This IP address has been reported a total of 7,870
times from 1,069 distinct
sources.
181.48.60.49 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 11 01:11:47 lnxmail62 sshd[11755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreDec 11 01:11:47 lnxmail62 sshd[11755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root
Dec 11 01:11:49 lnxmail62 sshd[11755]: Failed password for root from 181.48.60.49 port 53602 ssh2
Dec 11 01:17:51 lnxmail62 sshd[15260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root
Dec 11 01:17:53 lnxmail62 sshd[15260]: Failed password for root from 181.48.60.49 port 56552 ssh2
Dec 11 01:19:15 lnxmail62 sshd[16028]: Invalid user rick from 181.48.60.49 port 54502
... show less
2023-12-10 16:35:29.957650-0600 localhost sshd[54792]: Failed password for root from 181.48.60.49 p ... show more2023-12-10 16:35:29.957650-0600 localhost sshd[54792]: Failed password for root from 181.48.60.49 port 57028 ssh2 show less
Dec 10 21:06:38 mailtommygod sshd[444841]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreDec 10 21:06:38 mailtommygod sshd[444841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49
Dec 10 21:06:40 mailtommygod sshd[444841]: Failed password for invalid user username from 181.48.60.49 port 49150 ssh2
Dec 10 21:08:05 mailtommygod sshd[445108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root
Dec 10 21:08:07 mailtommygod sshd[445108]: Failed password for root from 181.48.60.49 port 47184 ssh2
Dec 10 21:09:23 mailtommygod sshd[445319]: Invalid user admin1 from 181.48.60.49 port 45184 show less
Dec 10 22:56:16 Digitalogic sshd[1544895]: Disconnected from authenticating user root 181.48.60.49 p ... show moreDec 10 22:56:16 Digitalogic sshd[1544895]: Disconnected from authenticating user root 181.48.60.49 port 58820 [preauth]
Dec 10 22:57:50 Digitalogic sshd[1545231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root
Dec 10 22:57:53 Digitalogic sshd[1545231]: Failed password for root from 181.48.60.49 port 55692 ssh2
... show less
Dec 10 22:25:15 Digitalogic sshd[1538394]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreDec 10 22:25:15 Digitalogic sshd[1538394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49
Dec 10 22:25:17 Digitalogic sshd[1538394]: Failed password for invalid user michel from 181.48.60.49 port 41716 ssh2
Dec 10 22:25:19 Digitalogic sshd[1538394]: Disconnected from invalid user michel 181.48.60.49 port 41716 [preauth]
... show less
Dec 10 19:47:31 755655D sshd[604655]: Invalid user xuliang from 181.48.60.49 port 33436
Dec 10 ... show moreDec 10 19:47:31 755655D sshd[604655]: Invalid user xuliang from 181.48.60.49 port 33436
Dec 10 19:47:31 755655D sshd[604655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49
Dec 10 19:47:33 755655D sshd[604655]: Failed password for invalid user xuliang from 181.48.60.49 port 33436 ssh2
Dec 10 19:47:31 755655D sshd[604655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49
Dec 10 19:47:33 755655D sshd[604655]: Failed password for invalid user xuliang from 181.48.60.49 port 33436 ssh2
... show less
Dec 10 19:13:58 755655D sshd[560994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreDec 10 19:13:58 755655D sshd[560994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root
Dec 10 19:14:00 755655D sshd[560994]: Failed password for root from 181.48.60.49 port 48068 ssh2
Dec 10 19:15:15 755655D sshd[562892]: Invalid user sonar from 181.48.60.49 port 41838
Dec 10 19:15:15 755655D sshd[562892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49
Dec 10 19:15:18 755655D sshd[562892]: Failed password for invalid user sonar from 181.48.60.49 port 41838 ssh2
... show less
Dec 10 19:12:51 <server> sshd\[22141\]: Invalid user halley from 181.48.60.49Dec 10 19:12:52 <server ... show moreDec 10 19:12:51 <server> sshd\[22141\]: Invalid user halley from 181.48.60.49Dec 10 19:12:52 <server> sshd\[22141\]: Failed password for invalid user halley from 181.48.60.49 port 53672 ssh2
... show less
(sshd) Failed SSH login from 181.48.60.49 (CO/Colombia/-): 5 in the last 3600 secs; Ports: *; Direct ... show more(sshd) Failed SSH login from 181.48.60.49 (CO/Colombia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Dec 10 15:59:39 rainbow sshd[1822991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root
Dec 10 15:59:40 rainbow sshd[1822991]: Failed password for root from 181.48.60.49 port 37138 ssh2
Dec 10 16:01:04 rainbow sshd[1823068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root
Dec 10 16:01:05 rainbow sshd[1823068]: Failed password for root from 181.48.60.49 port 34972 ssh2
Dec 10 16:02:25 rainbow sshd[1823121]: Invalid user ismail from 181.48.60.49 port 60840 show less
Dec 10 15:02:13 dagasistemas sshd[28350]: Invalid user ismail from 181.48.60.49 port 51886
Dec ... show moreDec 10 15:02:13 dagasistemas sshd[28350]: Invalid user ismail from 181.48.60.49 port 51886
Dec 10 15:02:13 dagasistemas sshd[28350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49
Dec 10 15:02:15 dagasistemas sshd[28350]: Failed password for invalid user ismail from 181.48.60.49 port 51886 ssh2
... show less