This IP address has been reported a total of 2,636
times from 592 distinct
sources.
144.48.241.92 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-06-21T16:45:26.174068+02:00 khatuna sshd[3240487]: pam_unix(sshd:auth): authentication failure; ... show more2025-06-21T16:45:26.174068+02:00 khatuna sshd[3240487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92 user=root
2025-06-21T16:45:27.723172+02:00 khatuna sshd[3240487]: Failed password for root from 144.48.241.92 port 34134 ssh2
2025-06-21T16:50:09.818209+02:00 khatuna sshd[3242328]: Invalid user sistema from 144.48.241.92 port 37144
2025-06-21T16:50:09.824300+02:00 khatuna sshd[3242328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
2025-06-21T16:50:11.559194+02:00 khatuna sshd[3242328]: Failed password for invalid user sistema from 144.48.241.92 port 37144 ssh2
... show less
2025-06-21T16:17:39.953723+02:00 khatuna sshd[3229002]: Failed password for invalid user ubuntu from ... show more2025-06-21T16:17:39.953723+02:00 khatuna sshd[3229002]: Failed password for invalid user ubuntu from 144.48.241.92 port 36982 ssh2
2025-06-21T16:22:15.262074+02:00 khatuna sshd[3230919]: Invalid user pre from 144.48.241.92 port 45914
2025-06-21T16:22:15.268421+02:00 khatuna sshd[3230919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
2025-06-21T16:22:17.526265+02:00 khatuna sshd[3230919]: Failed password for invalid user pre from 144.48.241.92 port 45914 ssh2
2025-06-21T16:27:00.109875+02:00 khatuna sshd[3232904]: Invalid user bwadmin from 144.48.241.92 port 55096
... show less
2025-06-21T15:59:04.121234+02:00 khatuna sshd[3221339]: Invalid user pedro from 144.48.241.92 port 5 ... show more2025-06-21T15:59:04.121234+02:00 khatuna sshd[3221339]: Invalid user pedro from 144.48.241.92 port 58616
2025-06-21T15:59:04.127598+02:00 khatuna sshd[3221339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
2025-06-21T15:59:06.093229+02:00 khatuna sshd[3221339]: Failed password for invalid user pedro from 144.48.241.92 port 58616 ssh2
2025-06-21T16:03:44.597385+02:00 khatuna sshd[3223294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92 user=mysql
2025-06-21T16:03:47.000376+02:00 khatuna sshd[3223294]: Failed password for mysql from 144.48.241.92 port 45392 ssh2
... show less
2025-06-21T15:35:43.554087+02:00 khatuna sshd[3211757]: pam_unix(sshd:auth): authentication failure; ... show more2025-06-21T15:35:43.554087+02:00 khatuna sshd[3211757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
2025-06-21T15:35:45.184186+02:00 khatuna sshd[3211757]: Failed password for invalid user pre from 144.48.241.92 port 41524 ssh2
2025-06-21T15:40:28.644546+02:00 khatuna sshd[3213765]: Invalid user monitor from 144.48.241.92 port 44130
2025-06-21T15:40:28.653400+02:00 khatuna sshd[3213765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
2025-06-21T15:40:30.411282+02:00 khatuna sshd[3213765]: Failed password for invalid user monitor from 144.48.241.92 port 44130 ssh2
... show less
Jun 21 09:23:56 do1 sshd[585092]: Disconnected from authenticating user root 144.48.241.92 port 4971 ... show moreJun 21 09:23:56 do1 sshd[585092]: Disconnected from authenticating user root 144.48.241.92 port 49716 [preauth]
Jun 21 09:28:36 do1 sshd[586828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92 user=root
Jun 21 09:28:37 do1 sshd[586828]: Failed password for root from 144.48.241.92 port 39362 ssh2
Jun 21 09:28:37 do1 sshd[586828]: Disconnected from authenticating user root 144.48.241.92 port 39362 [preauth]
Jun 21 09:33:21 do1 sshd[589053]: Invalid user pre from 144.48.241.92 port 55606
... show less
Cowrie Honeypot: 5 unauthorised SSH/Telnet login attempts between 2025-06-21T12:59:32Z and 2025-06-2 ... show moreCowrie Honeypot: 5 unauthorised SSH/Telnet login attempts between 2025-06-21T12:59:32Z and 2025-06-21T13:18:33Z show less
2025-06-21T15:07:47.345229+02:00 khatuna sshd[3200445]: pam_unix(sshd:auth): authentication failure; ... show more2025-06-21T15:07:47.345229+02:00 khatuna sshd[3200445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
2025-06-21T15:07:48.559250+02:00 khatuna sshd[3200445]: Failed password for invalid user odoo15 from 144.48.241.92 port 56742 ssh2
2025-06-21T15:12:34.485136+02:00 khatuna sshd[3202389]: Invalid user ravi from 144.48.241.92 port 38728
2025-06-21T15:12:34.533752+02:00 khatuna sshd[3202389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
2025-06-21T15:12:36.480216+02:00 khatuna sshd[3202389]: Failed password for invalid user ravi from 144.48.241.92 port 38728 ssh2
... show less
Jun 21 14:57:39 proxy sshd[538514]: User root from 144.48.241.92 not allowed because not listed in A ... show moreJun 21 14:57:39 proxy sshd[538514]: User root from 144.48.241.92 not allowed because not listed in AllowUsers
Jun 21 15:03:04 proxy sshd[538531]: User root from 144.48.241.92 not allowed because not listed in AllowUsers
Jun 21 15:07:55 proxy sshd[538553]: Invalid user odoo15 from 144.48.241.92 port 46952
... show less
Jun 21 09:00:25 do1 sshd[577351]: Failed password for root from 144.48.241.92 port 59076 ssh2
... show moreJun 21 09:00:25 do1 sshd[577351]: Failed password for root from 144.48.241.92 port 59076 ssh2
Jun 21 09:00:26 do1 sshd[577351]: Disconnected from authenticating user root 144.48.241.92 port 59076 [preauth]
Jun 21 09:05:17 do1 sshd[578872]: Invalid user odoo15 from 144.48.241.92 port 49234
Jun 21 09:05:17 do1 sshd[578872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
Jun 21 09:05:18 do1 sshd[578872]: Failed password for invalid user odoo15 from 144.48.241.92 port 49234 ssh2
... show less
Jun 21 11:41:39 honey3 sshd[2867976]: Failed password for invalid user gitlab-runner from 144.48.241 ... show moreJun 21 11:41:39 honey3 sshd[2867976]: Failed password for invalid user gitlab-runner from 144.48.241.92 port 33090 ssh2
Jun 21 11:41:41 honey3 sshd[2867976]: Disconnected from invalid user gitlab-runner 144.48.241.92 port 33090 [preauth]
Jun 21 11:46:15 honey3 sshd[2868363]: Invalid user ubuntu from 144.48.241.92 port 54822
Jun 21 11:46:15 honey3 sshd[2868363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
Jun 21 11:46:17 honey3 sshd[2868363]: Failed password for invalid user ubuntu from 144.48.241.92 port 54822 ssh2
... show less
Jun 21 10:33:22 honey3 sshd[2862991]: Failed password for invalid user alma from 144.48.241.92 port ... show moreJun 21 10:33:22 honey3 sshd[2862991]: Failed password for invalid user alma from 144.48.241.92 port 44542 ssh2
Jun 21 10:33:23 honey3 sshd[2862991]: Disconnected from invalid user alma 144.48.241.92 port 44542 [preauth]
Jun 21 10:38:02 honey3 sshd[2863316]: Invalid user ntuser from 144.48.241.92 port 47038
Jun 21 10:38:02 honey3 sshd[2863316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
Jun 21 10:38:04 honey3 sshd[2863316]: Failed password for invalid user ntuser from 144.48.241.92 port 47038 ssh2
... show less
2025-06-21T12:02:57.672607+02:00 debian-epyc sshd[523299]: Failed password for invalid user jupyter ... show more2025-06-21T12:02:57.672607+02:00 debian-epyc sshd[523299]: Failed password for invalid user jupyter from 144.48.241.92 port 60102 ssh2
2025-06-21T12:07:28.293171+02:00 debian-epyc sshd[523324]: Invalid user bitwarden from 144.48.241.92 port 35106
2025-06-21T12:07:28.296319+02:00 debian-epyc sshd[523324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.241.92
2025-06-21T12:07:30.581233+02:00 debian-epyc sshd[523324]: Failed password for invalid user bitwarden from 144.48.241.92 port 35106 ssh2
2025-06-21T12:12:04.241318+02:00 debian-epyc sshd[523412]: Invalid user alma from 144.48.241.92 port 47946
... show less