Loading IP search...
A type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords (often from a data breach), and then uses the credentials to gain unauthorized access to user accounts on other systems through large-scale automated login requests directed against a web application.
Port / Service: 22
Protocol: TCP
Sensor Count: 3
Hits: 1,172,033
Last Seen: 2026-03-12T10:08:24.042Z
Port / Service: 2222
Protocol: TCP
Sensor Count: 3
Hits: 195,344
Last Seen: 2026-03-12T10:08:23.834Z
Sensor Count: 2
Hits: 11
Last Seen:2026-03-11T22:36:34.607Z
Port: 22
Protocol: TCP
Service: ssh
| IP Address ▲ | Hits | First Seen (UTC) | Last Seen (UTC) |
|---|---|---|---|
| 192.248.48.50→ | 14 | 2025-03-20T13:31:27.415Z | 2025-03-25T23:25:07.400Z |
| 192.248.48.159→ | 567 | 2024-12-23T19:30:10.294Z | 2024-12-24T17:54:39.891Z |
| 192.248.48.189→ | 1,362 | 2024-10-25T12:53:37.407Z | 2024-10-27T18:31:39.135Z |
| 192.248.48.190→ | 319 | 2023-07-07T07:24:45.247Z | 2023-07-07T08:11:01.919Z |
Page 1 of 1