This IP address has been reported a total of 12
times from 11 distinct
sources.
39.144.130.213 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 5 14:34:05 spado sshd[10434]: Failed password for root from 39.144.130.213 port 60426 ssh2<br / ... show moreDec 5 14:34:05 spado sshd[10434]: Failed password for root from 39.144.130.213 port 60426 ssh2
Dec 5 14:34:37 spado sshd[10436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.144.130.213
Dec 5 14:34:39 spado sshd[10436]: Failed password for invalid user dev from 39.144.130.213 port 60427 ssh2 show less
(sshd) Failed SSH login from 39.144.130.213 (CN/China/-): 5 in the last 3600 secs; Ports: *; Directi ... show more(sshd) Failed SSH login from 39.144.130.213 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Dec 5 17:27:18 localhost sshd[1057619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.144.130.213 user=root
Dec 5 17:27:21 localhost sshd[1057619]: Failed password for root from 39.144.130.213 port 13676 ssh2
Dec 5 17:27:43 localhost sshd[1057847]: Invalid user tc from 39.144.130.213 port 13677
Dec 5 17:27:44 localhost sshd[1057847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.144.130.213
Dec 5 17:27:45 localhost sshd[1057847]: Failed password for invalid user tc from 39.144.130.213 port 13677 ssh2 show less
Dec 5 00:35:03 Host-KLAX-C sshd[2110459]: Connection closed by 39.144.130.213 port 64856 [preauth]< ... show moreDec 5 00:35:03 Host-KLAX-C sshd[2110459]: Connection closed by 39.144.130.213 port 64856 [preauth]
... show less
2024-12-05T11:11:52.274663 mga-mga.mga.local sshd[1790999]: Invalid user kylin from 39.144.130.213 p ... show more2024-12-05T11:11:52.274663 mga-mga.mga.local sshd[1790999]: Invalid user kylin from 39.144.130.213 port 37185
2024-12-05T11:11:52.639196 mga-mga.mga.local sshd[1790999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.144.130.213
2024-12-05T11:11:54.589262 mga-mga.mga.local sshd[1790999]: Failed password for invalid user kylin from 39.144.130.213 port 37185 ssh2
... show less
Dec 5 03:12:08 main sshd[1133367]: Invalid user smb from 39.144.130.213 port 14958
Dec 5 03: ... show moreDec 5 03:12:08 main sshd[1133367]: Invalid user smb from 39.144.130.213 port 14958
Dec 5 03:12:08 main sshd[1133367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.144.130.213
Dec 5 03:12:10 main sshd[1133367]: Failed password for invalid user smb from 39.144.130.213 port 14958 ssh2
... show less
2024-12-04T23:49:29.237500mail sshd[1982107]: pam_unix(sshd:auth): authentication failure; logname= ... show more2024-12-04T23:49:29.237500mail sshd[1982107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.144.130.213 user=root
2024-12-04T23:49:31.395356mail sshd[1982107]: Failed password for root from 39.144.130.213 port 38471 ssh2
2024-12-04T23:50:10.216611mail sshd[1982514]: Invalid user tc from 39.144.130.213 port 38472
... show less
2024-12-04T13:51:55.247179danielgomez sshd[515764]: Failed password for invalid user root from 39.14 ... show more2024-12-04T13:51:55.247179danielgomez sshd[515764]: Failed password for invalid user root from 39.144.130.213 port 11546 ssh2
2024-12-04T13:52:09.852780danielgomez sshd[515766]: Connection from 39.144.130.213 port 11547 on 140.82.19.86 port 5131 rdomain ""
2024-12-04T13:52:10.695865danielgomez sshd[515766]: User root from 39.144.130.213 not allowed because not listed in AllowUsers show less
Web App Attack
Anonymous
Unauthorized connection attempt
Port ScanHackingExploited Host
Showing 1 to
12
of 12 reports
Is this your IP? You may request to takedown any associated reports.
We will attempt to verify your ownership. Request Takedown 🚩