This IP address has been reported a total of 3,687
times from 823 distinct
sources.
204.48.28.55 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Reporter
IoA Timestamp
Comment
Categories
Anonymous
2023-11-29T12:41:04.840448scmdmz1 sshd[1273]: Failed password for root from 204.48.28.55 port 45912 ... show more2023-11-29T12:41:04.840448scmdmz1 sshd[1273]: Failed password for root from 204.48.28.55 port 45912 ssh2
2023-11-29T12:42:10.073430scmdmz1 sshd[1416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=root
2023-11-29T12:42:11.734028scmdmz1 sshd[1416]: Failed password for root from 204.48.28.55 port 45250 ssh2
... show less
Brute-ForceSSH
Anonymous
2023-11-29T12:28:33.164519scmdmz1 sshd[31820]: Failed password for root from 204.48.28.55 port 52444 ... show more2023-11-29T12:28:33.164519scmdmz1 sshd[31820]: Failed password for root from 204.48.28.55 port 52444 ssh2
2023-11-29T12:29:41.847716scmdmz1 sshd[31972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=root
2023-11-29T12:29:43.682551scmdmz1 sshd[31972]: Failed password for root from 204.48.28.55 port 59544 ssh2
... show less
Brute-ForceSSH
Anonymous
2023-11-29T12:15:40.854514scmdmz1 sshd[30109]: Failed password for root from 204.48.28.55 port 49546 ... show more2023-11-29T12:15:40.854514scmdmz1 sshd[30109]: Failed password for root from 204.48.28.55 port 49546 ssh2
2023-11-29T12:16:45.232633scmdmz1 sshd[30253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=root
2023-11-29T12:16:47.204482scmdmz1 sshd[30253]: Failed password for root from 204.48.28.55 port 37776 ssh2
... show less
Attempts to access SSH server with wrong credentials
SSH
Anonymous
5 failed SSH login attempts between Wed, 29 Nov 2023 10:06:47 +0100 and Wed, 29 Nov 2023 10:13:32 +0 ... show more5 failed SSH login attempts between Wed, 29 Nov 2023 10:06:47 +0100 and Wed, 29 Nov 2023 10:13:32 +0100, port 22. show less
2023-11-29T11:07:59.191716anubis.d-serv.eu sshd[10691]: Failed password for invalid user jeff from 2 ... show more2023-11-29T11:07:59.191716anubis.d-serv.eu sshd[10691]: Failed password for invalid user jeff from 204.48.28.55 port 41704 ssh2
2023-11-29T11:11:21.997603anubis.d-serv.eu sshd[20794]: Invalid user hp from 204.48.28.55 port 57298
2023-11-29T11:11:22.001349anubis.d-serv.eu sshd[20794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55
2023-11-29T11:11:24.059240anubis.d-serv.eu sshd[20794]: Failed password for invalid user hp from 204.48.28.55 port 57298 ssh2
2023-11-29T11:12:33.095506anubis.d-serv.eu sshd[10775]: Invalid user serv from 204.48.28.55 port 47626
... show less
Nov 29 13:07:57 freedb sshd[660576]: Failed password for invalid user user2 from 204.48.28.55 port 4 ... show moreNov 29 13:07:57 freedb sshd[660576]: Failed password for invalid user user2 from 204.48.28.55 port 42994 ssh2
Nov 29 13:09:07 freedb sshd[660666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=admin
Nov 29 13:09:09 freedb sshd[660666]: Failed password for admin from 204.48.28.55 port 60808 ssh2
Nov 29 13:10:19 freedb sshd[660695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=root
Nov 29 13:10:21 freedb sshd[660695]: Failed password for root from 204.48.28.55 port 38350 ssh2
... show less
Nov 29 08:37:22 vps sshd[22119]: Invalid user user2 from 204.48.28.55 port 53076
Nov 29 08:37: ... show moreNov 29 08:37:22 vps sshd[22119]: Invalid user user2 from 204.48.28.55 port 53076
Nov 29 08:37:22 vps sshd[22119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55
Nov 29 08:37:23 vps sshd[22119]: Failed password for invalid user user2 from 204.48.28.55 port 53076 ssh2
... show less
Nov 29 08:58:03 bla016-truserv-jhb1-001 sshd[1601522]: Failed password for invalid user ftpuser from ... show moreNov 29 08:58:03 bla016-truserv-jhb1-001 sshd[1601522]: Failed password for invalid user ftpuser from 204.48.28.55 port 43102 ssh2
Nov 29 08:59:10 bla016-truserv-jhb1-001 sshd[1602295]: Invalid user visitor from 204.48.28.55 port 47342
Nov 29 08:59:10 bla016-truserv-jhb1-001 sshd[1602295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55
Nov 29 08:59:11 bla016-truserv-jhb1-001 sshd[1602295]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=visitor
Nov 29 08:59:12 bla016-truserv-jhb1-001 sshd[1602295]: Failed password for invalid user visitor from 204.48.28.55 port 47342 ssh2
... show less
2023-11-29T14:29:07.934283mustar-kr-luna sshd[27183]: Invalid user minecraft1 from 204.48.28.55 port ... show more2023-11-29T14:29:07.934283mustar-kr-luna sshd[27183]: Invalid user minecraft1 from 204.48.28.55 port 41180
2023-11-29T14:35:03.574912mustar-kr-luna sshd[27959]: Invalid user steam from 204.48.28.55 port 40428
2023-11-29T14:36:08.562633mustar-kr-luna sshd[28362]: Invalid user mc0 from 204.48.28.55 port 38548
2023-11-29T14:37:12.665285mustar-kr-luna sshd[28423]: Invalid user mc01 from 204.48.28.55 port 41442
2023-11-29T14:38:22.224789mustar-kr-luna sshd[28534]: Invalid user mc01 from 204.48.28.55 port 49924
... show less
Nov 29 05:17:34 markkoudstaal sshd[1297199]: Failed password for root from 204.48.28.55 port 51140 s ... show moreNov 29 05:17:34 markkoudstaal sshd[1297199]: Failed password for root from 204.48.28.55 port 51140 ssh2
Nov 29 05:18:42 markkoudstaal sshd[1297379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=root
Nov 29 05:18:43 markkoudstaal sshd[1297379]: Failed password for root from 204.48.28.55 port 56568 ssh2
... show less