This IP address has been reported a total of 379
times from 183 distinct
sources.
157.245.48.126 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 14 15:02:04 mark sshd[712596]: Failed password for root from 157.245.48.126 port 53152 ssh2<br / ... show moreDec 14 15:02:04 mark sshd[712596]: Failed password for root from 157.245.48.126 port 53152 ssh2
Dec 14 15:05:26 mark sshd[725784]: Invalid user git from 157.245.48.126 port 36994
Dec 14 15:05:29 mark sshd[725784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.48.126
Dec 14 15:05:31 mark sshd[725784]: Failed password for invalid user git from 157.245.48.126 port 36994 ssh2
Dec 14 15:07:15 mark sshd[730870]: Invalid user wang from 157.245.48.126 port 6382
... show less
2024-12-14T09:42:51.588359+00:00 pbs sshd[3057912]: Invalid user hive from 157.245.48.126 port 64446 ... show more2024-12-14T09:42:51.588359+00:00 pbs sshd[3057912]: Invalid user hive from 157.245.48.126 port 64446
2024-12-14T09:42:50.031803+00:00 pbs sshd[3057782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.48.126 user=root
2024-12-14T09:42:52.270436+00:00 pbs sshd[3057782]: Failed password for root from 157.245.48.126 port 64430 ssh2
2024-12-14T09:42:51.405562+00:00 pbs sshd[3057910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.48.126
2024-12-14T09:42:52.916791+00:00 pbs sshd[3057910]: Failed password for invalid user pi from 157.245.48.126 port 64440 ssh2
... show less
2024-12-14T10:38:29.860673tim.mtkrbti.by sshd[10635]: Failed password for root from 157.245.48.126 p ... show more2024-12-14T10:38:29.860673tim.mtkrbti.by sshd[10635]: Failed password for root from 157.245.48.126 port 3318 ssh2
2024-12-14T10:40:48.700467tim.mtkrbti.by sshd[10640]: Invalid user pi from 157.245.48.126 port 61292
2024-12-14T10:40:49.240361tim.mtkrbti.by sshd[10642]: Invalid user hive from 157.245.48.126 port 61296
... show less
Dec 13 21:57:54 global2 sshd[34199]: Failed password for root from 157.245.48.126 port 36600 ssh2<br ... show moreDec 13 21:57:54 global2 sshd[34199]: Failed password for root from 157.245.48.126 port 36600 ssh2
Dec 13 21:57:54 global2 sshd[34201]: Invalid user pi from 157.245.48.126 port 36614
Dec 13 21:57:56 global2 sshd[34201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.48.126
Dec 13 21:57:58 global2 sshd[34201]: Failed password for invalid user pi from 157.245.48.126 port 36614 ssh2
Dec 13 21:57:58 global2 sshd[34203]: Invalid user hive from 157.245.48.126 port 36616
... show less
2024-12-13T13:05:12.702375racknerd-2df238 sshd[1390967]: pam_unix(sshd:auth): authentication failure ... show more2024-12-13T13:05:12.702375racknerd-2df238 sshd[1390967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.48.126 user=root
2024-12-13T13:05:15.085946racknerd-2df238 sshd[1390967]: Failed password for root from 157.245.48.126 port 8728 ssh2
2024-12-13T13:05:26.421376racknerd-2df238 sshd[1390970]: Invalid user pi from 157.245.48.126 port 59606
... show less
Dec 13 19:33:55 pve-hkg1 sshd[3570259]: Failed password for root from 157.245.48.126 port 61488 ssh2 ... show moreDec 13 19:33:55 pve-hkg1 sshd[3570259]: Failed password for root from 157.245.48.126 port 61488 ssh2
Dec 13 19:33:59 pve-hkg1 sshd[3570371]: Invalid user pi from 157.245.48.126 port 16422
Dec 13 19:34:03 pve-hkg1 sshd[3570371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.48.126
Dec 13 19:34:05 pve-hkg1 sshd[3570371]: Failed password for invalid user pi from 157.245.48.126 port 16422 ssh2
Dec 13 19:34:06 pve-hkg1 sshd[3570377]: Invalid user hive from 157.245.48.126 port 16424
... show less
OCCO-Holding Dec 13 04:29:08 vmi702584 sshd[3168198]: Connection closed by authenticating user root ... show moreOCCO-Holding Dec 13 04:29:08 vmi702584 sshd[3168198]: Connection closed by authenticating user root 157.245.48.126 port 1558 [preauth]
Dec 13 04:32:59 vmi702584 sshd[3168356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.48.126 user=root
Dec 13 04:33:01 vmi702584 sshd[3168356]: Failed password for root from 157.245.48.126 port 4282 ssh2
Dec 13 04:33:01 vmi702584 sshd[3168361]: Invalid user pi from 157.245.48.126 port 4294
Dec 13 04:33:03 vmi702584 sshd[3168356]: Connection closed by authenticating user root 157.245.48.126 port 4282 [preauth]
... show less
2024-12-12T22:42:54.818430+01:00 server sshd[487959]: Failed password for root from 157.245.48.126 p ... show more2024-12-12T22:42:54.818430+01:00 server sshd[487959]: Failed password for root from 157.245.48.126 port 1108 ssh2
2024-12-12T22:42:57.555983+01:00 server sshd[488013]: Invalid user pi from 157.245.48.126 port 1116
2024-12-12T22:42:59.933960+01:00 server sshd[488013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.48.126
2024-12-12T22:43:02.056415+01:00 server sshd[488013]: Failed password for invalid user pi from 157.245.48.126 port 1116 ssh2
2024-12-12T22:43:24.274744+01:00 server sshd[488129]: Invalid user mongo from 157.245.48.126 port 26912
... show less