This IP address has been reported a total of 2,094
times from 696 distinct
sources.
94.139.165.200 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Jan 15 13:27:21 flashfire sshd[2037838]: Failed password for invalid user testor from 94.139.165.200 ... show moreJan 15 13:27:21 flashfire sshd[2037838]: Failed password for invalid user testor from 94.139.165.200 port 46638 ssh2
Jan 15 13:27:22 flashfire sshd[2037838]: Disconnected from invalid user testor 94.139.165.200 port 46638 [preauth]
Jan 15 13:33:10 flashfire sshd[2041265]: Invalid user prueba from 94.139.165.200 port 35322
Jan 15 13:33:10 flashfire sshd[2041265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.165.200
Jan 15 13:33:11 flashfire sshd[2041265]: Failed password for invalid user prueba from 94.139.165.200 port 35322 ssh2
... show less
Detected multiple authentication failures and invalid user attempts from IP address 94.139.165.200 o ... show moreDetected multiple authentication failures and invalid user attempts from IP address 94.139.165.200 on [PT] Lis-29 Node. show less
2025-01-15T11:34:21.070272+00:00 widevents-aedaf sshd[2629854]: Invalid user ubuntu from 94.139.165. ... show more2025-01-15T11:34:21.070272+00:00 widevents-aedaf sshd[2629854]: Invalid user ubuntu from 94.139.165.200 port 50818
2025-01-15T11:37:46.407571+00:00 widevents-aedaf sshd[2630098]: Invalid user qui from 94.139.165.200 port 39208
2025-01-15T11:38:05.922138+00:00 widevents-aedaf sshd[2630128]: Invalid user gts from 94.139.165.200 port 40294
... show less
Jan 15 11:31:22 elasticsearch sshd[1301414]: Invalid user ubuntu from 94.139.165.200 port 49526<br / ... show moreJan 15 11:31:22 elasticsearch sshd[1301414]: Invalid user ubuntu from 94.139.165.200 port 49526
Jan 15 11:37:36 elasticsearch sshd[1301554]: Invalid user qui from 94.139.165.200 port 46208
Jan 15 11:38:00 elasticsearch sshd[1301587]: Invalid user gts from 94.139.165.200 port 36726
... show less
Jan 15 12:06:28 kvm11438 sshd[35701]: Failed password for root from 94.139.165.200 port 35190 ssh2<b ... show moreJan 15 12:06:28 kvm11438 sshd[35701]: Failed password for root from 94.139.165.200 port 35190 ssh2
Jan 15 12:07:06 kvm11438 sshd[36067]: Invalid user vnc from 94.139.165.200 port 45928
Jan 15 12:07:06 kvm11438 sshd[36067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.165.200
Jan 15 12:07:06 kvm11438 sshd[36067]: Invalid user vnc from 94.139.165.200 port 45928
Jan 15 12:07:08 kvm11438 sshd[36067]: Failed password for invalid user vnc from 94.139.165.200 port 45928 ssh2
... show less
2025-01-15T10:27:18.411299+00:00 cdn-nl sshd[1392859]: Invalid user radarr from 94.139.165.200 port ... show more2025-01-15T10:27:18.411299+00:00 cdn-nl sshd[1392859]: Invalid user radarr from 94.139.165.200 port 43114
2025-01-15T10:34:30.799589+00:00 cdn-nl sshd[1393104]: Invalid user user from 94.139.165.200 port 38282
2025-01-15T10:35:29.373741+00:00 cdn-nl sshd[1393156]: Invalid user test3 from 94.139.165.200 port 33652
... show less
Jan 15 04:55:06 Host-KEWR-E sshd[193530]: Invalid user team2 from 94.139.165.200 port 42766
.. ... show moreJan 15 04:55:06 Host-KEWR-E sshd[193530]: Invalid user team2 from 94.139.165.200 port 42766
... show less
Invalid user wangbin from 94.139.165.200 port 33442
Brute-ForceSSH
Anonymous
2025-01-15T10:04:39.583921+01:00 24fire sshd[1505092]: Invalid user hsm from 94.139.165.200 port 574 ... show more2025-01-15T10:04:39.583921+01:00 24fire sshd[1505092]: Invalid user hsm from 94.139.165.200 port 57436
2025-01-15T10:04:39.586276+01:00 24fire sshd[1505092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.165.200
2025-01-15T10:04:40.999262+01:00 24fire sshd[1505092]: Failed password for invalid user hsm from 94.139.165.200 port 57436 ssh2
... show less
2025-01-15T09:01:10.362622+00:00 close-s23 sshd[3201640]: Invalid user steam from 94.139.165.200 por ... show more2025-01-15T09:01:10.362622+00:00 close-s23 sshd[3201640]: Invalid user steam from 94.139.165.200 port 40032
2025-01-15T09:01:43.577508+00:00 close-s23 sshd[3201671]: Invalid user gnssr from 94.139.165.200 port 40580
2025-01-15T09:02:17.370340+00:00 close-s23 sshd[3201711]: Invalid user adrian from 94.139.165.200 port 34292
... show less
Brute-Force
Anonymous
2025-01-15T09:22:12.343600+01:00 vps575891 sshd[3638559]: pam_unix(sshd:auth): authentication failur ... show more2025-01-15T09:22:12.343600+01:00 vps575891 sshd[3638559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.165.200
2025-01-15T09:22:14.767522+01:00 vps575891 sshd[3638559]: Failed password for invalid user phoenix from 94.139.165.200 port 51420 ssh2
2025-01-15T09:22:15.293940+01:00 vps575891 sshd[3638559]: Disconnected from invalid user phoenix 94.139.165.200 port 51420 [preauth]
... show less
sshd[3467782]: Invalid user jiaxuan from 94.139.165.200 port 39612
sshd[3467782]: pam_unix(ssh ... show moresshd[3467782]: Invalid user jiaxuan from 94.139.165.200 port 39612
sshd[3467782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.165.200
sshd[3467782]: Failed password for invalid user jiaxuan from 94.139.165.200 port 39612 ssh2
sshd[3471004]: Invalid user scm from 94.139.165.200 port 49088 show less