This IP address has been reported a total of 6,736
times from 959 distinct
sources.
20.49.48.81 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2023-08-16T01:58:23+02:00 exit-2 sshd[1700745]: Failed password for root from 20.49.48.81 port 13323 ... show more2023-08-16T01:58:23+02:00 exit-2 sshd[1700745]: Failed password for root from 20.49.48.81 port 13323 ssh2
2023-08-16T01:59:17+02:00 exit-2 sshd[1700759]: Invalid user temp123 from 20.49.48.81 port 19965
2023-08-16T01:59:17+02:00 exit-2 sshd[1700759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.48.81
2023-08-16T01:59:19+02:00 exit-2 sshd[1700759]: Failed password for invalid user temp123 from 20.49.48.81 port 19965 ssh2
... show less
2023-09-29T17:03:46.680320+02:00 hosting11 sshd[364793]: Invalid user vaibhav from 20.49.48.81 port ... show more2023-09-29T17:03:46.680320+02:00 hosting11 sshd[364793]: Invalid user vaibhav from 20.49.48.81 port 7636
2023-09-29T17:03:46.688885+02:00 hosting11 sshd[364793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.48.81
2023-09-29T17:03:48.462009+02:00 hosting11 sshd[364793]: Failed password for invalid user vaibhav from 20.49.48.81 port 7636 ssh2
2023-09-29T17:05:11.798592+02:00 hosting11 sshd[364822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.48.81 user=root
2023-09-29T17:05:13.571802+02:00 hosting11 sshd[364822]: Failed password for root from 20.49.48.81 port 20775 ssh2
... show less
2023-09-29T23:01:32.834120+09:00 NRT-JP sshd[452104]: Invalid user ftpuser from 20.49.48.81 port 437 ... show more2023-09-29T23:01:32.834120+09:00 NRT-JP sshd[452104]: Invalid user ftpuser from 20.49.48.81 port 43793
2023-09-29T23:10:18.997266+09:00 NRT-JP sshd[452149]: Invalid user donghang from 20.49.48.81 port 28681
2023-09-29T23:16:36.962441+09:00 NRT-JP sshd[452262]: Invalid user soksuser from 20.49.48.81 port 43711
... show less
Port ScanBrute-ForceSSH
Anonymous
2023-09-29T16:06:00+02:00 exit-2 sshd[213251]: pam_unix(sshd:auth): authentication failure; logname= ... show more2023-09-29T16:06:00+02:00 exit-2 sshd[213251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.48.81 user=root
2023-09-29T16:06:02+02:00 exit-2 sshd[213251]: Failed password for root from 20.49.48.81 port 56458 ssh2
2023-09-29T16:07:20+02:00 exit-2 sshd[213262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.48.81 user=root
2023-09-29T16:07:23+02:00 exit-2 sshd[213262]: Failed password for root from 20.49.48.81 port 49104 ssh2
... show less
Sep 29 10:06:47 Proxmox-VE sshd[2013513]: Connection from 20.49.48.81 port 6825 on 49.12.130.31 port ... show moreSep 29 10:06:47 Proxmox-VE sshd[2013513]: Connection from 20.49.48.81 port 6825 on 49.12.130.31 port 22 rdomain ""
Sep 29 10:06:48 Proxmox-VE sshd[2013513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.48.81 user=root
Sep 29 10:06:50 Proxmox-VE sshd[2013513]: Failed password for root from 20.49.48.81 port 6825 ssh2
... show less