This IP address has been reported a total of 93
times from 72 distinct
sources.
120.48.112.225 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 12 19:02:07 root1896 sshd[1799513]: Failed password for root from 120.48.112.225 port 48950 ssh2 ... show moreNov 12 19:02:07 root1896 sshd[1799513]: Failed password for root from 120.48.112.225 port 48950 ssh2
Nov 12 19:02:12 root1896 sshd[1799601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
Nov 12 19:02:14 root1896 sshd[1799601]: Failed password for root from 120.48.112.225 port 51654 ssh2
Nov 12 19:02:21 root1896 sshd[1799675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
Nov 12 19:02:23 root1896 sshd[1799675]: Failed password for root from 120.48.112.225 port 53028 ssh2
... show less
sshd[3410717]: Failed password for root from 120.48.112.225 port 51086 ssh2
sshd[3410726]: pam ... show moresshd[3410717]: Failed password for root from 120.48.112.225 port 51086 ssh2
sshd[3410726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
sshd[3410726]: Failed password for root from 120.48.112.225 port 35724 ssh2
sshd[3410745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
sshd[3410745]: Failed password for root from 120.48.112.225 port 39308 ssh2 show less
Brute-ForceSSH
Anonymous
120.48.112.225 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Por ... show more120.48.112.225 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Nov 11 12:14:11 server2 sshd[27259]: Failed password for root from 77.221.158.97 port 38158 ssh2
Nov 11 12:15:53 server2 sshd[28218]: Failed password for root from 120.48.112.225 port 59030 ssh2
Nov 11 12:02:30 server2 sshd[21997]: Failed password for root from 101.89.109.195 port 36602 ssh2
Nov 11 12:10:52 server2 sshd[25869]: Failed password for root from 27.47.130.114 port 7745 ssh2
Nov 11 12:09:48 server2 sshd[25131]: Failed password for root from 179.176.210.46 port 37876 ssh2
2024-11-10T17:30:45.251267+01:00 mx2 sshd[747051]: Failed password for root from 120.48.112.225 port ... show more2024-11-10T17:30:45.251267+01:00 mx2 sshd[747051]: Failed password for root from 120.48.112.225 port 52916 ssh2
2024-11-10T17:31:09.699576+01:00 mx2 sshd[747215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.112.225 user=root
2024-11-10T17:31:12.044373+01:00 mx2 sshd[747215]: Failed password for root from 120.48.112.225 port 54810 ssh2
... show less