This IP address has been reported a total of 41,847
times from 1,861 distinct
sources.
213.215.140.6 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Jan 21 01:30:12 ismay sshd[2403447]: Failed password for root from 213.215.140.6 port 46144 ssh2<br ... show moreJan 21 01:30:12 ismay sshd[2403447]: Failed password for root from 213.215.140.6 port 46144 ssh2
Jan 21 01:31:23 ismay sshd[2403577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.140.6 user=root
Jan 21 01:31:25 ismay sshd[2403577]: Failed password for root from 213.215.140.6 port 45510 ssh2
Jan 21 01:32:32 ismay sshd[2403602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.140.6 user=root
Jan 21 01:32:33 ismay sshd[2403602]: Failed password for root from 213.215.140.6 port 44874 ssh2
... show less
Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2025-01-21T07:57:44Z and 2025-01-2 ... show moreCowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2025-01-21T07:57:44Z and 2025-01-21T07:57:46Z show less
This IP address carried out 80 port scanning attempts on 20-01-2025. For more information or to repo ... show moreThis IP address carried out 80 port scanning attempts on 20-01-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
Port ScanSSH
Anonymous
Jan 21 06:26:24 newbrook-two sshd[1068385]: Invalid user peer from 213.215.140.6 port 48824
Ja ... show moreJan 21 06:26:24 newbrook-two sshd[1068385]: Invalid user peer from 213.215.140.6 port 48824
Jan 21 06:28:15 newbrook-two sshd[1068912]: Invalid user siva from 213.215.140.6 port 54266
Jan 21 06:29:27 newbrook-two sshd[1069256]: Invalid user sia from 213.215.140.6 port 53852
Jan 21 06:30:37 newbrook-two sshd[1069557]: Invalid user hyc from 213.215.140.6 port 53432
Jan 21 06:31:50 newbrook-two sshd[1069937]: Invalid user vncuser from 213.215.140.6 port 53016
... show less
2025-01-20T22:23:47.946537-08:00 RoblOracle sshd-session[2502681]: Invalid user peer from 213.215.14 ... show more2025-01-20T22:23:47.946537-08:00 RoblOracle sshd-session[2502681]: Invalid user peer from 213.215.140.6 port 58898
2025-01-20T22:27:40.778005-08:00 RoblOracle sshd-session[2504148]: Invalid user siva from 213.215.140.6 port 53798
2025-01-20T22:28:52.202102-08:00 RoblOracle sshd-session[2504488]: Invalid user sia from 213.215.140.6 port 53382
2025-01-20T22:30:03.250895-08:00 RoblOracle sshd-session[2504819]: Invalid user hyc from 213.215.140.6 port 52970
2025-01-20T22:31:15.524859-08:00 RoblOracle sshd-session[2505232]: Invalid user vncuser from 213.215.140.6 port 52550
... show less
Jan 21 07:23:54 h2buntu sshd[942862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreJan 21 07:23:54 h2buntu sshd[942862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.140.6
Jan 21 07:23:56 h2buntu sshd[942862]: Failed password for invalid user peer from 213.215.140.6 port 43212 ssh2
Jan 21 07:27:41 h2buntu sshd[943282]: Invalid user siva from 213.215.140.6 port 37314
... show less
This IP address carried out 20 SSH credential attack (attempts) on 20-01-2025. For more information ... show moreThis IP address carried out 20 SSH credential attack (attempts) on 20-01-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
Jan 21 05:53:42 <server> sshd\[19846\]: User root from 213.215.140.6 not allowed because not listed ... show moreJan 21 05:53:42 <server> sshd\[19846\]: User root from 213.215.140.6 not allowed because not listed in AllowUsersJan 21 05:53:44 <server> sshd\[19846\]: Failed password for invalid user root from 213.215.140.6 port 43354 ssh2
... show less