This IP address has been reported a total of 776
times from 377 distinct
sources.
147.45.48.166 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 14 00:43:42 lnxweb62 sshd[24564]: Failed password for invalid user sarah from 147.45.48.166 port ... show moreNov 14 00:43:42 lnxweb62 sshd[24564]: Failed password for invalid user sarah from 147.45.48.166 port 56420 ssh2
Nov 14 00:43:44 lnxweb62 sshd[24564]: Connection closed by invalid user sarah 147.45.48.166 port 56420 [preauth]
Nov 14 00:43:57 lnxweb62 sshd[24661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
Nov 14 00:43:59 lnxweb62 sshd[24661]: Failed password for root from 147.45.48.166 port 38044 ssh2
Nov 14 00:44:01 lnxweb62 sshd[24661]: Connection closed by authenticating user root 147.45.48.166 port 38044 [preauth]
... show less
2024-11-14T00:35:56.340275+01:00 kittycat sshd-session[722243]: Failed password for root from 147.45 ... show more2024-11-14T00:35:56.340275+01:00 kittycat sshd-session[722243]: Failed password for root from 147.45.48.166 port 36002 ssh2
2024-11-14T00:36:08.620109+01:00 kittycat sshd-session[722272]: Connection from 147.45.48.166 port 37778 on 144.91.110.176 port 22 rdomain ""
2024-11-14T00:36:09.316268+01:00 kittycat sshd-session[722272]: Invalid user ubuntu from 147.45.48.166 port 37778
2024-11-14T00:36:09.324035+01:00 kittycat sshd-session[722272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
2024-11-14T00:36:11.532923+01:00 kittycat sshd-session[722272]: Failed password for invalid user ubuntu from 147.45.48.166 port 37778 ssh2
... show less
2024-11-13T23:30:23.065725+00:00 nzxldotspace sshd[581701]: Invalid user egarcia from 147.45.48.166 ... show more2024-11-13T23:30:23.065725+00:00 nzxldotspace sshd[581701]: Invalid user egarcia from 147.45.48.166 port 54438
... show less
2024-11-14T00:24:03.333161+01:00 haigwepa sshd[7349]: pam_unix(sshd:auth): authentication failure; l ... show more2024-11-14T00:24:03.333161+01:00 haigwepa sshd[7349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
2024-11-14T00:24:04.696168+01:00 haigwepa sshd[7349]: Failed password for root from 147.45.48.166 port 43240 ssh2
2024-11-14T00:24:19.969983+01:00 haigwepa sshd[7352]: Invalid user test01 from 147.45.48.166 port 36870
... show less
Nov 14 00:19:43 dev0-dcde-rnet sshd[4974]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreNov 14 00:19:43 dev0-dcde-rnet sshd[4974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
Nov 14 00:19:45 dev0-dcde-rnet sshd[4974]: Failed password for invalid user hadoop from 147.45.48.166 port 55162 ssh2
Nov 14 00:20:00 dev0-dcde-rnet sshd[4976]: Failed password for root from 147.45.48.166 port 60264 ssh2 show less
2024-11-13T23:49:56.693055+01:00 mail sshd[3349096]: Failed password for invalid user vpopmail from ... show more2024-11-13T23:49:56.693055+01:00 mail sshd[3349096]: Failed password for invalid user vpopmail from 147.45.48.166 port 36250 ssh2
2024-11-13T23:50:09.799908+01:00 mail sshd[3349140]: Invalid user admin from 147.45.48.166 port 53916
2024-11-13T23:50:09.803383+01:00 mail sshd[3349140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166
2024-11-13T23:50:11.601619+01:00 mail sshd[3349140]: Failed password for invalid user admin from 147.45.48.166 port 53916 ssh2
2024-11-13T23:50:26.042083+01:00 mail sshd[3349226]: Invalid user amax from 147.45.48.166 port 38498
... show less
Brute-ForceSSH
Anonymous
Nov 13 23:43:33 wolf1 sshd[4115792]: Invalid user media from 147.45.48.166 port 45224
Nov 13 2 ... show moreNov 13 23:43:33 wolf1 sshd[4115792]: Invalid user media from 147.45.48.166 port 45224
Nov 13 23:43:59 wolf1 sshd[4115815]: Invalid user patrick from 147.45.48.166 port 42428
Nov 13 23:44:12 wolf1 sshd[4115837]: Invalid user docker from 147.45.48.166 port 47364
Nov 13 23:44:25 wolf1 sshd[4115847]: Invalid user ubuntu from 147.45.48.166 port 44886
Nov 13 23:44:52 wolf1 sshd[4115885]: Invalid user rustserver from 147.45.48.166 port 34640
... show less
DDoS AttackFTP Brute-ForcePort ScanHackingSQL InjectionSpoofingBrute-ForceBad Web BotSSHIoT Targeted
2024-11-13T23:40:36.033199+01:00 server sshd[619669]: Failed password for invalid user fan from 147. ... show more2024-11-13T23:40:36.033199+01:00 server sshd[619669]: Failed password for invalid user fan from 147.45.48.166 port 58602 ssh2
2024-11-13T23:40:50.922274+01:00 server sshd[619671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.45.48.166 user=root
2024-11-13T23:40:52.976895+01:00 server sshd[619671]: Failed password for root from 147.45.48.166 port 38178 ssh2 show less