This IP address has been reported a total of 497
times from 273 distinct
sources.
120.48.175.69 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 10 10:13:49 adycoaduanas sshd[3260104]: Failed password for invalid user root from 120.48.175.69 ... show moreDec 10 10:13:49 adycoaduanas sshd[3260104]: Failed password for invalid user root from 120.48.175.69 port 38770 ssh2
Dec 10 10:18:26 adycoaduanas sshd[3260724]: User root from 120.48.175.69 not allowed because not listed in AllowUsers
Dec 10 10:18:26 adycoaduanas sshd[3260724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69 user=root
Dec 10 10:18:27 adycoaduanas sshd[3260724]: Failed password for invalid user root from 120.48.175.69 port 40558 ssh2
Dec 10 10:19:02 adycoaduanas sshd[3260766]: Invalid user afshin from 120.48.175.69 port 46054
... show less
2023-12-10T01:31:22.072477server2.ebullit.com sshd[39340]: Invalid user tileserver from 120.48.175.6 ... show more2023-12-10T01:31:22.072477server2.ebullit.com sshd[39340]: Invalid user tileserver from 120.48.175.69 port 50178
2023-12-10T01:31:22.077273server2.ebullit.com sshd[39340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69
2023-12-10T01:31:24.280247server2.ebullit.com sshd[39340]: Failed password for invalid user tileserver from 120.48.175.69 port 50178 ssh2
2023-12-10T01:33:10.038853server2.ebullit.com sshd[40442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69 user=root
2023-12-10T01:33:12.262192server2.ebullit.com sshd[40442]: Failed password for root from 120.48.175.69 port 36952 ssh2
... show less
Dec 10 08:08:14 server2 sshd\[16688\]: Invalid user kettle from 120.48.175.69
Dec 10 08:09:23 ... show moreDec 10 08:08:14 server2 sshd\[16688\]: Invalid user kettle from 120.48.175.69
Dec 10 08:09:23 server2 sshd\[16769\]: Invalid user tada from 120.48.175.69
Dec 10 08:10:10 server2 sshd\[17013\]: Invalid user peer from 120.48.175.69
Dec 10 08:11:08 server2 sshd\[17077\]: User root from 120.48.175.69 not allowed because not listed in AllowUsers
Dec 10 08:11:53 server2 sshd\[17142\]: Invalid user snd from 120.48.175.69
Dec 10 08:13:38 server2 sshd\[17257\]: Invalid user teste2 from 120.48.175.69 show less
Brute-Force
Anonymous
Dec 10 07:34:10 community sshd[3382338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreDec 10 07:34:10 community sshd[3382338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69
Dec 10 07:34:11 community sshd[3382338]: Failed password for invalid user kristina from 120.48.175.69 port 41026 ssh2
... show less
2023-12-10T03:50:19.120255+00:00 vm21 sshd[3080247]: Invalid user zac from 120.48.175.69 port 52996< ... show more2023-12-10T03:50:19.120255+00:00 vm21 sshd[3080247]: Invalid user zac from 120.48.175.69 port 52996
2023-12-10T04:09:19.881428+00:00 vm21 sshd[3080448]: Invalid user postgres from 120.48.175.69 port 56562
... show less
Dec 10 05:05:39 MirageRP sshd[1194530]: Failed password for invalid user florian from 120.48.175.69 ... show moreDec 10 05:05:39 MirageRP sshd[1194530]: Failed password for invalid user florian from 120.48.175.69 port 46768 ssh2
Dec 10 05:07:15 MirageRP sshd[1194662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69 user=root
Dec 10 05:07:17 MirageRP sshd[1194662]: Failed password for root from 120.48.175.69 port 32954 ssh2
Dec 10 05:08:58 MirageRP sshd[1194885]: Invalid user postgres from 120.48.175.69 port 47566
Dec 10 05:08:59 MirageRP sshd[1194885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69
Dec 10 05:08:58 MirageRP sshd[1194885]: Invalid user postgres from 120.48.175.69 port 47566
Dec 10 05:09:01 MirageRP sshd[1194885]: Failed password for invalid user postgres from 120.48.175.69 port 47566 ssh2
... show less
Dec 10 04:04:02 bigserver sshd[2711117]: Invalid user elasticsearch from 120.48.175.69 port 33224<br ... show moreDec 10 04:04:02 bigserver sshd[2711117]: Invalid user elasticsearch from 120.48.175.69 port 33224
Dec 10 04:06:34 bigserver sshd[2711784]: Invalid user sysop from 120.48.175.69 port 51784
... show less
Brute-ForceSSH
Anonymous
Dec 10 03:41:16 rendez-vous sshd[95176]: Invalid user niraj from 120.48.175.69 port 54168
Dec ... show moreDec 10 03:41:16 rendez-vous sshd[95176]: Invalid user niraj from 120.48.175.69 port 54168
Dec 10 03:41:16 rendez-vous sshd[95176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69
Dec 10 03:41:17 rendez-vous sshd[95176]: Failed password for invalid user niraj from 120.48.175.69 port 54168 ssh2 show less
Brute-ForceSSH
Anonymous
Dec 10 03:16:40 rendez-vous sshd[12228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreDec 10 03:16:40 rendez-vous sshd[12228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69
Dec 10 03:16:42 rendez-vous sshd[12228]: Failed password for invalid user gitlab-runner from 120.48.175.69 port 56034 ssh2
Dec 10 03:18:06 rendez-vous sshd[36914]: Invalid user vishal from 120.48.175.69 port 52600 show less
Dec 10 07:29:31 s3.callink.id sshd[1259496]: pam_unix(sshd:auth): authentication failure; logname= u ... show moreDec 10 07:29:31 s3.callink.id sshd[1259496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69 user=root
Dec 10 07:29:34 s3.callink.id sshd[1259496]: Failed password for root from 120.48.175.69 port 52328 ssh2
Dec 10 07:30:52 s3.callink.id sshd[1260017]: Invalid user xiaona from 120.48.175.69 port 37352
... show less
2023-12-09T23:19:05.053336+01:00 Linux12 sshd[1771332]: Failed password for root from 120.48.175.69 ... show more2023-12-09T23:19:05.053336+01:00 Linux12 sshd[1771332]: Failed password for root from 120.48.175.69 port 50832 ssh2
2023-12-09T23:19:57.379424+01:00 Linux12 sshd[1773940]: Invalid user sarina from 120.48.175.69 port 33824
2023-12-09T23:19:57.381304+01:00 Linux12 sshd[1773940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69
2023-12-09T23:19:58.920660+01:00 Linux12 sshd[1773940]: Failed password for invalid user sarina from 120.48.175.69 port 33824 ssh2
2023-12-09T23:20:53.386959+01:00 Linux12 sshd[1776884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.175.69 user=root
2023-12-09T23:20:54.947333+01:00 Linux12 sshd[1776884]: Failed password for root from 120.48.175.69 port 45046 ssh2
2023-12-09T23:21:46.034487+01:00 Linux12 sshd[1779409]: Invalid user oracle from 120.48.175.69 port 56270
2023-12-09T23:21:46.036432+01:00 Linux12 sshd[1779409]: pam_unix(sshd:auth): authentication failu
... show less
2023-12-09T22:18:11.903120+00:00 cdn-nl sshd[3785670]: Invalid user ss from 120.48.175.69 port 55874 ... show more2023-12-09T22:18:11.903120+00:00 cdn-nl sshd[3785670]: Invalid user ss from 120.48.175.69 port 55874
2023-12-09T22:20:00.536192+00:00 cdn-nl sshd[3785789]: Invalid user sarina from 120.48.175.69 port 50082
2023-12-09T22:22:43.911500+00:00 cdn-nl sshd[3785963]: Invalid user nigger from 120.48.175.69 port 55510
... show less