This IP address has been reported a total of 315
times from 134 distinct
sources.
120.157.220.62 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Feb 7 04:55:29 cloud-server-0 sshd[3684419]: pam_unix(sshd:auth): authentication failure; logname= ... show moreFeb 7 04:55:29 cloud-server-0 sshd[3684419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.220.62 user=root
Feb 7 04:55:32 cloud-server-0 sshd[3684419]: Failed password for root from 120.157.220.62 port 34516 ssh2
Feb 7 04:55:39 cloud-server-0 sshd[3684421]: Invalid user orangepi from 120.157.220.62 port 42402
Feb 7 04:55:39 cloud-server-0 sshd[3684421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.220.62
Feb 7 04:55:41 cloud-server-0 sshd[3684421]: Failed password for invalid user orangepi from 120.157.220.62 port 42402 ssh2
Feb 7 04:55:45 cloud-server-0 sshd[3684423]: Invalid user support from 120.157.220.62 port 55796
Feb 7 04:55:46 cloud-server-0 sshd[3684423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.220.62
Feb 7 04:55:48 cloud-server-0 sshd[3684423]: Failed password for invalid user support from 120.157.220.62 port
... show less
Feb 6 20:40:57 b146-42 sshd[326880]: Failed password for invalid user cloudera from 120.157.220.62 ... show moreFeb 6 20:40:57 b146-42 sshd[326880]: Failed password for invalid user cloudera from 120.157.220.62 port 60528 ssh2
Feb 6 20:41:08 b146-42 sshd[326885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.220.62 user=root
Feb 6 20:41:11 b146-42 sshd[326885]: Failed password for root from 120.157.220.62 port 52656 ssh2
... show less
Feb 6 23:13:06 LosAngelesGW sshd[2445898]: Failed password for invalid user user from 120.157.220.6 ... show moreFeb 6 23:13:06 LosAngelesGW sshd[2445898]: Failed password for invalid user user from 120.157.220.62 port 44032 ssh2
Feb 6 23:13:11 LosAngelesGW sshd[2445915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.220.62 user=root
Feb 6 23:13:12 LosAngelesGW sshd[2445915]: Failed password for root from 120.157.220.62 port 44036 ssh2
Feb 6 23:13:16 LosAngelesGW sshd[2445932]: Invalid user localadmin from 120.157.220.62 port 37116
... show less
Brute-ForceSSH
Anonymous
2025-02-06T21:51:48.806605+00:00 cust1009-1 sshd[866875]: Connection closed by 120.157.220.62 port 3 ... show more2025-02-06T21:51:48.806605+00:00 cust1009-1 sshd[866875]: Connection closed by 120.157.220.62 port 36972
2025-02-06T21:51:51.494411+00:00 cust1009-1 sshd[866876]: Invalid user a from 120.157.220.62 port 36990
2025-02-06T21:51:51.819940+00:00 cust1009-1 sshd[866876]: Connection closed by invalid user a 120.157.220.62 port 36990 [preauth]
... show less
Feb 6 **REMOVED** sshd[2545787]: Invalid user ubnt from 120.157.220.62 port 43228
Feb 6 **RE ... show moreFeb 6 **REMOVED** sshd[2545787]: Invalid user ubnt from 120.157.220.62 port 43228
Feb 6 **REMOVED** sshd[2545787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.220.62
Feb 6 **REMOVED** sshd[2545787]: Failed password for invalid user ubnt from 120.157.220.62 port 43228 ssh2 show less
Feb 6 06:55:18 ssfs sshd[2117093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreFeb 6 06:55:18 ssfs sshd[2117093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.220.62
Feb 6 06:55:20 ssfs sshd[2117093]: Failed password for invalid user a from 120.157.220.62 port 51272 ssh2
Feb 6 06:56:01 ssfs sshd[2117305]: User root from 120.157.220.62 not allowed because listed in DenyUsers
... show less