This IP address has been reported a total of 93
times from 72 distinct
sources.
120.48.112.225 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 20 13:36:18 mvscweb sshd[2186147]: Failed password for root from 120.48.112.225 port 34726 ssh2< ... show moreNov 20 13:36:18 mvscweb sshd[2186147]: Failed password for root from 120.48.112.225 port 34726 ssh2
Nov 20 13:36:22 mvscweb sshd[2186170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
Nov 20 13:36:24 mvscweb sshd[2186170]: Failed password for root from 120.48.112.225 port 36736 ssh2
... show less
Nov 20 12:57:38 ip-172-31-33-4 sshd\[14652\]: Failed password for root from 120.48.112.225 port 3710 ... show moreNov 20 12:57:38 ip-172-31-33-4 sshd\[14652\]: Failed password for root from 120.48.112.225 port 37102 ssh2\
Nov 20 12:57:44 ip-172-31-33-4 sshd\[14654\]: Failed password for root from 120.48.112.225 port 44162 ssh2\
Nov 20 12:57:55 ip-172-31-33-4 sshd\[14656\]: Failed password for root from 120.48.112.225 port 45732 ssh2\
Nov 20 12:58:03 ip-172-31-33-4 sshd\[14658\]: Failed password for root from 120.48.112.225 port 48342 ssh2\
Nov 20 12:58:09 ip-172-31-33-4 sshd\[14660\]: Failed password for root from 120.48.112.225 port 49624 ssh2\ show less
2024-11-20T01:30:17.424215+01:00 ovh-proxmox sshd[3689657]: Failed password for root from 120.48.112 ... show more2024-11-20T01:30:17.424215+01:00 ovh-proxmox sshd[3689657]: Failed password for root from 120.48.112.225 port 40888 ssh2
2024-11-20T01:30:24.174073+01:00 ovh-proxmox sshd[3689676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
2024-11-20T01:30:25.682337+01:00 ovh-proxmox sshd[3689676]: Failed password for root from 120.48.112.225 port 41894 ssh2
... show less
Nov 19 07:22:30 pornomens sshd[1135262]: Failed password for root from 120.48.112.225 port 48842 ssh ... show moreNov 19 07:22:30 pornomens sshd[1135262]: Failed password for root from 120.48.112.225 port 48842 ssh2
Nov 19 07:22:40 pornomens sshd[1135264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
Nov 19 07:22:42 pornomens sshd[1135264]: Failed password for root from 120.48.112.225 port 52004 ssh2
Nov 19 07:22:48 pornomens sshd[1135268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
Nov 19 07:22:50 pornomens sshd[1135268]: Failed password for root from 120.48.112.225 port 53968 ssh2
... show less
2024-11-18T22:25:42.344367+01:00 fangorn sshd[322943]: Failed password for root from 120.48.112.225 ... show more2024-11-18T22:25:42.344367+01:00 fangorn sshd[322943]: Failed password for root from 120.48.112.225 port 38032 ssh2
2024-11-18T22:25:44.647073+01:00 fangorn sshd[322946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
2024-11-18T22:25:46.849913+01:00 fangorn sshd[322946]: Failed password for root from 120.48.112.225 port 39948 ssh2
... show less
Nov 18 21:18:48 3mod sshd[347973]: Failed password for root from 120.48.112.225 port 35730 ssh2<br / ... show moreNov 18 21:18:48 3mod sshd[347973]: Failed password for root from 120.48.112.225 port 35730 ssh2
Nov 18 21:19:00 3mod sshd[348000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
Nov 18 21:19:02 3mod sshd[348000]: Failed password for root from 120.48.112.225 port 38414 ssh2
Nov 18 21:19:11 3mod sshd[348032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
Nov 18 21:19:13 3mod sshd[348032]: Failed password for root from 120.48.112.225 port 39952 ssh2
... show less