This IP address has been reported a total of 776
times from 377 distinct
sources.
147.45.48.166 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-03T16:43:39.073499cb1 sshd[13775]: Invalid user backups from 147.45.48.166 port 55636
... show more2024-11-03T16:43:39.073499cb1 sshd[13775]: Invalid user backups from 147.45.48.166 port 55636
2024-11-03T16:43:52.229876cb1 sshd[13803]: Invalid user localtest from 147.45.48.166 port 47642
2024-11-03T16:44:05.686789cb1 sshd[13815]: Invalid user amx from 147.45.48.166 port 45938
... show less
Nov 3 16:25:23 hardcore-tesla sshd[155804]: pam_unix(sshd:auth): authentication failure; logname= u ... show moreNov 3 16:25:23 hardcore-tesla sshd[155804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
Nov 3 16:25:26 hardcore-tesla sshd[155804]: Failed password for root from 147.45.48.166 port 39068 ssh2
Nov 3 16:25:43 hardcore-tesla sshd[155814]: Invalid user zoelin from 147.45.48.166 port 37972
Nov 3 16:25:43 hardcore-tesla sshd[155814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
Nov 3 16:25:45 hardcore-tesla sshd[155814]: Failed password for invalid user zoelin from 147.45.48.166 port 37972 ssh2
... show less
2024-11-03T17:22:07.449077 prodgateway sshd[38453]: Failed password for invalid user baikal from 147 ... show more2024-11-03T17:22:07.449077 prodgateway sshd[38453]: Failed password for invalid user baikal from 147.45.48.166 port 40604 ssh2
2024-11-03T17:22:20.797070 prodgateway sshd[38455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
2024-11-03T17:22:22.679868 prodgateway sshd[38455]: Failed password for root from 147.45.48.166 port 33542 ssh2
... show less
SSH Brute force: 11 attempts were recorded from 147.45.48.166
2024-11-03T17:01:20+01:00 Connec ... show moreSSH Brute force: 11 attempts were recorded from 147.45.48.166
2024-11-03T17:01:20+01:00 Connection closed by authenticating user root 147.45.48.166 port 54142 [preauth]
2024-11-03T17:01:33+01:00 Connection closed by authenticating user root 147.45.48.166 port 48170 [preauth]
2024-11-03T17:01:45+01:00 Connection closed by authenticating user root 147.45.48.166 port 45990 [preauth]
2024-11-03T17:01:58+01:00 Connection closed by authenticating user root 147.45.48.166 port 45928 [preauth]
2024-11-03T17:02:11+01:00 Connection closed by authenticating user root 147.45.48.166 port 39234 [preauth]
2024-11-03T17:02:25+01:00 User uucp from 147.45.48.166 not allowed because none of user's groups are listed in AllowGroups
2024-11-03T17:02:38+01:00 Connection closed by authenticating user root 147.45.48.166 port 37778 [preauth]
2024-11-03T17:02:50+01:00 Connection closed by authenticating user root 1 show less
Nov 3 17:19:23 Svalbard sshd[2249769]: Failed password for invalid user usuario from 147.45.48.166 ... show moreNov 3 17:19:23 Svalbard sshd[2249769]: Failed password for invalid user usuario from 147.45.48.166 port 60920 ssh2
Nov 3 17:19:36 Svalbard sshd[2249942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
Nov 3 17:19:38 Svalbard sshd[2249942]: Failed password for root from 147.45.48.166 port 48282 ssh2
... show less
2024-11-03T19:16:33.639358+03:00 kiv01.hacktegic.com sshd-session[387540]: Invalid user robert from ... show more2024-11-03T19:16:33.639358+03:00 kiv01.hacktegic.com sshd-session[387540]: Invalid user robert from 147.45.48.166 port 51496
2024-11-03T19:16:33.794071+03:00 kiv01.hacktegic.com sshd-session[387540]: Connection closed by invalid user robert 147.45.48.166 port 51496 [preauth]
2024-11-03T19:16:46.895284+03:00 kiv01.hacktegic.com sshd-session[387590]: Connection closed by authenticating user root 147.45.48.166 port 50608 [preauth]
... show less
Nov 3 17:07:21 mail sshd[1834918]: Failed password for root from 147.45.48.166 port 40860 ssh2<br / ... show moreNov 3 17:07:21 mail sshd[1834918]: Failed password for root from 147.45.48.166 port 40860 ssh2
Nov 3 17:07:35 mail sshd[1834927]: Invalid user peertube from 147.45.48.166 port 58990
Nov 3 17:07:35 mail sshd[1834927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
Nov 3 17:07:37 mail sshd[1834927]: Failed password for invalid user peertube from 147.45.48.166 port 58990 ssh2
Nov 3 17:07:51 mail sshd[1834929]: Invalid user first from 147.45.48.166 port 51776
... show less