This IP address has been reported a total of 776
times from 377 distinct
sources.
147.45.48.166 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-14T01:23:47.685066Z bdfd14d23e2e New connection: 147.45.48.166:56306 (10.89.0.2:2222) [sessi ... show more2024-11-14T01:23:47.685066Z bdfd14d23e2e New connection: 147.45.48.166:56306 (10.89.0.2:2222) [session: bdfd14d23e2e]
2024-11-14T01:24:01.905044Z 28dcfd32b85c New connection: 147.45.48.166:60384 (10.89.0.2:2222) [session: 28dcfd32b85c] show less
2024-11-14T01:08:02.719340+00:00 Linux06 sshd[3104454]: Failed password for root from 147.45.48.166 ... show more2024-11-14T01:08:02.719340+00:00 Linux06 sshd[3104454]: Failed password for root from 147.45.48.166 port 41174 ssh2
2024-11-14T01:08:16.010195+00:00 Linux06 sshd[3105075]: Invalid user xgridagent from 147.45.48.166 port 54166
2024-11-14T01:08:16.012296+00:00 Linux06 sshd[3105075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
2024-11-14T01:08:18.471039+00:00 Linux06 sshd[3105075]: Failed password for invalid user xgridagent from 147.45.48.166 port 54166 ssh2
2024-11-14T01:08:32.705057+00:00 Linux06 sshd[3105817]: Invalid user byp from 147.45.48.166 port 39454
2024-11-14T01:08:32.707449+00:00 Linux06 sshd[3105817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
2024-11-14T01:08:34.695198+00:00 Linux06 sshd[3105817]: Failed password for invalid user byp from 147.45.48.166 port 39454 ssh2
2024-11-14T01:08:49.591226+00:00 Linux06 sshd[3106499]: Invalid user xkadmin from 147.45.4
... show less
Nov 14 10:03:10 starlight-server sshd[9920]: pam_unix(sshd:auth): authentication failure; logname= u ... show moreNov 14 10:03:10 starlight-server sshd[9920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
Nov 14 10:03:12 starlight-server sshd[9920]: Failed password for root from 147.45.48.166 port 51828 ssh2
Nov 14 10:03:26 starlight-server sshd[9944]: Invalid user cloudera from 147.45.48.166 port 59528
Nov 14 10:03:26 starlight-server sshd[9944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
Nov 14 10:03:28 starlight-server sshd[9944]: Failed password for invalid user cloudera from 147.45.48.166 port 59528 ssh2
... show less
Fail2ban jail:
Nov 14 01:44:41 x sshd[789406]: User root from 147.45.48.166 not allowed becaus ... show moreFail2ban jail:
Nov 14 01:44:41 x sshd[789406]: User root from 147.45.48.166 not allowed because listed in DenyUsers
Nov 14 01:44:54 x sshd[789409]: Invalid user ts3audiobot from 147.45.48.166 port 39098
Nov 14 01:45:07 x sshd[789416]: Invalid user sbot from 147.45.48.166 port 44194
Nov 14 01:45:21 x sshd[789418]: Invalid user weblogic from 147.45.48.166 port 56030
... show less
2024-11-14T02:13:00.755299+02:00 aligw01.aneirin.net sshd-session[144581]: Invalid user gpadmin from ... show more2024-11-14T02:13:00.755299+02:00 aligw01.aneirin.net sshd-session[144581]: Invalid user gpadmin from 147.45.48.166 port 48420
2024-11-14T02:13:02.910837+02:00 aligw01.aneirin.net sshd-session[144581]: Failed password for invalid user gpadmin from 147.45.48.166 port 48420 ssh2
2024-11-14T02:13:04.239099+02:00 aligw01.aneirin.net sshd-session[144581]: Connection closed by invalid user gpadmin 147.45.48.166 port 48420 [preauth]
... show less
Nov 14 01:00:36 plesk sshd[14164]: Failed password for invalid user ftpTest from 147.45.48.166 port ... show moreNov 14 01:00:36 plesk sshd[14164]: Failed password for invalid user ftpTest from 147.45.48.166 port 43014 ssh2
Nov 14 01:00:49 plesk sshd[14272]: Invalid user postgres from 147.45.48.166 port 56962
Nov 14 01:00:49 plesk sshd[14272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
Nov 14 01:00:51 plesk sshd[14272]: Failed password for invalid user postgres from 147.45.48.166 port 56962 ssh2
Nov 14 01:01:04 plesk sshd[14357]: Invalid user test2 from 147.45.48.166 port 49662 show less
Brute-ForceSSH
Anonymous
Failed password for invalid user oracle from 147.45.48.166 port 58922 ssh2
pam_unix(sshd:auth) ... show moreFailed password for invalid user oracle from 147.45.48.166 port 58922 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
Failed password for root from 147.45.48.166 port 53296 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
Failed password for root from 147.45.48.166 port 38410 ssh2 show less
Nov 14 00:59:46 ourumov-web sshd\[11843\]: Invalid user user05 from 147.45.48.166 port 50354
N ... show moreNov 14 00:59:46 ourumov-web sshd\[11843\]: Invalid user user05 from 147.45.48.166 port 50354
Nov 14 00:59:46 ourumov-web sshd\[11843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
Nov 14 00:59:48 ourumov-web sshd\[11843\]: Failed password for invalid user user05 from 147.45.48.166 port 50354 ssh2
... show less