This IP address has been reported a total of 533
times from 177 distinct
sources.
59.25.143.55 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
Oct 7 03:22:22 s158416 sshd[602684]: Invalid user admin from 59.25.143.55 port 63187
Oct 7 0 ... show moreOct 7 03:22:22 s158416 sshd[602684]: Invalid user admin from 59.25.143.55 port 63187
Oct 7 03:22:24 s158416 sshd[602684]: Failed password for invalid user admin from 59.25.143.55 port 63187 ssh2
Oct 7 03:22:28 s158416 sshd[602684]: Failed password for invalid user admin from 59.25.143.55 port 63187 ssh2
Oct 7 03:22:31 s158416 sshd[602684]: Failed password for invalid user admin from 59.25.143.55 port 63187 ssh2
Oct 7 03:22:33 s158416 sshd[602684]: Failed password for invalid user admin from 59.25.143.55 port 63187 ssh2
... show less
Oct 7 05:07:03 mazen sshd[416602]: Invalid user pi from 59.25.143.55 port 62228
Oct 7 05:07: ... show moreOct 7 05:07:03 mazen sshd[416602]: Invalid user pi from 59.25.143.55 port 62228
Oct 7 05:07:05 mazen sshd[416602]: Failed password for invalid user pi from 59.25.143.55 port 62228 ssh2
Oct 7 05:07:09 mazen sshd[416602]: Failed password for invalid user pi from 59.25.143.55 port 62228 ssh2
Oct 7 05:07:13 mazen sshd[416602]: Failed password for invalid user pi from 59.25.143.55 port 62228 ssh2
Oct 7 05:07:16 mazen sshd[416602]: Failed password for invalid user pi from 59.25.143.55 port 62228 ssh2
Oct 7 05:07:20 mazen sshd[416602]: Failed password for invalid user pi from 59.25.143.55 port 62228 ssh2
Oct 7 05:07:24 mazen sshd[416602]: Failed password for invalid user pi from 59.25.143.55 port 62228 ssh2
... show less
Oct 7 03:28:25 speedtaq-com-vm-vm sshd[24905]: Invalid user admin from 59.25.143.55 port 62697
Brute-ForceSSH
Anonymous
Oct 6 17:48:55 logopedia-1vcpu-1gb-nyc1-01 sshd[106052]: Failed password for root from 59.25.143.55 ... show moreOct 6 17:48:55 logopedia-1vcpu-1gb-nyc1-01 sshd[106052]: Failed password for root from 59.25.143.55 port 61427 ssh2
... show less
Oct 6 20:38:23 archivo-colectivo sshd[2020915]: Unable to negotiate with 59.25.143.55 port 61173: n ... show moreOct 6 20:38:23 archivo-colectivo sshd[2020915]: Unable to negotiate with 59.25.143.55 port 61173: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
Oct 6 20:43:24 archivo-colectivo sshd[2021075]: Unable to negotiate with 59.25.143.55 port 62798: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
Oct 6 20:43:37 archivo-colectivo sshd[2021077]: Unable to negotiate with 59.25.143.55 port 63231: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
... show less
Oct 6 14:41:21 corp sshd[23277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreOct 6 14:41:21 corp sshd[23277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.143.55
Oct 6 14:41:23 corp sshd[23277]: Failed password for invalid user admin from 59.25.143.55 port 62058 ssh2
Oct 6 14:41:24 corp sshd[23277]: Failed password for invalid user admin from 59.25.143.55 port 62058 ssh2
... show less
Oct 6 17:28:36 beaker sshd[3926026]: Unable to negotiate with 59.25.143.55 port 62219: no matching ... show moreOct 6 17:28:36 beaker sshd[3926026]: Unable to negotiate with 59.25.143.55 port 62219: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
... show less
Brute-ForceSSH
Anonymous
Oct 6 18:48:12 srv sshd[1480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t ... show moreOct 6 18:48:12 srv sshd[1480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.143.55
Oct 6 18:48:14 srv sshd[1480]: Failed password for invalid user pi from 59.25.143.55 port 63053 ssh2 show less
Oct 6 17:04:52 plesk sshd[2231312]: Invalid user admin from 59.25.143.55 port 61189
Oct 6 17 ... show moreOct 6 17:04:52 plesk sshd[2231312]: Invalid user admin from 59.25.143.55 port 61189
Oct 6 17:04:52 plesk sshd[2231312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.143.55
Oct 6 17:04:54 plesk sshd[2231312]: Failed password for invalid user admin from 59.25.143.55 port 61189 ssh2
Oct 6 17:04:55 plesk sshd[2231312]: Failed password for invalid user admin from 59.25.143.55 port 61189 ssh2
... show less
Oct 6 12:52:53 dagasistemas sshd[18316]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreOct 6 12:52:53 dagasistemas sshd[18316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.143.55 user=root
Oct 6 12:52:55 dagasistemas sshd[18316]: Failed password for root from 59.25.143.55 port 63539 ssh2
Oct 6 12:52:59 dagasistemas sshd[18316]: Failed password for root from 59.25.143.55 port 63539 ssh2
... show less
Oct 6 12:24:40 ab-bg sshd[5825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreOct 6 12:24:40 ab-bg sshd[5825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.143.55
Oct 6 12:24:42 ab-bg sshd[5825]: Failed password for invalid user pi from 59.25.143.55 port 60985 ssh2
Oct 6 12:24:45 ab-bg sshd[5825]: Failed password for invalid user pi from 59.25.143.55 port 60985 ssh2
Oct 6 12:24:48 ab-bg sshd[5825]: Failed password for invalid user pi from 59.25.143.55 port 60985 ssh2
... show less