This IP address has been reported a total of 87
times from 48 distinct
sources.
123.209.121.48 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
[AUTORAVALT][[16/12/2024 - 03:49:14 -03:00 UTC]
Attack from [Telstra Limited]
[123.209.1 ... show more[AUTORAVALT][[16/12/2024 - 03:49:14 -03:00 UTC]
Attack from [Telstra Limited]
[123.209.121.48]-[RANGE:123.208.0.0 - 123.211.255.255]
[;; communications error to 127.0.0.53#53: timed out]
Action: BLocKed
FTP Brute-Force -> Running brute force credentials on the FTP server.
Brute-Force -> Credential brute-force attacks on webpage logins and services like SSH, F]
... show less
[AUTORAVALT][[16/12/2024 - 03:18:06 -03:00 UTC]
Attack from [Telstra Limited]
[123.209.1 ... show more[AUTORAVALT][[16/12/2024 - 03:18:06 -03:00 UTC]
Attack from [Telstra Limited]
[123.209.121.48]-[RANGE:123.208.0.0 - 123.211.255.255]
[;; communications error to 127.0.0.53#53: timed out]
Action: BLocKed
FTP Brute-Force -> Running brute force credentials on the FTP server.
Brute-Force -> Credential brute-force attacks on webpage logins and services like SSH, F]
... show less
Dec 15 19:43:10 b146-44 sshd[4102138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreDec 15 19:43:10 b146-44 sshd[4102138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.209.121.48
Dec 15 19:43:12 b146-44 sshd[4102138]: Failed password for invalid user a from 123.209.121.48 port 46380 ssh2
Dec 15 19:43:22 b146-44 sshd[4102166]: Invalid user ubnt from 123.209.121.48 port 36846
... show less
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
Anonymous
2024-12-15T20:01:09.186671+01:00 debian sshd[3773978]: Invalid user a from 123.209.121.48 port 41690 ... show more2024-12-15T20:01:09.186671+01:00 debian sshd[3773978]: Invalid user a from 123.209.121.48 port 41690
... show less
[AUTORAVALT][[15/12/2024 - 14:31:51 -03:00 UTC]
Attack from [Telstra Limited]
[123.209.1 ... show more[AUTORAVALT][[15/12/2024 - 14:31:51 -03:00 UTC]
Attack from [Telstra Limited]
[123.209.121.48]-[RANGE:123.208.0.0 - 123.211.255.255]
Action: BLocKed
FTP Brute-Force -> Running brute force credentials on the FTP server.
Brute-Force -> Credential brute-force attacks on webpage logins and services like SSH, FTP, SIP, SMTP, RDP, etc.
]
... show less
2024-12-15T14:15:54.352779+01:00 ns402 sshd[59021]: Connection closed by invalid user a 123.209.121. ... show more2024-12-15T14:15:54.352779+01:00 ns402 sshd[59021]: Connection closed by invalid user a 123.209.121.48 port 33702 [preauth]
2024-12-15T14:17:16.675664+01:00 ns402 sshd[59258]: Invalid user ubnt from 123.209.121.48 port 50636
2024-12-15T14:17:17.780237+01:00 ns402 sshd[59258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.209.121.48
2024-12-15T14:17:19.455538+01:00 ns402 sshd[59258]: Failed password for invalid user ubnt from 123.209.121.48 port 50636 ssh2
2024-12-15T14:17:23.618871+01:00 ns402 sshd[59258]: Connection closed by invalid user ubnt 123.209.121.48 port 50636 [preauth]
2024-12-15T14:18:48.768196+01:00 ns402 sshd[59493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.209.121.48 user=root
2024-12-15T14:18:50.935030+01:00 ns402 sshd[59493]: Failed password for root from 123.209.121.48 port 48164 ssh2
2024-12-15T14:18:53.246008+01:00 ns402 sshd[59493]: Connection closed by authenticating
... show less