This IP address has been reported a total of 962
times from 240 distinct
sources.
209.141.48.150 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jul 23 16:53:43 dev sshd[3226722]: Failed password for invalid user guest from 209.141.48.150 port 6 ... show moreJul 23 16:53:43 dev sshd[3226722]: Failed password for invalid user guest from 209.141.48.150 port 60896 ssh2
Jul 23 16:56:55 dev sshd[3226814]: Invalid user ubuntuftp from 209.141.48.150 port 56602
Jul 23 16:56:55 dev sshd[3226814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.48.150
Jul 23 16:56:57 dev sshd[3226814]: Failed password for invalid user ubuntuftp from 209.141.48.150 port 56602 ssh2
Jul 23 16:58:18 dev sshd[3226865]: Invalid user test from 209.141.48.150 port 57988
... show less
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 209.141.48.150 (US/United States/-): 5 in the last 3600 secs; Ports: *; ... show more(sshd) Failed SSH login from 209.141.48.150 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 23 11:55:22 server4 sshd[440]: Invalid user guest from 209.141.48.150
Jul 23 11:55:22 server4 sshd[440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.48.150
Jul 23 11:55:24 server4 sshd[440]: Failed password for invalid user guest from 209.141.48.150 port 49902 ssh2
Jul 23 11:57:16 server4 sshd[760]: Invalid user ubuntuftp from 209.141.48.150
Jul 23 11:57:16 server4 sshd[760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.48.150 show less
Jul 23 17:10:28 servidor1 sshd[1923895]: Invalid user mohamad from 209.141.48.150 port 39580
J ... show moreJul 23 17:10:28 servidor1 sshd[1923895]: Invalid user mohamad from 209.141.48.150 port 39580
Jul 23 17:10:28 servidor1 sshd[1923895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.48.150
Jul 23 17:10:31 servidor1 sshd[1923895]: Failed password for invalid user mohamad from 209.141.48.150 port 39580 ssh2
Jul 23 17:11:49 servidor1 sshd[1924067]: Invalid user testing from 209.141.48.150 port 38706
Jul 23 17:11:49 servidor1 sshd[1924067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.48.150
Jul 23 17:11:51 servidor1 sshd[1924067]: Failed password for invalid user testing from 209.141.48.150 port 38706 ssh2
Jul 23 17:13:03 servidor1 sshd[1924119]: User mysql from 209.141.48.150 not allowed because not listed in AllowUsers
... show less
Brute-ForceSSH
Anonymous
Jul 23 16:15:41 orcaccio sshd[77868]: Invalid user admin from 209.141.48.150 port 39602
Jul 23 ... show moreJul 23 16:15:41 orcaccio sshd[77868]: Invalid user admin from 209.141.48.150 port 39602
Jul 23 16:18:30 orcaccio sshd[77877]: Invalid user testserver from 209.141.48.150 port 48122
... show less
Jul 23 13:10:36 server sshd[987774]: Invalid user admin from 209.141.48.150 port 42026
Jul 23 ... show moreJul 23 13:10:36 server sshd[987774]: Invalid user admin from 209.141.48.150 port 42026
Jul 23 13:10:36 server sshd[987774]: Disconnected from invalid user admin 209.141.48.150 port 42026 [preauth]
... show less
Jul 23 13:26:21 coffeelake sshd[1052925]: Invalid user ubuntu from 209.141.48.150 port 55728
J ... show moreJul 23 13:26:21 coffeelake sshd[1052925]: Invalid user ubuntu from 209.141.48.150 port 55728
Jul 23 13:30:25 coffeelake sshd[1062344]: Invalid user admin from 209.141.48.150 port 49806
Jul 23 13:32:24 coffeelake sshd[1066903]: Invalid user ubuntu from 209.141.48.150 port 45584
Jul 23 13:34:28 coffeelake sshd[1071750]: Invalid user test from 209.141.48.150 port 42996
Jul 23 13:35:25 coffeelake sshd[1074233]: Invalid user testing from 209.141.48.150 port 50230
... show less