This IP address has been reported a total of 260
times from 66 distinct
sources.
199.48.120.226 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jul 30 13:22:42 dbr01 sshd[2608486]: User root from 199.48.120.226 not allowed because not listed in ... show moreJul 30 13:22:42 dbr01 sshd[2608486]: User root from 199.48.120.226 not allowed because not listed in AllowUsers
Jul 30 13:23:11 dbr01 sshd[2608678]: User root from 199.48.120.226 not allowed because not listed in AllowUsers
Jul 30 13:23:42 dbr01 sshd[2608746]: Invalid user es from 199.48.120.226 port 43027
Jul 30 13:24:12 dbr01 sshd[2608982]: User root from 199.48.120.226 not allowed because not listed in AllowUsers
Jul 30 13:24:45 dbr01 sshd[2609093]: User root from 199.48.120.226 not allowed because not listed in AllowUsers
... show less
2024-07-29T07:12:44.467398+00:00 edge-hiv-dal01.int.pdx.net.uk sshd[969813]: Invalid user david from ... show more2024-07-29T07:12:44.467398+00:00 edge-hiv-dal01.int.pdx.net.uk sshd[969813]: Invalid user david from 199.48.120.226 port 54132
2024-07-29T07:16:56.650782+00:00 edge-hiv-dal01.int.pdx.net.uk sshd[970063]: Invalid user ftptest from 199.48.120.226 port 33000
2024-07-29T07:17:27.015163+00:00 edge-hiv-dal01.int.pdx.net.uk sshd[970100]: Invalid user Oracle from 199.48.120.226 port 14655
... show less
Jul 28 23:05:02 main sshd[2467895]: Failed password for root from 199.48.120.226 port 40503 ssh2<br ... show moreJul 28 23:05:02 main sshd[2467895]: Failed password for root from 199.48.120.226 port 40503 ssh2
Jul 28 23:05:28 main sshd[2468270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.48.120.226 user=root
Jul 28 23:05:30 main sshd[2468270]: Failed password for root from 199.48.120.226 port 39836 ssh2
... show less
2024-07-28T11:45:04.589257+02:00 hz-vm-web-023 sshd[1323670]: pam_unix(sshd:auth): authentication fa ... show more2024-07-28T11:45:04.589257+02:00 hz-vm-web-023 sshd[1323670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.48.120.226
2024-07-28T11:45:06.448133+02:00 hz-vm-web-023 sshd[1323670]: Failed password for invalid user ubuntu from 199.48.120.226 port 38390 ssh2
2024-07-28T11:45:37.552577+02:00 hz-vm-web-023 sshd[1323830]: Invalid user postgres from 199.48.120.226 port 51869
2024-07-28T11:45:37.554704+02:00 hz-vm-web-023 sshd[1323830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.48.120.226
2024-07-28T11:45:38.942112+02:00 hz-vm-web-023 sshd[1323830]: Failed password for invalid user postgres from 199.48.120.226 port 51869 ssh2 show less
Jul 28 08:33:24 v22019095806697148 sshd[2837347]: Failed password for invalid user odoo from 199.48. ... show moreJul 28 08:33:24 v22019095806697148 sshd[2837347]: Failed password for invalid user odoo from 199.48.120.226 port 26751 ssh2
Jul 28 08:40:01 v22019095806697148 sshd[2837470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.48.120.226 user=root
Jul 28 08:40:03 v22019095806697148 sshd[2837470]: Failed password for root from 199.48.120.226 port 6666 ssh2
... cvbnet show less