This IP address has been reported a total of 117
times from 84 distinct
sources.
213.139.205.201 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jan 22 08:20:49 s1-4-gra7 sshd[3452906]: Invalid user ec2-user from 213.139.205.201 port 59552 ... show moreJan 22 08:20:49 s1-4-gra7 sshd[3452906]: Invalid user ec2-user from 213.139.205.201 port 59552
Jan 22 08:22:04 s1-4-gra7 sshd[3452959]: Invalid user chrism from 213.139.205.201 port 59972 show less
Jan 22 07:56:09 s1-4-gra7 sshd[3451431]: Invalid user user1 from 213.139.205.201 port 48984
Ja ... show moreJan 22 07:56:09 s1-4-gra7 sshd[3451431]: Invalid user user1 from 213.139.205.201 port 48984
Jan 22 07:59:05 s1-4-gra7 sshd[3451505]: Invalid user node from 213.139.205.201 port 50598 show less
2025-01-22T06:48:54.914216 telos sshd[181591]: Invalid user rpo from 213.139.205.201 port 58546<br / ... show more2025-01-22T06:48:54.914216 telos sshd[181591]: Invalid user rpo from 213.139.205.201 port 58546
2025-01-22T06:50:08.718766 telos sshd[181614]: Invalid user validator from 213.139.205.201 port 59086
2025-01-22T06:52:44.146675 telos sshd[181641]: Invalid user kit from 213.139.205.201 port 60432
2025-01-22T06:53:57.388694 telos sshd[181648]: Invalid user mukul from 213.139.205.201 port 32776
2025-01-22T06:56:51.394028 telos sshd[181674]: Invalid user user1 from 213.139.205.201 port 33900
... show less
2025-01-22T06:41:01.871918 telos sshd[181509]: Invalid user pang from 213.139.205.201 port 51644<br ... show more2025-01-22T06:41:01.871918 telos sshd[181509]: Invalid user pang from 213.139.205.201 port 51644
2025-01-22T06:42:47.825002 telos sshd[181519]: Invalid user ubuntu from 213.139.205.201 port 56130
2025-01-22T06:44:03.117291 telos sshd[181533]: Invalid user add from 213.139.205.201 port 56888
2025-01-22T06:45:15.415378 telos sshd[181546]: Invalid user fleet from 213.139.205.201 port 57354
2025-01-22T06:46:25.700187 telos sshd[181553]: Invalid user lucas from 213.139.205.201 port 57706
... show less
Jan 22 07:38:21 s1-4-gra7 sshd[3450482]: Invalid user pang from 213.139.205.201 port 49008
Jan ... show moreJan 22 07:38:21 s1-4-gra7 sshd[3450482]: Invalid user pang from 213.139.205.201 port 49008
Jan 22 07:43:22 s1-4-gra7 sshd[3450793]: Invalid user add from 213.139.205.201 port 43644 show less
2025-01-22T06:57:42.649516+01:00 s1 sshd[239007]: Failed password for invalid user sol from 213.139. ... show more2025-01-22T06:57:42.649516+01:00 s1 sshd[239007]: Failed password for invalid user sol from 213.139.205.201 port 47130 ssh2
2025-01-22T06:58:54.778968+01:00 s1 sshd[239382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.205.201 user=root
2025-01-22T06:58:56.685576+01:00 s1 sshd[239382]: Failed password for root from 213.139.205.201 port 47196 ssh2
2025-01-22T07:00:05.700433+01:00 s1 sshd[239878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.205.201 user=root
2025-01-22T07:00:07.351524+01:00 s1 sshd[239878]: Failed password for root from 213.139.205.201 port 47206 ssh2
... show less
[rede-166-249] (sshd) Failed SSH login from 213.139.205.201 (DE/Germany/-): 5 in the last 3600 secs; ... show more[rede-166-249] (sshd) Failed SSH login from 213.139.205.201 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jan 22 02:55:32 sshd[15032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.205.201 user=[USERNAME]
Jan 22 02:55:34 sshd[15032]: Failed password for [USERNAME] from 213.139.205.201 port 42680 ssh2
Jan 22 02:57:59 sshd[15216]: Invalid user [USERNAME] from 213.139.205.201 port 52574
Jan 22 02:58:01 sshd[15216]: Failed password for invalid user [USERNAME] from 213.139.205.201 port 52574 ssh2
Jan 22 02:59:13 sshd[15324]: pam_unix(sshd:auth): authenti show less
2025-01-22T04:45:05.486742+00:00 widevents-tressis sshd[165891]: Invalid user validator from 213.139 ... show more2025-01-22T04:45:05.486742+00:00 widevents-tressis sshd[165891]: Invalid user validator from 213.139.205.201 port 34506
2025-01-22T04:49:49.746522+00:00 widevents-tressis sshd[166115]: Invalid user validator from 213.139.205.201 port 34554
2025-01-22T04:50:55.981538+00:00 widevents-tressis sshd[166183]: Invalid user validator from 213.139.205.201 port 34520
... show less
Jan 22 05:31:29 ghostworld sshd[1010275]: Failed password for root from 213.139.205.201 port 38324 s ... show moreJan 22 05:31:29 ghostworld sshd[1010275]: Failed password for root from 213.139.205.201 port 38324 ssh2
Jan 22 05:32:37 ghostworld sshd[1010323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.205.201 user=root
Jan 22 05:32:39 ghostworld sshd[1010323]: Failed password for root from 213.139.205.201 port 38226 ssh2
Jan 22 05:33:48 ghostworld sshd[1010379]: Invalid user sol from 213.139.205.201 port 38134
Jan 22 05:33:48 ghostworld sshd[1010379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.205.201
Jan 22 05:33:48 ghostworld sshd[1010379]: Invalid user sol from 213.139.205.201 port 38134
Jan 22 05:33:51 ghostworld sshd[1010379]: Failed password for invalid user sol from 213.139.205.201 port 38134 ssh2
... show less