This IP address has been reported a total of 627
times from 244 distinct
sources.
120.48.81.13 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
This IP address carried out 46 SSH credential attack (attempts) between 21-04-2023 to 15-05-2023. Fo ... show moreThis IP address carried out 46 SSH credential attack (attempts) between 21-04-2023 to 15-05-2023. For more information or to report interesting/incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
May 11 06:15:05 dotcom2 sshd\[23279\]: Invalid user akash from 120.48.81.13 port 47374
May 11 ... show moreMay 11 06:15:05 dotcom2 sshd\[23279\]: Invalid user akash from 120.48.81.13 port 47374
May 11 06:15:06 dotcom2 sshd\[23279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.81.13
... show less
Brute-ForceSSH
Anonymous
$f2bV_matches
Brute-ForceSSH
Anonymous
sshd: Failed password for .... from 120.48.81.13 port 50620 ssh2 (2 attempts)
May 11 01:48:02 fox sshd[2539465]: Failed password for root from 120.48.81.13 port 43000 ssh2
... show moreMay 11 01:48:02 fox sshd[2539465]: Failed password for root from 120.48.81.13 port 43000 ssh2
May 11 01:48:06 fox sshd[2539551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.81.13 user=root
May 11 01:48:08 fox sshd[2539551]: Failed password for root from 120.48.81.13 port 45344 ssh2
May 11 01:48:11 fox sshd[2539584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.81.13 user=root
May 11 01:48:13 fox sshd[2539584]: Failed password for root from 120.48.81.13 port 35020 ssh2
... show less
2023-05-10T19:11:23.429925server2.ebullit.com sshd[24070]: Failed password for root from 120.48.81.1 ... show more2023-05-10T19:11:23.429925server2.ebullit.com sshd[24070]: Failed password for root from 120.48.81.13 port 39234 ssh2
2023-05-10T19:11:29.513270server2.ebullit.com sshd[24097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.81.13 user=root
2023-05-10T19:11:31.245245server2.ebullit.com sshd[24097]: Failed password for root from 120.48.81.13 port 37154 ssh2
2023-05-10T19:11:39.885390server2.ebullit.com sshd[24175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.81.13 user=root
2023-05-10T19:11:41.657443server2.ebullit.com sshd[24175]: Failed password for root from 120.48.81.13 port 58124 ssh2
... show less
Brute-ForceSSH
Anonymous
May 11 00:03:38 f2b auth.info sshd[166790]: Failed password for root from 120.48.81.13 port 35922 ss ... show moreMay 11 00:03:38 f2b auth.info sshd[166790]: Failed password for root from 120.48.81.13 port 35922 ssh2
May 11 00:09:41 f2b auth.info sshd[166799]: Failed password for root from 120.48.81.13 port 58396 ssh2
May 11 00:09:43 f2b auth.info sshd[166801]: Failed password for root from 120.48.81.13 port 36918 ssh2
... show less