Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cabezuela del Valle

Region: Extremadura

Country: Spain

Internet Service Provider: Telefonica de Espana Sau

Hostname: unknown

Organization: Telefonica De Espana

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
(sshd) Failed SSH login from 2.139.209.78 (ES/Spain/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 31 05:09:26 server4 sshd[18373]: Invalid user usuario from 2.139.209.78
Aug 31 05:09:27 server4 sshd[18373]: Failed password for invalid user usuario from 2.139.209.78 port 35261 ssh2
Aug 31 05:15:07 server4 sshd[21530]: Failed password for root from 2.139.209.78 port 38041 ssh2
Aug 31 05:18:40 server4 sshd[23485]: Invalid user minecraft from 2.139.209.78
Aug 31 05:18:42 server4 sshd[23485]: Failed password for invalid user minecraft from 2.139.209.78 port 55985 ssh2
2020-08-31 17:24:53
attackbots
Aug 29 20:12:58 eddieflores sshd\[6867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78  user=backup
Aug 29 20:13:00 eddieflores sshd\[6867\]: Failed password for backup from 2.139.209.78 port 35830 ssh2
Aug 29 20:16:39 eddieflores sshd\[7084\]: Invalid user untu from 2.139.209.78
Aug 29 20:16:39 eddieflores sshd\[7084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Aug 29 20:16:41 eddieflores sshd\[7084\]: Failed password for invalid user untu from 2.139.209.78 port 47416 ssh2
2020-08-30 14:32:41
attackspambots
Aug 30 03:14:54 vps768472 sshd\[1164\]: Invalid user elastic from 2.139.209.78 port 58301
Aug 30 03:14:54 vps768472 sshd\[1164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Aug 30 03:14:57 vps768472 sshd\[1164\]: Failed password for invalid user elastic from 2.139.209.78 port 58301 ssh2
...
2020-08-30 08:15:35
attack
2020-08-29T09:17:07.104076morrigan.ad5gb.com sshd[13799]: Invalid user kundan from 2.139.209.78 port 45356
2020-08-29T09:17:09.317738morrigan.ad5gb.com sshd[13799]: Failed password for invalid user kundan from 2.139.209.78 port 45356 ssh2
2020-08-29 23:09:10
attack
$f2bV_matches
2020-08-27 22:09:42
attackspam
Invalid user test from 2.139.209.78 port 49053
2020-08-27 07:43:50
attackbotsspam
Aug 24 00:51:47 serwer sshd\[25062\]: Invalid user alfredo from 2.139.209.78 port 47082
Aug 24 00:51:47 serwer sshd\[25062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Aug 24 00:51:49 serwer sshd\[25062\]: Failed password for invalid user alfredo from 2.139.209.78 port 47082 ssh2
Aug 24 00:55:27 serwer sshd\[25435\]: Invalid user alejandro from 2.139.209.78 port 42746
Aug 24 00:55:27 serwer sshd\[25435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Aug 24 00:55:29 serwer sshd\[25435\]: Failed password for invalid user alejandro from 2.139.209.78 port 42746 ssh2
Aug 24 00:58:03 serwer sshd\[25622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78  user=root
Aug 24 00:58:05 serwer sshd\[25622\]: Failed password for root from 2.139.209.78 port 57053 ssh2
Aug 24 01:00:15 serwer sshd\[25910\]: pam_unix\(sshd:auth\):
...
2020-08-24 16:48:32
attack
Aug 23 17:16:53 rush sshd[15054]: Failed password for root from 2.139.209.78 port 36495 ssh2
Aug 23 17:22:48 rush sshd[15359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Aug 23 17:22:51 rush sshd[15359]: Failed password for invalid user buser from 2.139.209.78 port 35947 ssh2
...
2020-08-24 01:38:44
attackbotsspam
SSH Brute-Forcing (server2)
2020-08-22 20:21:07
attack
prod8
...
2020-08-21 22:56:49
attack
Aug 21 14:05:30 jane sshd[6929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78 
Aug 21 14:05:32 jane sshd[6929]: Failed password for invalid user kenji from 2.139.209.78 port 37243 ssh2
...
2020-08-21 20:06:35
attack
Bruteforce detected by fail2ban
2020-08-21 05:37:41
attackbots
Brute-force attempt banned
2020-08-20 22:24:30
attackspam
Aug 19 15:55:41 game-panel sshd[4419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Aug 19 15:55:43 game-panel sshd[4419]: Failed password for invalid user sftp from 2.139.209.78 port 41601 ssh2
Aug 19 16:00:56 game-panel sshd[4597]: Failed password for root from 2.139.209.78 port 43847 ssh2
2020-08-20 00:36:53
attack
$f2bV_matches
2020-07-07 15:59:16
attackspambots
Jul  4 02:18:15 buvik sshd[14675]: Invalid user cot from 2.139.209.78
Jul  4 02:18:15 buvik sshd[14675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Jul  4 02:18:17 buvik sshd[14675]: Failed password for invalid user cot from 2.139.209.78 port 45424 ssh2
...
2020-07-04 08:27:38
attackspam
Apr 18 16:07:08 server sshd[9739]: Failed password for root from 2.139.209.78 port 46434 ssh2
Apr 18 16:12:36 server sshd[13734]: Failed password for invalid user pr from 2.139.209.78 port 51051 ssh2
Apr 18 16:17:01 server sshd[17354]: Failed password for invalid user ubuntu from 2.139.209.78 port 40275 ssh2
2020-04-18 22:22:15
attackspambots
2020-04-16T06:33:51.2038871495-001 sshd[38737]: Failed password for invalid user wp from 2.139.209.78 port 32903 ssh2
2020-04-16T06:37:15.4820771495-001 sshd[38831]: Invalid user paola from 2.139.209.78 port 36340
2020-04-16T06:37:15.4853941495-001 sshd[38831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.red-2-139-209.staticip.rima-tde.net
2020-04-16T06:37:15.4820771495-001 sshd[38831]: Invalid user paola from 2.139.209.78 port 36340
2020-04-16T06:37:17.6061641495-001 sshd[38831]: Failed password for invalid user paola from 2.139.209.78 port 36340 ssh2
2020-04-16T06:40:55.1481521495-001 sshd[38883]: Invalid user deploy from 2.139.209.78 port 39771
...
2020-04-16 19:22:10
attackbotsspam
Apr  7 06:27:06 ny01 sshd[12662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Apr  7 06:27:08 ny01 sshd[12662]: Failed password for invalid user bot from 2.139.209.78 port 58826 ssh2
Apr  7 06:30:57 ny01 sshd[13277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
2020-04-07 18:56:33
attackbotsspam
Apr  5 16:30:08 ws12vmsma01 sshd[11392]: Failed password for root from 2.139.209.78 port 59763 ssh2
Apr  5 16:33:50 ws12vmsma01 sshd[11998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.red-2-139-209.staticip.rima-tde.net  user=root
Apr  5 16:33:51 ws12vmsma01 sshd[11998]: Failed password for root from 2.139.209.78 port 36212 ssh2
...
2020-04-06 04:52:48
attackbotsspam
Invalid user oracle from 2.139.209.78 port 34539
2020-03-23 04:52:10
attackbots
B: Abusive ssh attack
2020-03-19 00:03:28
attackspam
Invalid user lihao from 2.139.209.78 port 57982
2020-03-18 06:20:24
attackspambots
Mar 10 02:40:28 areeb-Workstation sshd[13671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78 
Mar 10 02:40:30 areeb-Workstation sshd[13671]: Failed password for invalid user qwe789asd45651 from 2.139.209.78 port 39695 ssh2
...
2020-03-10 05:11:47
attackbots
SSH Brute-Forcing (server1)
2020-03-08 14:17:47
attackbotsspam
Mar  6 15:03:15 localhost sshd\[26561\]: Invalid user cron from 2.139.209.78
Mar  6 15:03:15 localhost sshd\[26561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Mar  6 15:03:17 localhost sshd\[26561\]: Failed password for invalid user cron from 2.139.209.78 port 50862 ssh2
Mar  6 15:07:25 localhost sshd\[26833\]: Invalid user sistemas from 2.139.209.78
Mar  6 15:07:25 localhost sshd\[26833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
...
2020-03-06 22:15:15
attackspam
Mar  4 22:53:27 * sshd[30410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Mar  4 22:53:28 * sshd[30410]: Failed password for invalid user green from 2.139.209.78 port 55651 ssh2
2020-03-05 06:51:55
attack
Mar  3 08:47:56 NPSTNNYC01T sshd[15745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Mar  3 08:47:59 NPSTNNYC01T sshd[15745]: Failed password for invalid user tester from 2.139.209.78 port 59385 ssh2
Mar  3 08:56:44 NPSTNNYC01T sshd[16133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
...
2020-03-03 21:58:17
attackspambots
Mar  3 02:15:37 NPSTNNYC01T sshd[27537]: Failed password for sshd from 2.139.209.78 port 55876 ssh2
Mar  3 02:24:00 NPSTNNYC01T sshd[27999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Mar  3 02:24:02 NPSTNNYC01T sshd[27999]: Failed password for invalid user watari from 2.139.209.78 port 44016 ssh2
...
2020-03-03 15:33:01
attack
Invalid user youtrack from 2.139.209.78 port 34309
2020-02-25 08:10:00
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.139.209.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12268
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.139.209.78.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050600 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue May 07 00:17:53 +08 2019
;; MSG SIZE  rcvd: 116

Host info
78.209.139.2.in-addr.arpa domain name pointer 78.red-2-139-209.staticip.rima-tde.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
78.209.139.2.in-addr.arpa	name = 78.red-2-139-209.staticip.rima-tde.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
171.13.5.102 attack
Rude login attack (3 tries in 1d)
2019-09-21 00:39:53
61.69.78.78 attackspam
$f2bV_matches
2019-09-21 00:20:36
181.48.29.35 attackbotsspam
Sep 20 13:18:12 nextcloud sshd\[19505\]: Invalid user mai from 181.48.29.35
Sep 20 13:18:12 nextcloud sshd\[19505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.29.35
Sep 20 13:18:13 nextcloud sshd\[19505\]: Failed password for invalid user mai from 181.48.29.35 port 42858 ssh2
...
2019-09-21 00:16:06
110.188.70.99 attack
Sep 20 15:15:57 cp sshd[25111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.188.70.99
2019-09-21 00:24:22
111.39.27.219 attackbotsspam
Sep 20 17:41:59 smtp postfix/smtpd[54500]: warning: unknown[111.39.27.219]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 17:42:17 smtp postfix/smtpd[54500]: warning: unknown[111.39.27.219]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 17:42:37 smtp postfix/smtpd[54500]: warning: unknown[111.39.27.219]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 17:42:56 smtp postfix/smtpd[54500]: warning: unknown[111.39.27.219]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 17:43:13 smtp postfix/smtpd[54500]: warning: unknown[111.39.27.219]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-21 00:46:17
64.62.143.231 attackspambots
Sep 20 01:53:09 hcbb sshd\[15414\]: Invalid user cuo from 64.62.143.231
Sep 20 01:53:09 hcbb sshd\[15414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.62.143.231
Sep 20 01:53:10 hcbb sshd\[15414\]: Failed password for invalid user cuo from 64.62.143.231 port 40136 ssh2
Sep 20 01:57:52 hcbb sshd\[16331\]: Invalid user Administrator from 64.62.143.231
Sep 20 01:57:52 hcbb sshd\[16331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.62.143.231
2019-09-21 00:32:52
81.133.216.92 attackspambots
SSH Brute Force, server-1 sshd[23732]: Failed password for invalid user saphir from 81.133.216.92 port 57992 ssh2
2019-09-21 01:00:42
139.59.71.90 attack
SSH Brute Force, server-1 sshd[31547]: Failed password for invalid user matt from 139.59.71.90 port 57510 ssh2
2019-09-21 00:57:48
68.183.193.46 attackspam
SSH Brute Force, server-1 sshd[20599]: Failed password for invalid user nero17 from 68.183.193.46 port 51636 ssh2
2019-09-21 01:01:13
192.3.135.166 attackspambots
Sep 20 16:28:05 venus sshd\[28300\]: Invalid user marie from 192.3.135.166 port 44360
Sep 20 16:28:05 venus sshd\[28300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.135.166
Sep 20 16:28:06 venus sshd\[28300\]: Failed password for invalid user marie from 192.3.135.166 port 44360 ssh2
...
2019-09-21 00:43:04
36.75.122.60 attack
Automatic report - Port Scan Attack
2019-09-21 00:31:48
5.153.42.21 attackspam
$f2bV_matches
2019-09-21 00:26:07
195.58.123.109 attackspambots
Sep 20 18:16:56 lnxded64 sshd[16978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.58.123.109
2019-09-21 00:53:39
60.182.34.247 attackspambots
Rude login attack (4 tries in 1d)
2019-09-21 00:37:58
186.250.48.17 attackbots
Sep 20 14:14:10 core sshd[13366]: Invalid user sasha from 186.250.48.17 port 44460
Sep 20 14:14:12 core sshd[13366]: Failed password for invalid user sasha from 186.250.48.17 port 44460 ssh2
...
2019-09-21 00:38:39

Recently Reported IPs

166.36.164.116 168.167.79.105 62.4.15.163 52.79.156.20
130.200.53.41 123.23.54.108 157.186.146.255 14.32.124.239
166.82.156.83 66.228.45.154 54.36.148.8 117.154.7.68
64.233.167.121 104.27.130.225 32.16.7.135 66.251.181.124
81.201.125.163 101.207.245.23 190.80.159.182 188.165.174.156