Go
213.39.55.13
is a
Hacker
100 %
United Kingdom
Report Abuse
161attacks reported
119Brute-ForceSSH
15Brute-Force
14SSH
6uncategorized
2HackingBrute-ForceSSH
1Port Scan
1DDoS AttackPort ScanBrute-ForceWeb App AttackSSH
1FTP Brute-ForceHackingBrute-ForceSSH
1FTP Brute-ForceHacking
1Bad Web Bot
1abuse reported
1Web SpamBrute-ForceSSH
from 74 distinct reporters
and 7 distinct sources : BadIPs.com, Blocklist.de, darklist.de, FireHOL, GreenSnow.co, Charles Haley, AbuseIPDB
213.39.55.13 was first signaled at 2020-07-16 05:21 and last record was at 2020-08-04 13:53.
IP

213.39.55.13

Organization
Interoute Communications Limited
Localisation
United Kingdom
York, York
NetRange : First & Last IP
213.39.55.0 - 213.39.55.127
Network CIDR
213.39.55.0/25

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2020-08-04 13:53 attacks Brute-ForceSSH AbuseIPDB Aug 5 00:34:59 roki-contabo sshd\[7151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user
2020-08-04 13:51 attacks Brute-ForceSSH AbuseIPDB (sshd) Failed SSH login from 213.39.55.13 (FR/France/-): 5 in the last 3600 secs
2020-08-04 13:38 attacks Brute-ForceSSH AbuseIPDB (sshd) Failed SSH login from 213.39.55.13 (DE/Germany/-): 5 in the last 3600 secs
2020-08-04 13:10 attacks Brute-ForceSSH AbuseIPDB Aug 4 22:03:06 game-panel sshd[27226]: Failed password for root from 213.39.55.13 port 49508 ssh2 Aug 4 22:06:44 game-panel sshd[27353]: Failed passwo
2020-08-04 13:03 attacks Brute-Force AbuseIPDB Aug 4 23:53:52 abendstille sshd\[32344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user
2020-08-04 12:52 attacks Brute-ForceSSH AbuseIPDB Aug 4 21:45:09 game-panel sshd[26440]: Failed password for root from 213.39.55.13 port 57522 ssh2 Aug 4 21:48:46 game-panel sshd[26575]: Failed passwo
2020-08-04 12:40 attacks Brute-Force AbuseIPDB Aug 4 23:31:13 abendstille sshd\[3737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user=
2020-08-04 12:34 attacks Brute-ForceSSH AbuseIPDB Aug 4 21:27:04 game-panel sshd[25442]: Failed password for root from 213.39.55.13 port 37326 ssh2 Aug 4 21:30:43 game-panel sshd[25617]: Failed passwo
2020-08-04 12:17 attacks Brute-Force AbuseIPDB Aug 4 23:08:19 abendstille sshd\[3689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user=
2020-08-04 12:16 attacks Brute-ForceSSH AbuseIPDB Aug 4 21:09:43 game-panel sshd[24687]: Failed password for root from 213.39.55.13 port 45338 ssh2 Aug 4 21:13:14 game-panel sshd[24883]: Failed passwo
2020-08-04 11:59 attacks Brute-ForceSSH AbuseIPDB Aug 4 20:52:02 game-panel sshd[23823]: Failed password for root from 213.39.55.13 port 53360 ssh2 Aug 4 20:55:32 game-panel sshd[23983]: Failed passwo
2020-08-04 11:54 attacks Brute-Force AbuseIPDB Aug 4 22:45:30 abendstille sshd\[14370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user
2020-08-04 11:41 attacks Brute-ForceSSH AbuseIPDB Aug 4 20:34:23 game-panel sshd[22886]: Failed password for root from 213.39.55.13 port 33142 ssh2 Aug 4 20:37:49 game-panel sshd[23068]: Failed passwo
2020-08-04 11:31 attacks Brute-Force AbuseIPDB Aug 4 22:22:34 abendstille sshd\[23100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user
2020-08-04 11:23 attacks Brute-ForceSSH AbuseIPDB Aug 4 20:16:46 game-panel sshd[22019]: Failed password for root from 213.39.55.13 port 41182 ssh2 Aug 4 20:20:21 game-panel sshd[22186]: Failed passwo
2020-08-04 11:08 attacks Brute-Force AbuseIPDB Aug 4 21:59:36 abendstille sshd\[31053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user
2020-08-04 11:06 attacks Brute-ForceSSH AbuseIPDB Aug 4 19:59:14 game-panel sshd[20920]: Failed password for root from 213.39.55.13 port 49204 ssh2 Aug 4 20:02:52 game-panel sshd[21098]: Failed passwo
2020-08-04 10:55 attacks Port Scan AbuseIPDB *Port Scan* detected from 213.39.55.13 (DE/Germany/North Rhine-Westphalia/Grevenbroich/-). 4 hits in the last 201 seconds
2020-08-04 10:52 attacks Brute-ForceSSH AbuseIPDB Aug 4 21:45:27 *hidden* sshd[59798]: Failed password for *hidden* from 213.39.55.13 port 43876 ssh2 Aug 4 21:49:02 *hidden* sshd[3521]: pam_unix(sshd:
2020-08-04 10:48 attacks Brute-ForceSSH AbuseIPDB Aug 4 19:42:01 game-panel sshd[19855]: Failed password for root from 213.39.55.13 port 57202 ssh2 Aug 4 19:45:22 game-panel sshd[20105]: Failed passwo
2020-08-04 10:45 attacks Brute-Force AbuseIPDB Aug 4 21:36:03 abendstille sshd\[6154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user=
2020-08-04 10:44 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-08-04 10:39 attacks Brute-ForceSSH AbuseIPDB Aug 4 21:31:07 ncomp sshd[20456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user=root Aug 4
2020-08-04 10:06 attacks Brute-ForceSSH AbuseIPDB Failed password for root from 213.39.55.13 port 44384 ssh2
2020-08-04 10:05 attacks Brute-ForceSSH AbuseIPDB invalid user gituser from 213.39.55.13 port 56034 ssh2
2020-08-04 07:39 attacks Brute-ForceSSH AbuseIPDB Multiple SSH authentication failures from 213.39.55.13
2020-08-04 06:08 attacks Brute-ForceSSH AbuseIPDB 2020-08-04T17:00:54.846335vps773228.ovh.net sshd[15382]: Failed password for root from 213.39.55.13 port 46792 ssh2 2020-08-04T17:04:33.249449vps77322
2020-08-04 04:55 attacks Brute-ForceSSH AbuseIPDB Aug 4 15:46:02 v22019038103785759 sshd\[25928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.
2020-08-04 04:52 attacks Brute-ForceSSH AbuseIPDB 2020-08-04T15:44:37.233459vps773228.ovh.net sshd[14751]: Failed password for root from 213.39.55.13 port 41522 ssh2 2020-08-04T15:48:21.770655vps77322
2020-08-04 04:42 attacks Brute-ForceSSH AbuseIPDB Aug 4 15:24:22 myvps sshd[399]: Failed password for root from 213.39.55.13 port 45226 ssh2 Aug 4 15:38:53 myvps sshd[9671]: Failed password for root f
2020-08-04 04:38 attacks Brute-ForceSSH AbuseIPDB Aug 4 14:24:23 sigma sshd\[28762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user=rootA
2020-08-04 01:37 attacks Brute-Force AbuseIPDB Brute force SMTP login attempted.
2020-08-03 21:18 attacks Brute-Force AbuseIPDB Banned for a week because repeated abuses, for example SSH, but not only
2020-08-03 19:45 attacks Brute-ForceSSH AbuseIPDB 2020-08-04T06:41:32.229281centos sshd[28266]: Failed password for root from 213.39.55.13 port 48278 ssh2 2020-08-04T06:45:28.343531centos sshd[28486]:
2020-08-03 19:38 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-08-03 19:33 attacks Brute-ForceSSH AbuseIPDB Aug 4 06:25:49 vm0 sshd[1658]: Failed password for root from 213.39.55.13 port 45750 ssh2
2020-08-03 19:27 attacks Brute-ForceSSH AbuseIPDB Bruteforce detected by fail2ban
2020-08-03 11:01 attacks Brute-ForceSSH AbuseIPDB Aug 3 21:45:00 ns382633 sshd\[9998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user=roo
2020-08-03 08:56 attacks Brute-ForceSSH AbuseIPDB Aug 3 19:54:18 ip40 sshd[29525]: Failed password for root from 213.39.55.13 port 37582 ssh2
2020-08-03 07:52 attacks Brute-ForceSSH AbuseIPDB Aug 3 18:42:53 ip40 sshd[24414]: Failed password for root from 213.39.55.13 port 52134 ssh2
2020-08-03 07:46 attacks Brute-ForceSSH AbuseIPDB Tried sshing with brute force.
2020-08-02 23:11 attacks Brute-ForceSSH AbuseIPDB Failed password for root from 213.39.55.13 port 49324 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213
2020-08-02 23:08 attacks Brute-ForceSSH AbuseIPDB  
2020-08-02 23:05 attacks Brute-ForceSSH AbuseIPDB 2020-08-03T09:50:14.322846ns386461 sshd\[1847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.
2020-08-02 23:02 attacks Brute-ForceSSH AbuseIPDB SSH bruteforce
2020-08-02 14:37 attacks Brute-ForceSSH AbuseIPDB 2020-08-01 08:23:07 server sshd[62217]: Failed password for invalid user root from 213.39.55.13 port 35426 ssh2
2020-08-02 13:59 abuse Web SpamBrute-ForceSSH AbuseIPDB Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-02 13:56 attacks Brute-ForceSSH AbuseIPDB  
2020-08-02 09:21 attacks Brute-ForceSSH AbuseIPDB Aug 2 18:14:19 web8 sshd\[21974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user=root A
2020-08-02 08:44 attacks Brute-ForceSSH AbuseIPDB Aug 2 17:37:14 web8 sshd\[1144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 user=root Au
2020-07-16 05:21 attacks FTP Brute-ForceHacking AbuseIPDB Jul 16 16:12:06 srv1 sshd[22587]: Invalid user hadoop from 213.39.55.13 Jul 16 16:12:06 srv1 sshd[22587]: pam_unix(sshd:auth): authentication failure;
2020-07-16 08:12 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-07-16 11:17 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-07-16 11:29 attacks Brute-ForceSSH AbuseIPDB Multiple SSH authentication failures from 213.39.55.13
2020-07-16 11:37 attacks Brute-ForceSSH AbuseIPDB  
2020-07-16 12:12 attacks Brute-ForceSSH AbuseIPDB Jul 16 16:12:08 s158375 sshd[21026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13
2020-07-16 12:15 attacks Brute-ForceSSH AbuseIPDB Failed password for invalid user kcc from 213.39.55.13 port 46970 ssh2
2020-07-16 12:17 attacks Brute-Force AbuseIPDB Jul 16 23:17:49 odroid64 sshd\[8357\]: Invalid user kcc from 213.39.55.13 Jul 16 23:17:49 odroid64 sshd\[8357\]: pam_unix\(sshd:auth\): authentication
2020-07-16 12:19 attacks SSH AbuseIPDB Jul 16 23:19:17 sshgateway sshd\[11777\]: Invalid user kcc from 213.39.55.13 Jul 16 23:19:17 sshgateway sshd\[11777\]: pam_unix\(sshd:auth\): authenti
2020-07-16 12:22 attacks Brute-ForceSSH AbuseIPDB Jul 16 23:12:27 lnxmail61 sshd[29073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13 Jul 16 23:
2020-07-31 15:56 attacks bi_any_0_1d BadIPs.com  
2020-07-31 15:56 attacks SSH bi_ssh-ddos_0_1d BadIPs.com  
2020-07-31 15:56 attacks SSH bi_sshd_0_1d BadIPs.com  
2020-07-31 15:57 attacks SSH bi_ssh_0_1d BadIPs.com  
2020-07-31 15:57 attacks blocklist_de Blocklist.de  
2020-07-31 15:57 attacks SSH blocklist_de_ssh Blocklist.de  
2020-07-31 15:59 attacks darklist_de darklist.de  
2020-07-31 16:01 attacks firehol_level2 FireHOL  
2020-07-31 16:03 attacks firehol_level4 FireHOL  
2020-07-31 16:10 attacks greensnow GreenSnow.co  
2020-07-31 16:11 attacks SSH haley_ssh Charles Haley  
2020-08-01 14:55 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2020-08-01 14:55 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 213.39.55.0 - 213.39.55.127
netname: FRA-SH-VDC-MGMT
descr: VDC Virtual Routers Management
remarks: INFRA-AW
remarks: Interoute IP network - abuse@interoute.net for complaints
country: DE
admin-c: INTR1-RIPE
tech-c: INTR1-RIPE
status: ASSIGNED PA
mnt-by: INTEROUTE-MNTNR
mnt-lower: INTEROUTE-MNTNR
created: 2014-08-26T08:18:06Z
last-modified: 2014-08-26T08:18:06Z
source: RIPE

role: Interoute IP Hostmaster
address: Interoute Communications Ltd.
address: 25 Canada Square, Canary Wharf, 31st Floor
address: London, E14 5LQ
admin-c: ADAM1-RIPE
admin-c: ASL13-RIPE
admin-c: ANT62-RIPE
tech-c: ADAM1-RIPE
tech-c: ASL13-RIPE
tech-c: ANT62-RIPE
nic-hdl: INTR1-RIPE
mnt-by: INTEROUTE-MNTNR
created: 2002-08-22T09:12:07Z
last-modified: 2014-09-16T14:01:24Z
source: RIPE # Filtered

route: 213.39.0.0/17
descr: Interoute Communications Ltd
origin: AS3257
mnt-by: PSINETEU-VIA-MNT
mnt-by: INTEROUTE-MNTNR
created: 2019-11-06T11:11:27Z
last-modified: 2019-11-06T11:11:27Z
source: RIPE
most specific ip range is highlighted
Updated : 2020-08-06