This IP address has been reported a total of 14,749
times from 1,307 distinct
sources.
204.48.28.55 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Sep 13 00:29:41 botzung sshd[103145]: Failed password for invalid user debian from 204.48.28.55 port ... show moreSep 13 00:29:41 botzung sshd[103145]: Failed password for invalid user debian from 204.48.28.55 port 54982 ssh2
Sep 13 00:33:59 botzung sshd[103177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=root
Sep 13 00:34:02 botzung sshd[103177]: Failed password for root from 204.48.28.55 port 57848 ssh2
... show less
Sep 12 16:12:18 wise0wl sshd[206678]: Invalid user dev from 204.48.28.55 port 35290
Sep 12 16: ... show moreSep 12 16:12:18 wise0wl sshd[206678]: Invalid user dev from 204.48.28.55 port 35290
Sep 12 16:14:10 wise0wl sshd[208156]: Invalid user user from 204.48.28.55 port 40830
Sep 12 16:14:45 wise0wl sshd[208758]: Invalid user deploy from 204.48.28.55 port 54750
... show less
Sep 12 22:11:52 jumphost sshd[684795]: User root from 204.48.28.55 not allowed because none of user& ... show moreSep 12 22:11:52 jumphost sshd[684795]: User root from 204.48.28.55 not allowed because none of user's groups are listed in AllowGroups
Sep 12 22:12:47 jumphost sshd[684835]: Invalid user dev from 204.48.28.55 port 41758
Sep 12 22:13:24 jumphost sshd[684868]: User root from 204.48.28.55 not allowed because none of user's groups are listed in AllowGroups
... show less
2024-09-12T21:40:16.916481Alesmola sshd[457064]: Invalid user akamai from 204.48.28.55 port 45224<br ... show more2024-09-12T21:40:16.916481Alesmola sshd[457064]: Invalid user akamai from 204.48.28.55 port 45224
... show less
Sep 12 22:30:24 dev sshd[1327789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreSep 12 22:30:24 dev sshd[1327789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55 user=root
Sep 12 22:30:26 dev sshd[1327789]: Failed password for root from 204.48.28.55 port 41680 ssh2 show less
2024-09-12T21:19:35.035524+02:00 hz-vm-web-026 sshd[3406223]: pam_unix(sshd:auth): authentication fa ... show more2024-09-12T21:19:35.035524+02:00 hz-vm-web-026 sshd[3406223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55
2024-09-12T21:19:37.396256+02:00 hz-vm-web-026 sshd[3406223]: Failed password for invalid user admin from 204.48.28.55 port 56988 ssh2
2024-09-12T21:20:12.531189+02:00 hz-vm-web-026 sshd[3407564]: Invalid user admin from 204.48.28.55 port 42682
2024-09-12T21:20:12.532766+02:00 hz-vm-web-026 sshd[3407564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55
2024-09-12T21:20:14.637989+02:00 hz-vm-web-026 sshd[3407564]: Failed password for invalid user admin from 204.48.28.55 port 42682 ssh2 show less
Sep 12 22:07:00 dev sshd[1327429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreSep 12 22:07:00 dev sshd[1327429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.28.55
Sep 12 22:07:01 dev sshd[1327429]: Failed password for invalid user jonas from 204.48.28.55 port 38044 ssh2 show less
Sep 12 20:42:31 mail010 sshd[1014805]: Invalid user odoo15 from 204.48.28.55 port 36412
Sep 12 ... show moreSep 12 20:42:31 mail010 sshd[1014805]: Invalid user odoo15 from 204.48.28.55 port 36412
Sep 12 20:44:38 mail010 sshd[1014840]: Invalid user oracle from 204.48.28.55 port 59700
Sep 12 20:46:37 mail010 sshd[1014888]: Invalid user charles from 204.48.28.55 port 56170
Sep 12 20:47:15 mail010 sshd[1014907]: Invalid user ansible from 204.48.28.55 port 39376
... show less