This IP address has been reported a total of 25,336
times from 1,596 distinct
sources.
148.66.132.190 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 9 22:44:02 files sshd[3511712]: Invalid user michael from 148.66.132.190 port 33204
Dec ... show moreDec 9 22:44:02 files sshd[3511712]: Invalid user michael from 148.66.132.190 port 33204
Dec 9 22:44:02 files sshd[3511712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Dec 9 22:44:03 files sshd[3511712]: Failed password for invalid user michael from 148.66.132.190 port 33204 ssh2
Dec 9 22:45:26 files sshd[3512455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 user=root
Dec 9 22:45:28 files sshd[3512455]: Failed password for root from 148.66.132.190 port 59208 ssh2
... show less
Dec 9 22:38:29 petr-testing sshd[37615]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreDec 9 22:38:29 petr-testing sshd[37615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Dec 9 22:38:31 petr-testing sshd[37615]: Failed password for invalid user deployer from 148.66.132.190 port 38456 ssh2
Dec 9 22:39:53 petr-testing sshd[2606]: Failed password for root from 148.66.132.190 port 36214 ssh2
... show less
Dec 9 22:16:32 files sshd[3496893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreDec 9 22:16:32 files sshd[3496893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Dec 9 22:16:34 files sshd[3496893]: Failed password for invalid user mujeeb from 148.66.132.190 port 52060 ssh2
Dec 9 22:17:52 files sshd[3497630]: Invalid user jwlee from 148.66.132.190 port 49816
Dec 9 22:17:52 files sshd[3497630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Dec 9 22:17:54 files sshd[3497630]: Failed password for invalid user jwlee from 148.66.132.190 port 49816 ssh2
... show less
Dec 9 22:11:51 petr-testing sshd[16966]: Failed password for root from 148.66.132.190 port 56184 ss ... show moreDec 9 22:11:51 petr-testing sshd[16966]: Failed password for root from 148.66.132.190 port 56184 ssh2
Dec 9 22:16:19 petr-testing sshd[33788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Dec 9 22:16:21 petr-testing sshd[33788]: Failed password for invalid user mujeeb from 148.66.132.190 port 48344 ssh2
... show less
Brute-ForceSSH
Anonymous
2023-12-09T14:44:25.748634 SPARTAN sshd[28353]: Invalid user nova from 148.66.132.190 port 38180<br ... show more2023-12-09T14:44:25.748634 SPARTAN sshd[28353]: Invalid user nova from 148.66.132.190 port 38180
2023-12-09T14:44:25.752169 SPARTAN sshd[28353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
2023-12-09T14:44:27.504003 SPARTAN sshd[28353]: Failed password for invalid user nova from 148.66.132.190 port 38180 ssh2
2023-12-09T14:48:15.852129 SPARTAN sshd[29495]: Invalid user ana from 148.66.132.190 port 50660
... show less
Dec 9 18:19:43 pbs sshd[2788189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreDec 9 18:19:43 pbs sshd[2788189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Dec 9 18:19:45 pbs sshd[2788189]: Failed password for invalid user zhaowei from 148.66.132.190 port 53942 ssh2
Dec 9 18:21:28 pbs sshd[2790076]: Invalid user eqemu from 148.66.132.190 port 51340
Dec 9 18:21:28 pbs sshd[2790076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Dec 9 18:21:30 pbs sshd[2790076]: Failed password for invalid user eqemu from 148.66.132.190 port 51340 ssh2
... show less
2023-12-09T18:14:25.515170milloweb sshd[20111]: pam_unix(sshd:auth): authentication failure; logname ... show more2023-12-09T18:14:25.515170milloweb sshd[20111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 user=root
2023-12-09T18:14:27.724665milloweb sshd[20111]: Failed password for root from 148.66.132.190 port 57114 ssh2
2023-12-09T18:19:10.670174milloweb sshd[20727]: Invalid user zhaowei from 148.66.132.190 port 49306
... show less
Dec 9 13:34:56 cow sshd[568111]: Failed password for invalid user admin from 148.66.132.190 port 42 ... show moreDec 9 13:34:56 cow sshd[568111]: Failed password for invalid user admin from 148.66.132.190 port 42090 ssh2
Dec 9 13:38:53 cow sshd[570759]: Invalid user ubuntu from 148.66.132.190 port 56932
Dec 9 13:38:53 cow sshd[570759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Dec 9 13:38:55 cow sshd[570759]: Failed password for invalid user ubuntu from 148.66.132.190 port 56932 ssh2
Dec 9 13:40:20 cow sshd[571707]: Invalid user ec2-user from 148.66.132.190 port 53750
... show less
Dec 9 12:34:50 wslbvm01 sshd[2941364]: Invalid user admin from 148.66.132.190 port 53474
Dec ... show moreDec 9 12:34:50 wslbvm01 sshd[2941364]: Invalid user admin from 148.66.132.190 port 53474
Dec 9 12:34:52 wslbvm01 sshd[2941364]: Failed password for invalid user admin from 148.66.132.190 port 53474 ssh2
Dec 9 12:38:53 wslbvm01 sshd[2942499]: Invalid user ubuntu from 148.66.132.190 port 40426
... show less
A brute-force attempt has been detected from 148.66.132.190 (Singapore) with 17 distinct account(s) ... show moreA brute-force attempt has been detected from 148.66.132.190 (Singapore) with 17 distinct account(s) and 26 distinct password(s) over 35m28s. show less
2023-12-09T10:39:35.243783 vmd56152.contaboserver.net sshd[944633]: Failed password for invalid user ... show more2023-12-09T10:39:35.243783 vmd56152.contaboserver.net sshd[944633]: Failed password for invalid user user from 148.66.132.190 port 46612 ssh2
2023-12-09T10:40:49.895435 vmd56152.contaboserver.net sshd[944694]: Invalid user sammy from 148.66.132.190 port 39838
2023-12-09T10:40:49.907539 vmd56152.contaboserver.net sshd[944694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
2023-12-09T10:40:52.166816 vmd56152.contaboserver.net sshd[944694]: Failed password for invalid user sammy from 148.66.132.190 port 39838 ssh2
2023-12-09T10:42:02.441726 vmd56152.contaboserver.net sshd[944735]: Invalid user test from 148.66.132.190 port 33054
2023-12-09T10:42:02.453856 vmd56152.contaboserver.net sshd[944735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
2023-12-09T10:42:04.737921 vmd56152.contaboserver.net sshd[944735]: Failed password for invalid user test from 148.66.132.190 port 33054 s
... show less