This IP address has been reported a total of 1,151
times from 475 distinct
sources.
198.98.52.148 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 2 18:06:59 NBG-VS02-WebServer sshd[1469292]: Invalid user contact from 198.98.52.148 port 60159 ... show moreDec 2 18:06:59 NBG-VS02-WebServer sshd[1469292]: Invalid user contact from 198.98.52.148 port 60159
Dec 2 18:06:59 NBG-VS02-WebServer sshd[1469292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.52.148
Dec 2 18:07:02 NBG-VS02-WebServer sshd[1469292]: Failed password for invalid user contact from 198.98.52.148 port 60159 ssh2
... show less
2023-12-02T08:45:26.540614-05:00 debian-8gb-ash-1 sshd[1522852]: Invalid user ubuntu from 198.98.52. ... show more2023-12-02T08:45:26.540614-05:00 debian-8gb-ash-1 sshd[1522852]: Invalid user ubuntu from 198.98.52.148 port 46059
... show less
2023-12-02T14:00:31.607843cocheando sshd[8352]: Invalid user wt from 198.98.52.148 port 35844
... show more2023-12-02T14:00:31.607843cocheando sshd[8352]: Invalid user wt from 198.98.52.148 port 35844
2023-12-02T14:04:24.738769cocheando sshd[8486]: Invalid user ubuntu from 198.98.52.148 port 58151
2023-12-02T14:05:44.576937cocheando sshd[8538]: Invalid user test from 198.98.52.148 port 43136
... show less
Dec 2 11:11:11 vmi1042113 sshd[296384]: Invalid user redis from 198.98.52.148 port 40813
Dec ... show moreDec 2 11:11:11 vmi1042113 sshd[296384]: Invalid user redis from 198.98.52.148 port 40813
Dec 2 11:13:38 vmi1042113 sshd[296489]: Invalid user robot from 198.98.52.148 port 34867
Dec 2 11:16:02 vmi1042113 sshd[296547]: Invalid user jenkins from 198.98.52.148 port 57154
Dec 2 11:18:14 vmi1042113 sshd[296607]: Invalid user builder from 198.98.52.148 port 51204
Dec 2 11:19:25 vmi1042113 sshd[296656]: Invalid user gonghaihua from 198.98.52.148 port 34115
... show less
Dec 2 10:21:20 vmi1439941 sshd[2836405]: Invalid user oracle from 198.98.52.148 port 59563
De ... show moreDec 2 10:21:20 vmi1439941 sshd[2836405]: Invalid user oracle from 198.98.52.148 port 59563
Dec 2 10:21:20 vmi1439941 sshd[2836405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.52.148
Dec 2 10:21:22 vmi1439941 sshd[2836405]: Failed password for invalid user oracle from 198.98.52.148 port 59563 ssh2
... show less
2023-12-02T10:22:42.480618+02:00 cloud..de sshd[30834]: Disconnected from authenticating user root 1 ... show more2023-12-02T10:22:42.480618+02:00 cloud..de sshd[30834]: Disconnected from authenticating user root 198.98.52.148 port 51943 [preauth]
2023-12-02T10:24:56.900842+02:00 cloud..de sshd[30936]: Disconnected from authenticating user root 198.98.52.148 port 39627 [preauth]
2023-12-02T10:26:34.215802+02:00 cloud..de sshd[31094]: Disconnected from authenticating user root 198.98.52.148 port 52871 [preauth] show less
2023-12-02T08:40:13.357855 mail2.akcurate.de sshd[451164]: Invalid user test1 from 198.98.52.148 por ... show more2023-12-02T08:40:13.357855 mail2.akcurate.de sshd[451164]: Invalid user test1 from 198.98.52.148 port 36865
2023-12-02T08:40:13.459077 mail2.akcurate.de sshd[451164]: Disconnected from invalid user test1 198.98.52.148 port 36865 [preauth]
2023-12-02T08:43:53.798200 mail2.akcurate.de sshd[451197]: Disconnected from authenticating user root 198.98.52.148 port 56432 [preauth]
... show less
2023-12-02T06:27:15.199164+01:00 pve sshd[3096379]: Received disconnect from 198.98.52.148 port 4506 ... show more2023-12-02T06:27:15.199164+01:00 pve sshd[3096379]: Received disconnect from 198.98.52.148 port 45065:11: Bye Bye [preauth]
2023-12-02T06:27:15.199556+01:00 pve sshd[3096379]: Disconnected from authenticating user root 198.98.52.148 port 45065 [preauth]
2023-12-02T06:29:19.686584+01:00 pve sshd[3108283]: Invalid user user4 from 198.98.52.148 port 60045
2023-12-02T06:29:19.770570+01:00 pve sshd[3108283]: Received disconnect from 198.98.52.148 port 60045:11: Bye Bye [preauth]
2023-12-02T06:29:19.770917+01:00 pve sshd[3108283]: Disconnected from invalid user user4 198.98.52.148 port 60045 [preauth]
2023-12-02T06:30:32.890707+01:00 pve sshd[3119731]: Received disconnect from 198.98.52.148 port 44103:11: Bye Bye [preauth]
2023-12-02T06:30:32.891240+01:00 pve sshd[3119731]: Disconnected from authenticating user root 198.98.52.148 port 44103 [preauth]
2023-12-02T06:31:55.580695+01:00 pve sshd[3129444]: Invalid user flw from 198.98.52.148 port 56394
2023-12-02T06:31:55.665073+01:00 pve sshd[31 show less
2023-12-02T05:42:39.096128anubis.d-serv.eu sshd[32383]: Invalid user vsftpd from 198.98.52.148 port ... show more2023-12-02T05:42:39.096128anubis.d-serv.eu sshd[32383]: Invalid user vsftpd from 198.98.52.148 port 60455
2023-12-02T05:42:39.099270anubis.d-serv.eu sshd[32383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.52.148
2023-12-02T05:42:40.982342anubis.d-serv.eu sshd[32383]: Failed password for invalid user vsftpd from 198.98.52.148 port 60455 ssh2
2023-12-02T05:43:49.377296anubis.d-serv.eu sshd[21625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.52.148 user=root
2023-12-02T05:43:51.872257anubis.d-serv.eu sshd[21625]: Failed password for root from 198.98.52.148 port 45574 ssh2
... show less