This IP address has been reported a total of 1,982 times from 442 distinct sources.
120.48.2.92 was first reported on , and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
SSH login attempts (SSH bruteforce attack). For more information, or to report interesting/incorrect ... show moreSSH login attempts (SSH bruteforce attack). For more information, or to report interesting/incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
Jun 30 08:43:59 Proxmox-VE sshd[2550066]: Failed password for root from 120.48.2.92 port 56868 ssh2< ... show moreJun 30 08:43:59 Proxmox-VE sshd[2550066]: Failed password for root from 120.48.2.92 port 56868 ssh2
Jun 30 08:45:47 Proxmox-VE sshd[2551128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92 user=root
Jun 30 08:45:48 Proxmox-VE sshd[2551128]: Failed password for root from 120.48.2.92 port 43924 ssh2
... show less
2022-06-29 03:41:13,832 fail2ban.actions [772]: NOTICE [pam-generic] Ban 120.48.2.92
2 ... show more2022-06-29 03:41:13,832 fail2ban.actions [772]: NOTICE [pam-generic] Ban 120.48.2.92
2022-06-29 03:41:15,369 fail2ban.actions [772]: NOTICE [sshd] Ban 120.48.2.92 show less
Jun 30 05:34:25 amit sshd\[30632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 e ... show moreJun 30 05:34:25 amit sshd\[30632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92 user=root
Jun 30 05:34:27 amit sshd\[30632\]: Failed password for root from 120.48.2.92 port 44924 ssh2
Jun 30 05:38:30 amit sshd\[30715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92 user=root
... show less
Jun 29 17:33:04 DC1-115C7N1 sshd[3819947]: Failed password for root from 120.48.2.92 port 33466 ssh2 ... show moreJun 29 17:33:04 DC1-115C7N1 sshd[3819947]: Failed password for root from 120.48.2.92 port 33466 ssh2
Jun 29 17:34:49 DC1-115C7N1 sshd[3823345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92 user=root
Jun 29 17:34:50 DC1-115C7N1 sshd[3823345]: Failed password for root from 120.48.2.92 port 53658 ssh2
... show less
Jun 29 23:38:17 scw-focused-cartwright sshd[11002]: Failed password for root from 120.48.2.92 port 4 ... show moreJun 29 23:38:17 scw-focused-cartwright sshd[11002]: Failed password for root from 120.48.2.92 port 41896 ssh2
Jun 29 23:40:04 scw-focused-cartwright sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92 show less
Jun 29 21:17:46 vps sshd[8011]: Failed password for invalid user javi from 120.48.2.92 port 56568 ss ... show moreJun 29 21:17:46 vps sshd[8011]: Failed password for invalid user javi from 120.48.2.92 port 56568 ssh2
Jun 29 21:19:57 vps sshd[8045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92 user=root
Jun 29 21:19:59 vps sshd[8045]: Failed password for root from 120.48.2.92 port 47766 ssh2
... show less
Jun 29 18:14:48 mirweb3 sshd[20886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreJun 29 18:14:48 mirweb3 sshd[20886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92 user=root
Jun 29 18:14:51 mirweb3 sshd[20886]: Failed password for root from 120.48.2.92 port 46512 ssh2
Jun 29 18:16:15 mirweb3 sshd[21088]: Invalid user ubt from 120.48.2.92 port 33410
Jun 29 18:16:15 mirweb3 sshd[21088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92
Jun 29 18:16:17 mirweb3 sshd[21088]: Failed password for invalid user ubt from 120.48.2.92 port 33410 ssh2
... show less
Jun 29 17:43:29 mirweb3 sshd[17840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreJun 29 17:43:29 mirweb3 sshd[17840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92 user=root
Jun 29 17:43:31 mirweb3 sshd[17840]: Failed password for root from 120.48.2.92 port 39736 ssh2
Jun 29 17:51:02 mirweb3 sshd[18864]: Invalid user web from 120.48.2.92 port 45420
Jun 29 17:51:02 mirweb3 sshd[18864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.2.92
Jun 29 17:51:04 mirweb3 sshd[18864]: Failed password for invalid user web from 120.48.2.92 port 45420 ssh2
... show less
Jun 29 12:27:04 server sshd[19509]: Failed password for root from 120.48.2.92 port 56010 ssh2
... show moreJun 29 12:27:04 server sshd[19509]: Failed password for root from 120.48.2.92 port 56010 ssh2
Jun 29 12:36:52 server sshd[25808]: Failed password for root from 120.48.2.92 port 52436 ssh2
Jun 29 12:38:14 server sshd[26683]: Failed password for root from 120.48.2.92 port 38380 ssh2 show less
SSH login attempts (SSH bruteforce attack). For more information, or to report interesting/incorrect ... show moreSSH login attempts (SSH bruteforce attack). For more information, or to report interesting/incorrect findings, give me a shoutout @parthmaniar on Twitter. show less