This IP address has been reported a total of 35,323
times from 1,756 distinct
sources.
202.158.139.57 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
Jun 6 10:24:48 exit-2.id.gehrkens.it sshd[34775]: pam_unix(sshd:auth): authentication failure; logn ... show moreJun 6 10:24:48 exit-2.id.gehrkens.it sshd[34775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 6 10:24:50 exit-2.id.gehrkens.it sshd[34775]: Failed password for invalid user elena from 202.158.139.57 port 57750 ssh2
Jun 6 10:28:54 exit-2.id.gehrkens.it sshd[34883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
... show less
Jun 6 09:06:42 helios sshd[1710503]: Failed password for invalid user test3 from 202.158.139.57 por ... show moreJun 6 09:06:42 helios sshd[1710503]: Failed password for invalid user test3 from 202.158.139.57 port 41618 ssh2
Jun 6 09:10:48 helios sshd[1712617]: Invalid user mongodb from 202.158.139.57 port 56026
Jun 6 09:10:48 helios sshd[1712617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 6 09:10:51 helios sshd[1712617]: Failed password for invalid user mongodb from 202.158.139.57 port 56026 ssh2
Jun 6 09:12:16 helios sshd[1713337]: Invalid user informix from 202.158.139.57 port 46138 show less
Jun 6 08:44:32 gateway1-old sshd[5401]: Failed password for root from 202.158.139.57 port 49804 ssh ... show moreJun 6 08:44:32 gateway1-old sshd[5401]: Failed password for root from 202.158.139.57 port 49804 ssh2
Jun 6 08:46:01 gateway1-old sshd[5440]: Failed password for root from 202.158.139.57 port 39840 ssh2 show less
Jun 6 07:40:27 gateway1-old sshd[3164]: Failed password for root from 202.158.139.57 port 49200 ssh ... show moreJun 6 07:40:27 gateway1-old sshd[3164]: Failed password for root from 202.158.139.57 port 49200 ssh2
Jun 6 07:43:30 gateway1-old sshd[3288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 6 07:43:32 gateway1-old sshd[3288]: Failed password for invalid user rainer from 202.158.139.57 port 54472 ssh2 show less
Jun 5 19:24:22 admin sshd[378727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreJun 5 19:24:22 admin sshd[378727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 5 19:24:22 admin sshd[378727]: Invalid user oracle from 202.158.139.57 port 42766
Jun 5 19:24:24 admin sshd[378727]: Failed password for invalid user oracle from 202.158.139.57 port 42766 ssh2
Jun 5 19:25:29 admin sshd[378991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 5 19:25:30 admin sshd[378991]: Failed password for root from 202.158.139.57 port 56376 ssh2
... show less
Brute-ForceSSH
Anonymous
6 failed SSH login attempts between Sun, 05 Jun 2022 16:52:19 +0200 and Sun, 05 Jun 2022 17:03:02 +0 ... show more6 failed SSH login attempts between Sun, 05 Jun 2022 16:52:19 +0200 and Sun, 05 Jun 2022 17:03:02 +0200, port 22. show less
Jun 5 16:42:19 master01vp sshd[1533931]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreJun 5 16:42:19 master01vp sshd[1533931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 5 16:42:22 master01vp sshd[1533931]: Failed password for root from 202.158.139.57 port 38380 ssh2
Jun 5 16:43:45 master01vp sshd[1534799]: Invalid user ubuntu from 202.158.139.57 port 56148 show less
Jun 5 15:38:19 master01vp sshd[1496029]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreJun 5 15:38:19 master01vp sshd[1496029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 5 15:38:21 master01vp sshd[1496029]: Failed password for invalid user support from 202.158.139.57 port 60324 ssh2
Jun 5 15:41:35 master01vp sshd[1498064]: Invalid user tempuser from 202.158.139.57 port 36526 show less
Jun 5 15:37:38 vm580050 sshd[24152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreJun 5 15:37:38 vm580050 sshd[24152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 5 15:37:40 vm580050 sshd[24152]: Failed password for
... show less
Brute-ForceSSH
Anonymous
Jun 5 06:36:54 c220-vlx sshd[26987]: Invalid user support from 202.158.139.57 port 43586
Jun ... show moreJun 5 06:36:54 c220-vlx sshd[26987]: Invalid user support from 202.158.139.57 port 43586
Jun 5 06:36:56 c220-vlx sshd[26987]: Failed password for invalid user support from 202.158.139.57 port 43586 ssh2
... show less