This IP address has been reported a total of 35,280
times from 1,752 distinct
sources.
202.158.139.57 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jun 2 08:10:19 gw sshd\[23372\]: Invalid user gs2 from 202.158.139.57 port 60688
Jun 2 08:10 ... show moreJun 2 08:10:19 gw sshd\[23372\]: Invalid user gs2 from 202.158.139.57 port 60688
Jun 2 08:10:19 gw sshd\[23372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 2 08:10:21 gw sshd\[23372\]: Failed password for invalid user gs2 from 202.158.139.57 port 60688 ssh2
Jun 2 08:14:54 gw sshd\[23467\]: Invalid user yip from 202.158.139.57 port 49402
Jun 2 08:14:54 gw sshd\[23467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 2 08:14:56 gw sshd\[23467\]: Failed password for invalid user yip from 202.158.139.57 port 49402 ssh2
... show less
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2022-06-02T04:06:43Z
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 202.158.139.57 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Dir ... show more(sshd) Failed SSH login from 202.158.139.57 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 1 23:52:21 server2 sshd[12283]: Invalid user internat from 202.158.139.57 port 52538
Jun 1 23:52:21 server2 sshd[12283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 1 23:52:24 server2 sshd[12283]: Failed password for invalid user internat from 202.158.139.57 port 52538 ssh2
Jun 1 23:53:10 server2 sshd[12535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 1 23:53:12 server2 sshd[12535]: Failed password for root from 202.158.139.57 port 59266 ssh2 show less
Jun 2 02:12:23 flask sshd[7169]: Disconnected from authenticating user root 202.158.139.57 port 391 ... show moreJun 2 02:12:23 flask sshd[7169]: Disconnected from authenticating user root 202.158.139.57 port 39104 [preauth]
... show less
Jun 2 00:56:27 ns08 sshd[266171]: Failed password for root from 202.158.139.57 port 42730 ssh2<br / ... show moreJun 2 00:56:27 ns08 sshd[266171]: Failed password for root from 202.158.139.57 port 42730 ssh2
Jun 2 00:57:54 ns08 sshd[266223]: Invalid user training from 202.158.139.57 port 32996
Jun 2 00:57:54 ns08 sshd[266223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 2 00:57:54 ns08 sshd[266223]: Invalid user training from 202.158.139.57 port 32996
Jun 2 00:57:56 ns08 sshd[266223]: Failed password for invalid user training from 202.158.139.57 port 32996 ssh2
... show less
Jun 2 00:23:53 node4-pl sshd[1086235]: Failed password for root from 202.158.139.57 port 55356 ssh2 ... show moreJun 2 00:23:53 node4-pl sshd[1086235]: Failed password for root from 202.158.139.57 port 55356 ssh2
Jun 2 00:24:59 node4-pl sshd[1088245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 2 00:25:01 node4-pl sshd[1088245]: Failed password for root from 202.158.139.57 port 41644 ssh2
Jun 2 00:26:07 node4-pl sshd[1090065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 2 00:26:09 node4-pl sshd[1090065]: Failed password for root from 202.158.139.57 port 56164 ssh2
... show less
2022-06-01T18:00:22.785756lprvsftp01.derco.cl sshd[41661]: Invalid user kji from 202.158.139.57 port ... show more2022-06-01T18:00:22.785756lprvsftp01.derco.cl sshd[41661]: Invalid user kji from 202.158.139.57 port 50492
... show less
Jun 2 02:26:54 vps644084 sshd[1513811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreJun 2 02:26:54 vps644084 sshd[1513811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 2 02:26:56 vps644084 sshd[1513811]: Failed password for root from 202.158.139.57 port 53968 ssh2
Jun 2 02:28:18 vps644084 sshd[1513852]: Invalid user user from 202.158.139.57 port 44066
Jun 2 02:28:18 vps644084 sshd[1513852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 2 02:28:18 vps644084 sshd[1513852]: Invalid user user from 202.158.139.57 port 44066
Jun 2 02:28:20 vps644084 sshd[1513852]: Failed password for invalid user user from 202.158.139.57 port 44066 ssh2
... show less
Jun 1 22:59:49 vps7784 sshd[6572]: Failed password for root from 202.158.139.57 port 48176 ssh2<br ... show moreJun 1 22:59:49 vps7784 sshd[6572]: Failed password for root from 202.158.139.57 port 48176 ssh2
Jun 1 23:03:27 vps7784 sshd[6596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0
... show less
Jun 2 01:56:56 vps644084 sshd[1512753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreJun 2 01:56:56 vps644084 sshd[1512753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 2 01:56:58 vps644084 sshd[1512753]: Failed password for root from 202.158.139.57 port 53072 ssh2
Jun 2 02:02:49 vps644084 sshd[1512961]: Invalid user patricia from 202.158.139.57 port 52926
Jun 2 02:02:49 vps644084 sshd[1512961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 2 02:02:49 vps644084 sshd[1512961]: Invalid user patricia from 202.158.139.57 port 52926
Jun 2 02:02:51 vps644084 sshd[1512961]: Failed password for invalid user patricia from 202.158.139.57 port 52926 ssh2
... show less
Jun 1 20:30:59 srv-web sshd[2503715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreJun 1 20:30:59 srv-web sshd[2503715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 1 20:30:59 srv-web sshd[2503715]: Invalid user hq from 202.158.139.57 port 45704
Jun 1 20:31:01 srv-web sshd[2503715]: Failed password for invalid user hq from 202.158.139.57 port 45704 ssh2
Jun 1 20:31:55 srv-web sshd[2503791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 1 20:31:57 srv-web sshd[2503791]: Failed password for root from 202.158.139.57 port 56890 ssh2
... show less
Jun 1 20:30:54 niun-dev sshd[12418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreJun 1 20:30:54 niun-dev sshd[12418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57
Jun 1 20:30:54 niun-dev sshd[12418]: Invalid user hq from 202.158.139.57 port 48324
Jun 1 20:30:55 niun-dev sshd[12418]: Failed password for invalid user hq from 202.158.139.57 port 48324 ssh2
Jun 1 20:31:49 niun-dev sshd[12434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root
Jun 1 20:31:51 niun-dev sshd[12434]: Failed password for root from 202.158.139.57 port 59508 ssh2
... show less