This IP address has been reported a total of 29,523
times from 1,628 distinct
sources.
61.220.44.44 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Sep 30 23:05:56 wels sshd[3763945]: Disconnected from authenticating user root 61.220.44.44 port 390 ... show moreSep 30 23:05:56 wels sshd[3763945]: Disconnected from authenticating user root 61.220.44.44 port 39033 [preauth]
Sep 30 23:11:37 wels sshd[3764169]: Disconnected from authenticating user git 61.220.44.44 port 55389 [preauth]
Sep 30 23:14:20 wels sshd[3764269]: Disconnected from authenticating user root 61.220.44.44 port 38486 [preauth]
... show less
Sep 30 20:33:17 portainer sshd[1493318]: Failed password for root from 61.220.44.44 port 33309 ssh2< ... show moreSep 30 20:33:17 portainer sshd[1493318]: Failed password for root from 61.220.44.44 port 33309 ssh2
Sep 30 20:40:48 portainer sshd[1493953]: Invalid user r00t from 61.220.44.44 port 57051
... show less
Sep 30 22:03:21 netcup-ubuntu sshd[408343]: Invalid user info from 61.220.44.44 port 59845
Sep ... show moreSep 30 22:03:21 netcup-ubuntu sshd[408343]: Invalid user info from 61.220.44.44 port 59845
Sep 30 22:06:19 netcup-ubuntu sshd[408451]: Invalid user .test from 61.220.44.44 port 48726
Sep 30 22:09:16 netcup-ubuntu sshd[408561]: Invalid user edu from 61.220.44.44 port 37391
Sep 30 22:12:08 netcup-ubuntu sshd[408661]: Invalid user mongo from 61.220.44.44 port 52858
... show less
Sep 30 21:00:00 Servo sshd[583601]: Invalid user ubuntu from 61.220.44.44 port 45024
Sep 30 21 ... show moreSep 30 21:00:00 Servo sshd[583601]: Invalid user ubuntu from 61.220.44.44 port 45024
Sep 30 21:08:45 Servo sshd[587799]: Invalid user spring from 61.220.44.44 port 34998
Sep 30 21:20:15 Servo sshd[593597]: Invalid user wacos from 61.220.44.44 port 36704
... show less
Sep 30 20:57:21 raspberrypi sshd[27917]: Invalid user ubuntu from 61.220.44.44 port 41038
Sep ... show moreSep 30 20:57:21 raspberrypi sshd[27917]: Invalid user ubuntu from 61.220.44.44 port 41038
Sep 30 20:57:21 raspberrypi sshd[27917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.220.44.44
Sep 30 20:57:22 raspberrypi sshd[27917]: Failed password for invalid user ubuntu from 61.220.44.44 port 41038 ssh2
... show less
Report 732134 with IP 483530 for SSH brute-force attack by source 1307257 via ssh-honeypot/0.2.0+htt ... show moreReport 732134 with IP 483530 for SSH brute-force attack by source 1307257 via ssh-honeypot/0.2.0+http show less
Sep 30 17:14:18 vps-d7931dc8 sshd[507724]: Failed password for invalid user yanglin from 61.220.44.4 ... show moreSep 30 17:14:18 vps-d7931dc8 sshd[507724]: Failed password for invalid user yanglin from 61.220.44.44 port 53700 ssh2
Sep 30 17:14:18 vps-d7931dc8 sshd[507724]: Disconnected from invalid user yanglin 61.220.44.44 port 53700 [preauth]
Sep 30 17:17:04 vps-d7931dc8 sshd[507741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.220.44.44 user=root
Sep 30 17:17:06 vps-d7931dc8 sshd[507741]: Failed password for root from 61.220.44.44 port 35785 ssh2
Sep 30 17:17:07 vps-d7931dc8 sshd[507741]: Disconnected from authenticating user root 61.220.44.44 port 35785 [preauth] show less