This IP address has been reported a total of 1,435
times from 504 distinct
sources.
120.48.84.35 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 9 20:20:46 magpie sshd[2283212]: Invalid user sai from 120.48.84.35 port 60086
Dec 9 20: ... show moreDec 9 20:20:46 magpie sshd[2283212]: Invalid user sai from 120.48.84.35 port 60086
Dec 9 20:20:46 magpie sshd[2283212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.84.35
Dec 9 20:20:48 magpie sshd[2283212]: Failed password for invalid user sai from 120.48.84.35 port 60086 ssh2
Dec 9 20:22:34 magpie sshd[2283215]: Invalid user delta from 120.48.84.35 port 49548
... show less
120.48.84.35 fell into Endlessh tarpit; 0/1 total connections are currently still open. Total time w ... show more120.48.84.35 fell into Endlessh tarpit; 0/1 total connections are currently still open. Total time wasted: 13s. Total bytes sent by tarpit: 1.00KiB. Report generated by Endlessh Report Generator v1.2.3 show less
Report 881043 with IP 1779723 for SSH brute-force attack by source 1851796 via ssh-honeypot/0.2.0+ht ... show moreReport 881043 with IP 1779723 for SSH brute-force attack by source 1851796 via ssh-honeypot/0.2.0+http show less
2023-12-09T21:06:24.721347+01:00 kamery sshd[24065]: Invalid user lw from 120.48.84.35 port 54904<br ... show more2023-12-09T21:06:24.721347+01:00 kamery sshd[24065]: Invalid user lw from 120.48.84.35 port 54904
2023-12-09T21:06:24.724746+01:00 kamery sshd[24065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.84.35
2023-12-09T21:06:26.551939+01:00 kamery sshd[24065]: Failed password for invalid user lw from 120.48.84.35 port 54904 ssh2
... show less
SSH
Anonymous
2023-12-09T20:42:18.360916+01:00 kamery sshd[23795]: Failed password for invalid user production fro ... show more2023-12-09T20:42:18.360916+01:00 kamery sshd[23795]: Failed password for invalid user production from 120.48.84.35 port 50610 ssh2
2023-12-09T20:46:41.265802+01:00 kamery sshd[23839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.84.35 user=root
2023-12-09T20:46:43.023146+01:00 kamery sshd[23839]: Failed password for root from 120.48.84.35 port 37300 ssh2
... show less
2023-12-09T20:26:54.300238+01:00 kamery sshd[23519]: pam_unix(sshd:auth): authentication failure; lo ... show more2023-12-09T20:26:54.300238+01:00 kamery sshd[23519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.84.35
2023-12-09T20:26:56.769778+01:00 kamery sshd[23519]: Failed password for invalid user palm from 120.48.84.35 port 56732 ssh2
2023-12-09T20:31:43.174766+01:00 kamery sshd[23550]: Invalid user ecommerce from 120.48.84.35 port 34602
... show less
Dec 9 20:23:22 yucca sshd[495977]: Invalid user palm from 120.48.84.35 port 38418
...
Brute-ForceSSH
Anonymous
Dec 9 19:37:23 bonsai sshd[3025]: Invalid user dbmaker from 120.48.84.35
Dec 9 19:39:19 bons ... show moreDec 9 19:37:23 bonsai sshd[3025]: Invalid user dbmaker from 120.48.84.35
Dec 9 19:39:19 bonsai sshd[9737]: Invalid user admin from 120.48.84.35
Dec 9 19:45:21 bonsai sshd[13419]: Invalid user hello from 120.48.84.35
... show less