This IP address has been reported a total of 11,581
times from 1,220 distinct
sources.
122.155.223.2 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-03-17T09:28:39.763890+05:30 US03-CC-NY sshd[2277218]: Failed password for root from 122.155.223 ... show more2025-03-17T09:28:39.763890+05:30 US03-CC-NY sshd[2277218]: Failed password for root from 122.155.223.2 port 43836 ssh2
2025-03-17T09:30:48.270402+05:30 US03-CC-NY sshd[2287835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.2 user=root
2025-03-17T09:30:50.681272+05:30 US03-CC-NY sshd[2287835]: Failed password for root from 122.155.223.2 port 59634 ssh2
... show less
Brute-ForceSSH
Anonymous
2025-03-17T03:51:29.021427+01:00 web sshd[231645]: Failed password for root from 122.155.223.2 port ... show more2025-03-17T03:51:29.021427+01:00 web sshd[231645]: Failed password for root from 122.155.223.2 port 59472 ssh2
2025-03-17T03:51:29.407736+01:00 web sshd[231645]: Disconnected from authenticating user root 122.155.223.2 port 59472 [preauth]
2025-03-17T03:56:34.671782+01:00 web sshd[231900]: Failed password for root from 122.155.223.2 port 33256 ssh2
... show less
2025-03-17T01:52:34.355574+00:00 reliablesite sshd[396496]: Failed password for root from 122.155.22 ... show more2025-03-17T01:52:34.355574+00:00 reliablesite sshd[396496]: Failed password for root from 122.155.223.2 port 51210 ssh2
2025-03-17T01:56:50.511909+00:00 reliablesite sshd[396558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.2 user=root
2025-03-17T01:56:52.481480+00:00 reliablesite sshd[396558]: Failed password for root from 122.155.223.2 port 59412 ssh2
... show less
(sshd) Failed SSH login from 122.155.223.2 (TH/Thailand/-): 10 in the last 3600 secs; Ports: *; Dire ... show more(sshd) Failed SSH login from 122.155.223.2 (TH/Thailand/-): 10 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER show less
Mar 16 17:34:39 b146-41 sshd[3973744]: Failed password for root from 122.155.223.2 port 46082 ssh2<b ... show moreMar 16 17:34:39 b146-41 sshd[3973744]: Failed password for root from 122.155.223.2 port 46082 ssh2
Mar 16 17:36:48 b146-41 sshd[3973855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.2 user=root
Mar 16 17:36:50 b146-41 sshd[3973855]: Failed password for root from 122.155.223.2 port 57734 ssh2
... show less
Report 1640912 with IP 2261775 for SSH brute-force attack by source 2291904 via ssh-honeypot/0.2.0+h ... show moreReport 1640912 with IP 2261775 for SSH brute-force attack by source 2291904 via ssh-honeypot/0.2.0+http show less
2025-03-16T17:29:26.306259-04:00 radiopi sshd[2275]: Disconnected from authenticating user root 122. ... show more2025-03-16T17:29:26.306259-04:00 radiopi sshd[2275]: Disconnected from authenticating user root 122.155.223.2 port 57608 [preauth]
2025-03-16T17:41:25.325205-04:00 radiopi sshd[2330]: Disconnected from authenticating user root 122.155.223.2 port 39774 [preauth]
2025-03-16T17:43:19.396402-04:00 radiopi sshd[2347]: Disconnected from authenticating user root 122.155.223.2 port 54676 [preauth]
... show less
Mar 16 21:14:14 pornomens sshd[1616641]: Failed password for root from 122.155.223.2 port 43970 ssh2 ... show moreMar 16 21:14:14 pornomens sshd[1616641]: Failed password for root from 122.155.223.2 port 43970 ssh2
Mar 16 21:19:06 pornomens sshd[1616650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.2 user=root
Mar 16 21:19:07 pornomens sshd[1616650]: Failed password for root from 122.155.223.2 port 50722 ssh2
Mar 16 21:21:15 pornomens sshd[1616659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.2 user=root
Mar 16 21:21:17 pornomens sshd[1616659]: Failed password for root from 122.155.223.2 port 42736 ssh2
... show less
Mar 16 20:16:22 sanyalnet-oracle-vps2 sshd[2665878]: pam_unix(sshd:auth): authentication failure; lo ... show moreMar 16 20:16:22 sanyalnet-oracle-vps2 sshd[2665878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.2 user=root
Mar 16 20:16:24 sanyalnet-oracle-vps2 sshd[2665878]: Failed password for invalid user root from 122.155.223.2 port 51100 ssh2
Mar 16 20:16:25 sanyalnet-oracle-vps2 sshd[2665878]: Disconnected from invalid user root 122.155.223.2 port 51100 [preauth]
... show less
Brute-Force
Anonymous
2025-03-16T13:52:00.634379-06:00 raspberrypi sshd[1745600]: User root from 122.155.223.2 not allowed ... show more2025-03-16T13:52:00.634379-06:00 raspberrypi sshd[1745600]: User root from 122.155.223.2 not allowed because not listed in AllowUsers
2025-03-16T13:52:00.644538-06:00 raspberrypi sshd[1745600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.2 user=root
2025-03-16T13:52:02.496958-06:00 raspberrypi sshd[1745600]: Failed password for invalid user root from 122.155.223.2 port 38834 ssh2
2025-03-16T13:53:52.869347-06:00 raspberrypi sshd[1745676]: Connection from 122.155.223.2 port 38382 on 192.168.1.22 port 22 rdomain ""
2025-03-16T13:53:54.252301-06:00 raspberrypi sshd[1745676]: User root from 122.155.223.2 not allowed because not listed in AllowUsers
... show less