This IP address has been reported a total of 34
times from 30 distinct
sources.
120.55.164.126 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 14 12:44:47 vmi585337 sshd[3126297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreDec 14 12:44:47 vmi585337 sshd[3126297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.55.164.126
Dec 14 12:44:48 vmi585337 sshd[3126297]: Failed password for invalid user pi from 120.55.164.126 port 54164 ssh2
Dec 14 12:44:55 vmi585337 sshd[3126405]: Invalid user nginx from 120.55.164.126 port 45452
Dec 14 12:44:56 vmi585337 sshd[3126405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.55.164.126
Dec 14 12:44:58 vmi585337 sshd[3126405]: Failed password for invalid user nginx from 120.55.164.126 port 45452 ssh2
... show less
2024-12-14T12:44:46.278992 lilas-tw sshd[2780917]: pam_unix(sshd:auth): authentication failure; logn ... show more2024-12-14T12:44:46.278992 lilas-tw sshd[2780917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.55.164.126
2024-12-14T12:44:48.159050 lilas-tw sshd[2780917]: Failed password for invalid user pi from 120.55.164.126 port 54062 ssh2
2024-12-14T12:44:49.383175 lilas-tw sshd[2780919]: Invalid user hive from 120.55.164.126 port 58258
2024-12-14T12:44:49.724185 lilas-tw sshd[2780919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.55.164.126
2024-12-14T12:44:51.347074 lilas-tw sshd[2780919]: Failed password for invalid user hive from 120.55.164.126 port 58258 ssh2
... show less
Dec 14 02:10:50 nervous-edison8 sshd[2257535]: Failed password for root from 120.55.164.126 port 355 ... show moreDec 14 02:10:50 nervous-edison8 sshd[2257535]: Failed password for root from 120.55.164.126 port 35596 ssh2
Dec 14 02:10:58 nervous-edison8 sshd[2257622]: Invalid user pi from 120.55.164.126 port 58444
Dec 14 02:10:59 nervous-edison8 sshd[2257622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.55.164.126
Dec 14 02:11:01 nervous-edison8 sshd[2257622]: Failed password for invalid user pi from 120.55.164.126 port 58444 ssh2
Dec 14 02:11:11 nervous-edison8 sshd[2257714]: Invalid user hive from 120.55.164.126 port 60886
... show less
2024-12-14T02:36:46.571073+01:00 lXXX.com sshd[4073247]: pam_unix(sshd:auth): authentication failure ... show more2024-12-14T02:36:46.571073+01:00 lXXX.com sshd[4073247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.55.164.126 user=root
2024-12-14T02:36:49.239558+01:00 lXXX.com sshd[4073247]: Failed password for root from 120.55.164.126 port 56694 ssh2
2024-12-14T02:36:51.634195+01:00 lXXX.com sshd[4073249]: Invalid user pi from 120.55.164.126 port 56700
... show less
Dec 14 02:36:46 debian sshd[1648735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreDec 14 02:36:46 debian sshd[1648735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.55.164.126 user=root
Dec 14 02:36:48 debian sshd[1648735]: Failed password for root from 120.55.164.126 port 60104 ssh2
... show less
Dec 13 21:53:48 webserver sshd[1818738]: Failed password for root from 120.55.164.126 port 42306 ssh ... show moreDec 13 21:53:48 webserver sshd[1818738]: Failed password for root from 120.55.164.126 port 42306 ssh2
Dec 13 21:53:50 webserver sshd[1818740]: Invalid user pi from 120.55.164.126 port 34112
Dec 13 21:53:50 webserver sshd[1818740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.55.164.126
Dec 13 21:53:53 webserver sshd[1818740]: Failed password for invalid user pi from 120.55.164.126 port 34112 ssh2
Dec 13 21:53:54 webserver sshd[1818742]: Invalid user hive from 120.55.164.126 port 34126
... show less