Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Cruz de Tenerife

Region: Canary Islands

Country: Spain

Internet Service Provider: Telefonica de Espana Sau

Hostname: unknown

Organization: Telefonica De Espana

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
May  8 18:45:04 mail sshd\[17169\]: Invalid user postgres from 2.139.215.255
May  8 18:45:04 mail sshd\[17169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
May  8 18:45:06 mail sshd\[17169\]: Failed password for invalid user postgres from 2.139.215.255 port 43077 ssh2
...
2020-05-09 01:46:48
attackspam
Apr 26 04:44:34 ws12vmsma01 sshd[44373]: Invalid user gogs from 2.139.215.255
Apr 26 04:44:38 ws12vmsma01 sshd[44373]: Failed password for invalid user gogs from 2.139.215.255 port 37783 ssh2
Apr 26 04:46:29 ws12vmsma01 sshd[44619]: Invalid user admin from 2.139.215.255
...
2020-04-26 17:33:22
attackbots
Invalid user wy from 2.139.215.255 port 37024
2020-04-19 03:52:39
attackbots
$f2bV_matches
2020-04-16 12:30:46
attackspam
Apr 10 07:41:07 mail sshd[28910]: Invalid user dts from 2.139.215.255
...
2020-04-10 14:40:58
attack
Apr  9 03:05:55 ws24vmsma01 sshd[166091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
Apr  9 03:05:57 ws24vmsma01 sshd[166091]: Failed password for invalid user test from 2.139.215.255 port 49261 ssh2
...
2020-04-09 18:34:30
attack
Apr  8 00:28:25 ny01 sshd[7624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
Apr  8 00:28:27 ny01 sshd[7624]: Failed password for invalid user felix from 2.139.215.255 port 63676 ssh2
Apr  8 00:32:19 ny01 sshd[8131]: Failed password for root from 2.139.215.255 port 26076 ssh2
2020-04-08 12:53:23
attack
Invalid user cacti from 2.139.215.255 port 40846
2020-04-04 18:26:36
attackbots
Mar 31 01:46:12 host01 sshd[2635]: Failed password for root from 2.139.215.255 port 18730 ssh2
Mar 31 01:50:17 host01 sshd[3665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 
Mar 31 01:50:20 host01 sshd[3665]: Failed password for invalid user kafka from 2.139.215.255 port 32265 ssh2
...
2020-03-31 08:11:36
attackspam
Mar 28 23:05:38 Ubuntu-1404-trusty-64-minimal sshd\[25162\]: Invalid user ubuntu from 2.139.215.255
Mar 28 23:05:38 Ubuntu-1404-trusty-64-minimal sshd\[25162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
Mar 28 23:05:39 Ubuntu-1404-trusty-64-minimal sshd\[25162\]: Failed password for invalid user ubuntu from 2.139.215.255 port 58351 ssh2
Mar 28 23:07:33 Ubuntu-1404-trusty-64-minimal sshd\[25821\]: Invalid user user from 2.139.215.255
Mar 28 23:07:33 Ubuntu-1404-trusty-64-minimal sshd\[25821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
2020-03-29 06:13:24
attackspam
sshd jail - ssh hack attempt
2020-03-27 03:59:04
attackbotsspam
2020-03-25T00:29:34.413965linuxbox-skyline sshd[15786]: Invalid user ubuntu from 2.139.215.255 port 51606
...
2020-03-25 14:46:47
attackbots
(sshd) Failed SSH login from 2.139.215.255 (ES/Spain/Catalonia/Barcelona/255.red-2-139-215.staticip.rima-tde.net/[AS3352 Telefonica De Espana]): 1 in the last 3600 secs
2020-03-20 02:58:52
attack
Brute-force attempt banned
2020-03-18 22:37:05
attackbotsspam
Jan  4 10:15:27 pi sshd[2496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 
Jan  4 10:15:29 pi sshd[2496]: Failed password for invalid user admin from 2.139.215.255 port 35403 ssh2
2020-03-13 22:53:08
attackbots
Mar 10 15:06:05 gw1 sshd[25459]: Failed password for 2667399 from 2.139.215.255 port 15030 ssh2
...
2020-03-10 19:53:30
attack
Mar  7 06:55:44 IngegnereFirenze sshd[18507]: Failed password for invalid user user from 2.139.215.255 port 58201 ssh2
...
2020-03-07 16:32:18
attack
Mar  6 01:49:44 webhost01 sshd[21247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
Mar  6 01:49:45 webhost01 sshd[21247]: Failed password for invalid user user from 2.139.215.255 port 46182 ssh2
...
2020-03-06 03:35:10
attackspam
Mar  5 09:04:56 server sshd[226026]: Failed password for invalid user user from 2.139.215.255 port 36759 ssh2
Mar  5 09:08:40 server sshd[226643]: Failed password for invalid user admin from 2.139.215.255 port 63305 ssh2
Mar  5 09:12:31 server sshd[227217]: Failed password for invalid user oracle from 2.139.215.255 port 34854 ssh2
2020-03-05 16:34:09
attackbotsspam
Invalid user ubuntu from 2.139.215.255 port 11103
2020-02-18 14:48:15
attackspam
2020-1-25 4:20:41 PM: ssh bruteforce [3 failed attempts]
2020-01-26 00:41:23
attack
Jan 24 14:42:07 XXXXXX sshd[11512]: Invalid user ts from 2.139.215.255 port 41867
2020-01-24 23:27:24
attackbots
Jan 16 16:28:59 vmd26974 sshd[15497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
Jan 16 16:29:00 vmd26974 sshd[15497]: Failed password for invalid user pos from 2.139.215.255 port 34084 ssh2
...
2020-01-17 00:05:24
attack
SSH Login Bruteforce
2020-01-15 17:05:58
attackbotsspam
SSH Brute Force
2020-01-14 05:11:27
attackbotsspam
Jan 10 16:44:01 master sshd[15020]: Failed password for invalid user admin from 2.139.215.255 port 51565 ssh2
Jan 10 16:46:10 master sshd[15031]: Failed password for invalid user phion from 2.139.215.255 port 16574 ssh2
2020-01-10 22:49:58
attackspambots
Jan 10 06:54:14 itv-usvr-01 sshd[26154]: Invalid user admin from 2.139.215.255
Jan 10 06:54:14 itv-usvr-01 sshd[26154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
Jan 10 06:54:14 itv-usvr-01 sshd[26154]: Invalid user admin from 2.139.215.255
Jan 10 06:54:16 itv-usvr-01 sshd[26154]: Failed password for invalid user admin from 2.139.215.255 port 12878 ssh2
Jan 10 06:56:06 itv-usvr-01 sshd[26217]: Invalid user phion from 2.139.215.255
2020-01-10 07:56:31
attackspambots
Jan  8 14:27:15 web1 sshd\[19299\]: Invalid user admin from 2.139.215.255
Jan  8 14:27:15 web1 sshd\[19299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
Jan  8 14:27:16 web1 sshd\[19299\]: Failed password for invalid user admin from 2.139.215.255 port 55684 ssh2
Jan  8 14:29:20 web1 sshd\[19471\]: Invalid user phion from 2.139.215.255
Jan  8 14:29:20 web1 sshd\[19471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255
2020-01-09 08:48:32
attackbotsspam
2020-01-03T13:20:03.533461hub.schaetter.us sshd\[15564\]: Invalid user admin from 2.139.215.255 port 46656
2020-01-03T13:20:03.542674hub.schaetter.us sshd\[15564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.red-2-139-215.staticip.rima-tde.net
2020-01-03T13:20:05.267329hub.schaetter.us sshd\[15564\]: Failed password for invalid user admin from 2.139.215.255 port 46656 ssh2
2020-01-03T13:21:52.497249hub.schaetter.us sshd\[15573\]: Invalid user phion from 2.139.215.255 port 11655
2020-01-03T13:21:52.505776hub.schaetter.us sshd\[15573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.red-2-139-215.staticip.rima-tde.net
...
2020-01-03 21:47:34
attack
Dec 21 03:50:09 server sshd\[2611\]: Failed password for invalid user postgres from 2.139.215.255 port 47957 ssh2
Dec 21 14:28:54 server sshd\[11551\]: Invalid user postgres from 2.139.215.255
Dec 21 14:28:54 server sshd\[11551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.red-2-139-215.staticip.rima-tde.net 
Dec 21 14:28:56 server sshd\[11551\]: Failed password for invalid user postgres from 2.139.215.255 port 61222 ssh2
Dec 21 16:33:02 server sshd\[12996\]: Invalid user postgres from 2.139.215.255
Dec 21 16:33:02 server sshd\[12996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.red-2-139-215.staticip.rima-tde.net 
...
2019-12-21 22:06:18
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.139.215.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5102
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.139.215.255.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 13 04:03:14 CST 2019
;; MSG SIZE  rcvd: 117
Host info
255.215.139.2.in-addr.arpa domain name pointer 255.red-2-139-215.staticip.rima-tde.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
255.215.139.2.in-addr.arpa	name = 255.red-2-139-215.staticip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.122.221.210 attackbots
Invalid user ra from 45.122.221.210 port 40266
2020-04-02 18:00:07
93.191.20.34 attackspambots
Invalid user zig from 93.191.20.34 port 48368
2020-04-02 18:07:27
206.189.114.0 attackbotsspam
2020-04-01 UTC: (2x) - nproc,root
2020-04-02 18:12:40
180.76.54.123 attack
(sshd) Failed SSH login from 180.76.54.123 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  2 11:58:53 ubnt-55d23 sshd[24180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.54.123  user=root
Apr  2 11:58:56 ubnt-55d23 sshd[24180]: Failed password for root from 180.76.54.123 port 38713 ssh2
2020-04-02 18:12:23
218.66.162.32 attackbots
04/01/2020-23:54:17.064709 218.66.162.32 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-04-02 17:49:43
89.223.92.202 attack
Apr  2 10:55:27 ms-srv sshd[22829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.223.92.202  user=root
Apr  2 10:55:29 ms-srv sshd[22829]: Failed password for invalid user root from 89.223.92.202 port 47217 ssh2
2020-04-02 18:16:52
202.150.143.242 attack
$f2bV_matches
2020-04-02 18:09:46
182.43.134.224 attackspambots
Tried sshing with brute force.
2020-04-02 18:02:28
119.27.170.64 attackspam
2020-04-02T07:55:59.658744vps773228.ovh.net sshd[3555]: Failed password for invalid user fm from 119.27.170.64 port 51124 ssh2
2020-04-02T08:07:37.802042vps773228.ovh.net sshd[7888]: Invalid user sabrina from 119.27.170.64 port 41540
2020-04-02T08:07:37.812492vps773228.ovh.net sshd[7888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.170.64
2020-04-02T08:07:37.802042vps773228.ovh.net sshd[7888]: Invalid user sabrina from 119.27.170.64 port 41540
2020-04-02T08:07:40.293062vps773228.ovh.net sshd[7888]: Failed password for invalid user sabrina from 119.27.170.64 port 41540 ssh2
...
2020-04-02 18:05:31
118.24.28.65 attackspam
Apr  2 06:57:04 localhost sshd\[7708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.28.65  user=root
Apr  2 06:57:06 localhost sshd\[7708\]: Failed password for root from 118.24.28.65 port 38878 ssh2
Apr  2 06:59:37 localhost sshd\[7758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.28.65  user=root
Apr  2 06:59:39 localhost sshd\[7758\]: Failed password for root from 118.24.28.65 port 38622 ssh2
Apr  2 07:02:14 localhost sshd\[7944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.28.65  user=root
...
2020-04-02 17:53:13
37.228.132.230 attackbots
Apr  2 05:54:05 odroid64 sshd\[8897\]: Invalid user gcj from 37.228.132.230
Apr  2 05:54:05 odroid64 sshd\[8897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.132.230
...
2020-04-02 17:57:03
182.31.182.124 attackspam
Port probing on unauthorized port 23
2020-04-02 17:46:34
148.70.178.70 attackspam
Apr  2 05:46:33 meumeu sshd[20472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.178.70 
Apr  2 05:46:35 meumeu sshd[20472]: Failed password for invalid user va from 148.70.178.70 port 59240 ssh2
Apr  2 05:52:46 meumeu sshd[21339]: Failed password for root from 148.70.178.70 port 41784 ssh2
...
2020-04-02 17:45:24
49.234.233.164 attackspam
Invalid user fzr from 49.234.233.164 port 33492
2020-04-02 17:51:43
134.209.100.26 attackbots
frenzy
2020-04-02 18:21:49

Recently Reported IPs

70.3.92.79 94.50.161.1 52.49.249.249 212.3.150.254
83.14.40.241 88.81.238.245 57.238.136.183 145.48.20.216
4.83.249.156 212.3.150.14 134.209.223.226 75.224.121.241
154.68.5.87 179.192.13.65 77.34.55.118 202.74.245.140
150.223.33.108 36.251.85.113 216.16.198.14 148.213.252.222