This IP address has been reported a total of 30,339
times from 1,921 distinct
sources.
96.69.13.140 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-01-21T08:54:00.195427+00:00 mapir-proxmox sshd[288428]: Invalid user nessus from 96.69.13.140 p ... show more2025-01-21T08:54:00.195427+00:00 mapir-proxmox sshd[288428]: Invalid user nessus from 96.69.13.140 port 57754
2025-01-21T08:54:00.196980+00:00 mapir-proxmox sshd[288428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140
2025-01-21T08:54:01.846722+00:00 mapir-proxmox sshd[288428]: Failed password for invalid user nessus from 96.69.13.140 port 57754 ssh2
... show less
2025-01-21T08:59:44.222938+01:00 nc5.motyka.pro sshd[2233671]: Failed password for root from 96.69.1 ... show more2025-01-21T08:59:44.222938+01:00 nc5.motyka.pro sshd[2233671]: Failed password for root from 96.69.13.140 port 60207 ssh2
2025-01-21T09:03:24.651046+01:00 nc5.motyka.pro sshd[2238787]: Failed password for root from 96.69.13.140 port 56263 ssh2
2025-01-21T09:04:45.826532+01:00 nc5.motyka.pro sshd[2240585]: Failed password for root from 96.69.13.140 port 42204 ssh2
2025-01-21T09:06:10.156665+01:00 nc5.motyka.pro sshd[2242529]: Failed password for root from 96.69.13.140 port 56378 ssh2
2025-01-21T09:07:35.683008+01:00 nc5.motyka.pro sshd[2244487]: Failed password for root from 96.69.13.140 port 42323 ssh2
... show less
2025-01-21T08:42:47.891839+01:00 mail.blatovi.de sshd[213317]: Invalid user admin from 96.69.13.140 ... show more2025-01-21T08:42:47.891839+01:00 mail.blatovi.de sshd[213317]: Invalid user admin from 96.69.13.140 port 49192
2025-01-21T08:42:47.898479+01:00 mail.blatovi.de sshd[213317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140
2025-01-21T08:42:50.272398+01:00 mail.blatovi.de sshd[213317]: Failed password for invalid user admin from 96.69.13.140 port 49192 ssh2
2025-01-21T08:44:05.197945+01:00 mail.blatovi.de sshd[213967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140 user=root
2025-01-21T08:44:06.945603+01:00 mail.blatovi.de sshd[213967]: Failed password for root from 96.69.13.140 port 34786 ssh2
... show less
2025-01-21T08:11:24.766741+01:00 mail.blatovi.de sshd[197279]: Failed password for invalid user denn ... show more2025-01-21T08:11:24.766741+01:00 mail.blatovi.de sshd[197279]: Failed password for invalid user dennis from 96.69.13.140 port 40832 ssh2
2025-01-21T08:16:04.343398+01:00 mail.blatovi.de sshd[199625]: Invalid user esb from 96.69.13.140 port 41152
2025-01-21T08:16:04.349388+01:00 mail.blatovi.de sshd[199625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140
2025-01-21T08:16:06.657833+01:00 mail.blatovi.de sshd[199625]: Failed password for invalid user esb from 96.69.13.140 port 41152 ssh2
2025-01-21T08:17:24.669530+01:00 mail.blatovi.de sshd[200319]: Invalid user wujiawei from 96.69.13.140 port 54980
... show less
Jan 21 06:26:40 web4 sshd[2062989]: Failed password for invalid user dbadmin from 96.69.13.140 port ... show moreJan 21 06:26:40 web4 sshd[2062989]: Failed password for invalid user dbadmin from 96.69.13.140 port 42735 ssh2
Jan 21 06:28:02 web4 sshd[2063042]: Invalid user ec2-user from 96.69.13.140 port 56664
Jan 21 06:28:02 web4 sshd[2063042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140
Jan 21 06:28:03 web4 sshd[2063042]: Failed password for invalid user ec2-user from 96.69.13.140 port 56664 ssh2
Jan 21 06:29:17 web4 sshd[2063097]: Invalid user tunnel from 96.69.13.140 port 42260 show less
Jan 21 06:00:27 hardcore-tesla sshd[1385309]: Failed password for invalid user sol from 96.69.13.140 ... show moreJan 21 06:00:27 hardcore-tesla sshd[1385309]: Failed password for invalid user sol from 96.69.13.140 port 42073 ssh2
Jan 21 06:01:56 hardcore-tesla sshd[1385318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140 user=root
Jan 21 06:01:59 hardcore-tesla sshd[1385318]: Failed password for root from 96.69.13.140 port 56968 ssh2
Jan 21 06:03:27 hardcore-tesla sshd[1385338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140 user=root
Jan 21 06:03:30 hardcore-tesla sshd[1385338]: Failed password for root from 96.69.13.140 port 43627 ssh2
... show less
Jan 21 05:45:02 hardcore-tesla sshd[1385186]: Failed password for root from 96.69.13.140 port 34308 ... show moreJan 21 05:45:02 hardcore-tesla sshd[1385186]: Failed password for root from 96.69.13.140 port 34308 ssh2
Jan 21 05:46:37 hardcore-tesla sshd[1385202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140 user=root
Jan 21 05:46:40 hardcore-tesla sshd[1385202]: Failed password for root from 96.69.13.140 port 49201 ssh2
Jan 21 05:48:15 hardcore-tesla sshd[1385227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140 user=root
Jan 21 05:48:17 hardcore-tesla sshd[1385227]: Failed password for root from 96.69.13.140 port 35863 ssh2
... show less
Jan 21 05:31:20 hardcore-tesla sshd[1385059]: Invalid user validator from 96.69.13.140 port 41431<br ... show moreJan 21 05:31:20 hardcore-tesla sshd[1385059]: Invalid user validator from 96.69.13.140 port 41431
Jan 21 05:31:20 hardcore-tesla sshd[1385059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140
Jan 21 05:31:22 hardcore-tesla sshd[1385059]: Failed password for invalid user validator from 96.69.13.140 port 41431 ssh2
Jan 21 05:32:56 hardcore-tesla sshd[1385072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140 user=root
Jan 21 05:32:58 hardcore-tesla sshd[1385072]: Failed password for root from 96.69.13.140 port 56330 ssh2
... show less
2025-01-21T04:48:20.729046+01:00 bcn01-es-pop.as202427.net sshd[166798]: User root from 96.69.13.140 ... show more2025-01-21T04:48:20.729046+01:00 bcn01-es-pop.as202427.net sshd[166798]: User root from 96.69.13.140 not allowed because not listed in AllowUsers
2025-01-21T04:52:25.776955+01:00 bcn01-es-pop.as202427.net sshd[167401]: Invalid user hanyijia from 96.69.13.140 port 48298
2025-01-21T04:53:51.950405+01:00 bcn01-es-pop.as202427.net sshd[167754]: User root from 96.69.13.140 not allowed because not listed in AllowUsers
... show less
2025-01-21T04:03:51.683300+01:00 Linux10 sshd[583523]: Failed password for invalid user asdasd from ... show more2025-01-21T04:03:51.683300+01:00 Linux10 sshd[583523]: Failed password for invalid user asdasd from 96.69.13.140 port 58463 ssh2
2025-01-21T04:05:08.849928+01:00 Linux10 sshd[587111]: Invalid user admins from 96.69.13.140 port 44071
2025-01-21T04:05:08.853644+01:00 Linux10 sshd[587111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140
2025-01-21T04:05:10.567310+01:00 Linux10 sshd[587111]: Failed password for invalid user admins from 96.69.13.140 port 44071 ssh2
2025-01-21T04:06:26.396644+01:00 Linux10 sshd[590553]: Invalid user butter from 96.69.13.140 port 57911
2025-01-21T04:06:26.401252+01:00 Linux10 sshd[590553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.13.140
2025-01-21T04:06:28.491266+01:00 Linux10 sshd[590553]: Failed password for invalid user butter from 96.69.13.140 port 57911 ssh2
2025-01-21T04:07:47.578529+01:00 Linux10 sshd[593952]: pam_unix(sshd:auth): authentication
... show less
2025-01-21T02:57:31.342192+00:00 widevents-nutricneo sshd[92958]: Invalid user anvel from 96.69.13.1 ... show more2025-01-21T02:57:31.342192+00:00 widevents-nutricneo sshd[92958]: Invalid user anvel from 96.69.13.140 port 52621
2025-01-21T03:02:35.955464+00:00 widevents-nutricneo sshd[300752]: Invalid user asdasd from 96.69.13.140 port 54364
2025-01-21T03:03:58.182685+00:00 widevents-nutricneo sshd[300833]: Invalid user admins from 96.69.13.140 port 39972
... show less
2025-01-21T04:02:24.733932+01:00 ariane-Precision-Tower-5810 sshd[640061]: Invalid user anvel from 9 ... show more2025-01-21T04:02:24.733932+01:00 ariane-Precision-Tower-5810 sshd[640061]: Invalid user anvel from 96.69.13.140 port 43676
... show less