serw sshd[3732453]: Invalid user admin1 from 161.35.139.66 port 44962
Sep 17 10:42:55 serw sshd[3732453]: Disconnected from invalid user admin1 161.35.139.66 port 44962 [preauth]
Sep 17 10:46:41 serw sshd[3732495]: Invalid user reza from 161.35.139.66 port 56720 show less
(sshd) Failed SSH login from 161.35.139.66 (US/United States/-): 5 in the last 3600 secs; Ports: *; ... show more(sshd) Failed SSH login from 161.35.139.66 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Sep 12 05:56:39 14439 sshd[2839]: Invalid user light from 161.35.139.66 port 35714
Sep 12 05:56:41 14439 sshd[2839]: Failed password for invalid user light from 161.35.139.66 port 35714 ssh2
Sep 12 06:03:04 14439 sshd[3899]: Invalid user webapp from 161.35.139.66 port 44496
Sep 12 06:03:07 14439 sshd[3899]: Failed password for invalid user webapp from 161.35.139.66 port 44496 ssh2
Sep 12 06:03:57 14439 sshd[3912]: Invalid user m from 161.35.139.66 port 34368 show less
(sshd) Failed SSH login from 161.35.139.66 (US/United States/-): 5 in the last 3600 secs; Ports: *; ... show more(sshd) Failed SSH login from 161.35.139.66 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Sep 12 05:22:37 14205 sshd[29870]: Invalid user hadoopuser from 161.35.139.66 port 51800
Sep 12 05:22:39 14205 sshd[29870]: Failed password for invalid user hadoopuser from 161.35.139.66 port 51800 ssh2
Sep 12 05:28:36 14205 sshd[30283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.139.66 user=root
Sep 12 05:28:38 14205 sshd[30283]: Failed password for root from 161.35.139.66 port 42076 ssh2
Sep 12 05:29:17 14205 sshd[30382]: Invalid user kamil from 161.35.139.66 port 51510 show less