This IP address has been reported a total of 35,323
times from 1,756 distinct
sources.
202.158.139.57 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jun 5 00:05:15 hcbbdb sshd\[14250\]: Invalid user jana from 202.158.139.57
Jun 5 00:05:15 hc ... show moreJun 5 00:05:15 hcbbdb sshd\[14250\]: Invalid user jana from 202.158.139.57
Jun 5 00:05:15 hcbbdb sshd\[14250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 5 00:05:17 hcbbdb sshd\[14250\]: Failed password for invalid user jana from 202.158.139.57 port 60202 ssh2
Jun 5 00:06:41 hcbbdb sshd\[14350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 5 00:06:43 hcbbdb sshd\[14350\]: Failed password for root from 202.158.139.57 port 50322 ssh2 show less
Jun 4 21:43:52 lumiacloud sshd\[27840\]: Invalid user nexus from 202.158.139.57 port 56660
Ju ... show moreJun 4 21:43:52 lumiacloud sshd\[27840\]: Invalid user nexus from 202.158.139.57 port 56660
Jun 4 21:43:52 lumiacloud sshd\[27840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 4 21:43:54 lumiacloud sshd\[27840\]: Failed password for invalid user nexus from 202.158.139.57 port 56660 ssh2
... show less
Jun 4 20:27:13 vps sshd[152397]: Failed password for invalid user agueda from 202.158.139.57 port 4 ... show moreJun 4 20:27:13 vps sshd[152397]: Failed password for invalid user agueda from 202.158.139.57 port 45716 ssh2
Jun 4 20:32:16 vps sshd[152439]: Invalid user uranus from 202.158.139.57 port 40358
Jun 4 20:32:16 vps sshd[152439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 4 20:32:18 vps sshd[152439]: Failed password for invalid user uranus from 202.158.139.57 port 40358 ssh2
Jun 4 20:33:43 vps sshd[152450]: Invalid user qqq from 202.158.139.57 port 58774
... show less
Jun 4 17:36:30 killmaster-server sshd[1799542]: Invalid user ik from 202.158.139.57 port 36642<br / ... show moreJun 4 17:36:30 killmaster-server sshd[1799542]: Invalid user ik from 202.158.139.57 port 36642
Jun 4 17:36:30 killmaster-server sshd[1799542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 4 17:36:30 killmaster-server sshd[1799542]: Invalid user ik from 202.158.139.57 port 36642
Jun 4 17:36:32 killmaster-server sshd[1799542]: Failed password for invalid user ik from 202.158.139.57 port 36642 ssh2
Jun 4 17:37:54 killmaster-server sshd[1799584]: Invalid user fe from 202.158.139.57 port 53688
... show less
2022-06-04T10:43:40.668690ns1.ohost.bg sshd[6734]: Failed password for invalid user geir from 202.15 ... show more2022-06-04T10:43:40.668690ns1.ohost.bg sshd[6734]: Failed password for invalid user geir from 202.158.139.57 port 53602 ssh2
2022-06-04T10:45:15.796797ns1.ohost.bg sshd[6749]: Invalid user iskandar from 202.158.139.57 port 43898
2022-06-04T10:45:15.806989ns1.ohost.bg sshd[6749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
2022-06-04T10:45:17.478043ns1.ohost.bg sshd[6749]: Failed password for invalid user iskandar from 202.158.139.57 port 43898 ssh2
2022-06-04T10:46:52.778615ns1.ohost.bg sshd[6808]: Invalid user user from 202.158.139.57 port 34194
... show less
2022-06-04T09:38:39.140190ns1.ohost.bg sshd[5542]: Failed password for invalid user joe from 202.158 ... show more2022-06-04T09:38:39.140190ns1.ohost.bg sshd[5542]: Failed password for invalid user joe from 202.158.139.57 port 50574 ssh2
2022-06-04T09:40:49.189494ns1.ohost.bg sshd[5611]: Invalid user mk from 202.158.139.57 port 45584
2022-06-04T09:40:49.201796ns1.ohost.bg sshd[5611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
2022-06-04T09:40:51.471172ns1.ohost.bg sshd[5611]: Failed password for invalid user mk from 202.158.139.57 port 45584 ssh2
2022-06-04T09:42:22.184135ns1.ohost.bg sshd[5619]: Invalid user tep from 202.158.139.57 port 35880
... show less