This IP address has been reported a total of 1,304
times from 513 distinct
sources.
161.132.48.20 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Feb 6 19:34:08 v2202111159968167802 sshd[44956]: Invalid user gs from 161.132.48.20 port 33262<br / ... show moreFeb 6 19:34:08 v2202111159968167802 sshd[44956]: Invalid user gs from 161.132.48.20 port 33262
Feb 6 19:36:17 v2202111159968167802 sshd[45159]: Invalid user bmp from 161.132.48.20 port 33380
Feb 6 19:37:43 v2202111159968167802 sshd[45311]: Invalid user hjz from 161.132.48.20 port 33478
Feb 6 19:39:09 v2202111159968167802 sshd[45642]: Invalid user moodle from 161.132.48.20 port 33570
Feb 6 19:40:34 v2202111159968167802 sshd[45739]: Invalid user cfg from 161.132.48.20 port 33662
... show less
Feb 6 19:34:08 v2202111159968167802 sshd[44956]: Invalid user gs from 161.132.48.20 port 33262<br / ... show moreFeb 6 19:34:08 v2202111159968167802 sshd[44956]: Invalid user gs from 161.132.48.20 port 33262
Feb 6 19:36:17 v2202111159968167802 sshd[45159]: Invalid user bmp from 161.132.48.20 port 33380
Feb 6 19:37:43 v2202111159968167802 sshd[45311]: Invalid user hjz from 161.132.48.20 port 33478
Feb 6 19:39:09 v2202111159968167802 sshd[45642]: Invalid user moodle from 161.132.48.20 port 33570
Feb 6 19:40:34 v2202111159968167802 sshd[45739]: Invalid user cfg from 161.132.48.20 port 33662
... show less
2025-02-14T13:39:17.602299+00:00 widevents-blueprints sshd[4037336]: Invalid user zlz from 161.132.4 ... show more2025-02-14T13:39:17.602299+00:00 widevents-blueprints sshd[4037336]: Invalid user zlz from 161.132.48.20 port 50214
2025-02-14T13:41:38.088447+00:00 widevents-blueprints sshd[4039183]: Invalid user gc from 161.132.48.20 port 50336
2025-02-14T13:43:02.113755+00:00 widevents-blueprints sshd[4040740]: Invalid user edu from 161.132.48.20 port 50430
... show less
Feb 14 13:39:10 ubuntu sshd[1381689]: Failed password for invalid user zlz from 161.132.48.20 port 5 ... show moreFeb 14 13:39:10 ubuntu sshd[1381689]: Failed password for invalid user zlz from 161.132.48.20 port 50422 ssh2
Feb 14 13:41:35 ubuntu sshd[1381715]: Invalid user gc from 161.132.48.20 port 50572
Feb 14 13:41:35 ubuntu sshd[1381715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.48.20
Feb 14 13:41:37 ubuntu sshd[1381715]: Failed password for invalid user gc from 161.132.48.20 port 50572 ssh2
Feb 14 13:42:59 ubuntu sshd[1381737]: Invalid user edu from 161.132.48.20 port 50690
... show less
Feb 14 15:39:05 fastdl sshd[624269]: Failed password for invalid user zlz from 161.132.48.20 port 55 ... show moreFeb 14 15:39:05 fastdl sshd[624269]: Failed password for invalid user zlz from 161.132.48.20 port 55230 ssh2
Feb 14 15:41:34 fastdl sshd[624574]: Invalid user gc from 161.132.48.20 port 55388
Feb 14 15:41:34 fastdl sshd[624574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.48.20
Feb 14 15:41:36 fastdl sshd[624574]: Failed password for invalid user gc from 161.132.48.20 port 55388 ssh2
Feb 14 15:42:58 fastdl sshd[624593]: Invalid user edu from 161.132.48.20 port 55510
... show less
2025-02-14T14:50:18.177138+02:00 SuspectRP sshd[131361]: Failed password for invalid user vagrant fr ... show more2025-02-14T14:50:18.177138+02:00 SuspectRP sshd[131361]: Failed password for invalid user vagrant from 161.132.48.20 port 34854 ssh2
2025-02-14T14:54:14.110302+02:00 SuspectRP sshd[131660]: Invalid user tmax from 161.132.48.20 port 35050
2025-02-14T14:54:14.115840+02:00 SuspectRP sshd[131660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.48.20
2025-02-14T14:54:16.387730+02:00 SuspectRP sshd[131660]: Failed password for invalid user tmax from 161.132.48.20 port 35050 ssh2
2025-02-14T14:55:40.138846+02:00 SuspectRP sshd[131723]: Invalid user test12 from 161.132.48.20 port 35170
... show less
Feb 14 13:06:48 mail sshd[3335224]: Failed password for invalid user discord from 161.132.48.20 port ... show moreFeb 14 13:06:48 mail sshd[3335224]: Failed password for invalid user discord from 161.132.48.20 port 33218 ssh2
Feb 14 13:10:11 mail sshd[3335674]: Invalid user hugo from 161.132.48.20 port 33446
Feb 14 13:10:11 mail sshd[3335674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.48.20
Feb 14 13:10:13 mail sshd[3335674]: Failed password for invalid user hugo from 161.132.48.20 port 33446 ssh2
Feb 14 13:11:31 mail sshd[3335735]: Invalid user rstudio from 161.132.48.20 port 33546
... show less
2025-02-14T07:03:12.274112-05:00 ip-157-173-193-117 sshd[12000]: pam_unix(sshd:auth): authentication ... show more2025-02-14T07:03:12.274112-05:00 ip-157-173-193-117 sshd[12000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.48.20
2025-02-14T07:03:14.185195-05:00 ip-157-173-193-117 sshd[12000]: Failed password for invalid user discord from 161.132.48.20 port 46890 ssh2
2025-02-14T07:07:50.453901-05:00 ip-157-173-193-117 sshd[12446]: Invalid user devops from 161.132.48.20 port 47088
... show less