This IP address has been reported a total of 1,637
times from 474 distinct
sources.
42.200.139.156 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 25 05:45:31 host-134-119-215-243 sshd[21331]: pam_unix(sshd:auth): authentication failure; logna ... show moreNov 25 05:45:31 host-134-119-215-243 sshd[21331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.139.156
Nov 25 05:45:32 host-134-119-215-243 sshd[21331]: Failed password for invalid user admin from 42.200.139.156 port 39621 ssh2 show less
Nov 26 20:47:37 goldcrest sshd[536507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreNov 26 20:47:37 goldcrest sshd[536507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.139.156
Nov 26 20:47:38 goldcrest sshd[536507]: Failed password for invalid user pi from 42.200.139.156 port 33937 ssh2
Nov 26 20:47:41 goldcrest sshd[536507]: Failed password for invalid user pi from 42.200.139.156 port 33937 ssh2
Nov 26 20:47:45 goldcrest sshd[536507]: Failed password for invalid user pi from 42.200.139.156 port 33937 ssh2
... show less
Nov 27 00:55:14 v22019038103785759 sshd\[12001\]: Invalid user ubnt from 42.200.139.156 port 39745<b ... show moreNov 27 00:55:14 v22019038103785759 sshd\[12001\]: Invalid user ubnt from 42.200.139.156 port 39745
Nov 27 00:55:14 v22019038103785759 sshd\[12001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.139.156
Nov 27 00:55:16 v22019038103785759 sshd\[12001\]: Failed password for invalid user ubnt from 42.200.139.156 port 39745 ssh2
Nov 27 00:55:18 v22019038103785759 sshd\[12001\]: Failed password for invalid user ubnt from 42.200.139.156 port 39745 ssh2
Nov 27 00:55:19 v22019038103785759 sshd\[12001\]: Failed password for invalid user ubnt from 42.200.139.156 port 39745 ssh2
... show less
Nov 26 21:38:20 web sshd[3260622]: Invalid user ubnt from 42.200.139.156 port 50224
Nov 26 21: ... show moreNov 26 21:38:20 web sshd[3260622]: Invalid user ubnt from 42.200.139.156 port 50224
Nov 26 21:38:22 web sshd[3260622]: Failed password for invalid user ubnt from 42.200.139.156 port 50224 ssh2
Nov 26 21:38:26 web sshd[3260622]: Failed password for invalid user ubnt from 42.200.139.156 port 50224 ssh2
Nov 26 21:38:28 web sshd[3260622]: Failed password for invalid user ubnt from 42.200.139.156 port 50224 ssh2
Nov 26 21:38:30 web sshd[3260622]: Failed password for invalid user ubnt from 42.200.139.156 port 50224 ssh2
... show less
Nov 26 15:36:51 javastart sshd[2249746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreNov 26 15:36:51 javastart sshd[2249746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.139.156
Nov 26 15:36:53 javastart sshd[2249746]: Failed password for invalid user admin from 42.200.139.156 port 44950 ssh2
Nov 26 15:36:56 javastart sshd[2249746]: Failed password for invalid user admin from 42.200.139.156 port 44950 ssh2
Nov 26 15:36:58 javastart sshd[2249746]: Failed password for invalid user admin from 42.200.139.156 port 44950 ssh2
Nov 26 15:37:03 javastart sshd[2249746]: Failed password for invalid user admin from 42.200.139.156 port 44950 ssh2
... show less
Nov 26 15:59:38 athena sshd[711415]: Failed password for root from 42.200.139.156 port 53064 ssh2<br ... show moreNov 26 15:59:38 athena sshd[711415]: Failed password for root from 42.200.139.156 port 53064 ssh2
Nov 26 15:59:42 athena sshd[711415]: Failed password for root from 42.200.139.156 port 53064 ssh2
Nov 26 15:59:44 athena sshd[711415]: Failed password for root from 42.200.139.156 port 53064 ssh2
Nov 26 15:59:47 athena sshd[711415]: Failed password for root from 42.200.139.156 port 53064 ssh2
Nov 26 15:59:50 athena sshd[711415]: Failed password for root from 42.200.139.156 port 53064 ssh2
... show less
Unauthorized connection attempt detected from IP address 42.200.139.156 to port 22 (Germany, Frankfu ... show moreUnauthorized connection attempt detected from IP address 42.200.139.156 to port 22 (Germany, Frankfurt Main, Prepaid-Host) [f] show less
Brute-ForceExploited Host
Anonymous
2023-11-26T08:37:58.055325ellie.***.de sshd[462496]: Unable to negotiate with 42.200.139.156 port 34 ... show more2023-11-26T08:37:58.055325ellie.***.de sshd[462496]: Unable to negotiate with 42.200.139.156 port 34785: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth] show less
Nov 26 06:22:31 vps781128 sshd[2902]: error: maximum authentication attempts exceeded for invalid us ... show moreNov 26 06:22:31 vps781128 sshd[2902]: error: maximum authentication attempts exceeded for invalid user pi from 42.200.139.156 port 44198 ssh2 [preauth] show less