e.g. 3.238.250.73, microsoft.com, or 5.188.10.0/24
104.28.201.75 was found in our database!
This IP was reported 489 times. Confidence of Abuse
is 0%: ?
0%
ISP
CloudFlare Inc.
Usage Type
Content Delivery Network
Domain Name
cloudflare.com
Country
United States of America
City
San Jose, California
IP info including ISP, Usage Type, and Location provided
by IP2Location. Updated monthly.
Important Note: 104.28.201.75 is an IP address from within
our whitelist. Whitelisted netblocks are typically owned by trusted entities, such as Google
or Microsoft who may use them for search engine spiders. However, these same entities
sometimes also provide cloud servers and mail services which are easily abused. Pay special
attention when trusting or distrusting these IPs.
According to our records, this IP belongs to the subnet 104.16.0.0/12,
identified as: "Cloudflare Reverse Proxy"
This IP address has been reported a total of 489
times from 187 distinct
sources.
104.28.201.75 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Feb 15 07:52:28 gw01.dial-in-auth.srvfarm.net sshd[1034333]: Disconnected from invalid user pongsiri ... show moreFeb 15 07:52:28 gw01.dial-in-auth.srvfarm.net sshd[1034333]: Disconnected from invalid user pongsiri 104.28.201.75 port 47831 [preauth]
Feb 15 07:59:58 gw01.dial-in-auth.srvfarm.net sshd[1035262]: Invalid user lw from 104.28.201.75 port 24648
Feb 15 07:59:58 gw01.dial-in-auth.srvfarm.net sshd[1035262]: Disconnected from invalid user lw 104.28.201.75 port 24648 [preauth]
Feb 15 08:05:49 gw01.dial-in-auth.srvfarm.net sshd[1036002]: Invalid user oracle from 104.28.201.75 port 13263
Feb 15 08:05:49 gw01.dial-in-auth.srvfarm.net sshd[1036002]: Disconnected from invalid user oracle 104.28.201.75 port 13263 [preauth] show less
Feb 15 07:52:28 gw01.dial-in-auth.srvfarm.net sshd[1034333]: Disconnected from invalid user pongsiri ... show moreFeb 15 07:52:28 gw01.dial-in-auth.srvfarm.net sshd[1034333]: Disconnected from invalid user pongsiri 104.28.201.75 port 47831 [preauth]
Feb 15 07:59:58 gw01.dial-in-auth.srvfarm.net sshd[1035262]: Invalid user lw from 104.28.201.75 port 24648
Feb 15 07:59:58 gw01.dial-in-auth.srvfarm.net sshd[1035262]: Disconnected from invalid user lw 104.28.201.75 port 24648 [preauth]
Feb 15 08:05:49 gw01.dial-in-auth.srvfarm.net sshd[1036002]: Invalid user oracle from 104.28.201.75 port 13263
Feb 15 08:05:49 gw01.dial-in-auth.srvfarm.net sshd[1036002]: Disconnected from invalid user oracle 104.28.201.75 port 13263 [preauth] show less
SSH login attempts (SSH bruteforce attack). For more information, or to report interesting/incorrect ... show moreSSH login attempts (SSH bruteforce attack). For more information, or to report interesting/incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
DATE:2023-02-21 14:25:38, IP:104.28.201.75, PORT:ssh SSH brute force auth on honeypot server (epe-ho ... show moreDATE:2023-02-21 14:25:38, IP:104.28.201.75, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq) show less
2023-02-21T21:02:17.993508+11:00 sshd[886257]: pam_unix(sshd:auth): authentication failure; logname ... show more2023-02-21T21:02:17.993508+11:00 sshd[886257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.28.201.75
2023-02-21T21:02:19.786471+11:00 sshd[886257]: Failed password for invalid user db2fenc2 from 104.28.201.75 port 10145 ssh2
... show less
Feb 21 08:53:31 fogg sshd[3809317]: Failed password for root from 104.28.201.75 port 18196 ssh2<br / ... show moreFeb 21 08:53:31 fogg sshd[3809317]: Failed password for root from 104.28.201.75 port 18196 ssh2
Feb 21 08:55:21 fogg sshd[3812529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.28.201.75 user=root
Feb 21 08:55:23 fogg sshd[3812529]: Failed password for root from 104.28.201.75 port 54249 ssh2
... show less
Feb 21 05:37:02 localhost sshd[385946]: Failed password for root from 104.28.201.75 port 50900 ssh2< ... show moreFeb 21 05:37:02 localhost sshd[385946]: Failed password for root from 104.28.201.75 port 50900 ssh2
Feb 21 05:52:55 localhost sshd[386057]: Invalid user wordpress from 104.28.201.75 port 19189
Feb 21 05:52:55 localhost sshd[386057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.28.201.75
Feb 21 05:52:57 localhost sshd[386057]: Failed password for invalid user wordpress from 104.28.201.75 port 19189 ssh2
Feb 21 05:58:34 localhost sshd[386196]: Invalid user ftpuser from 104.28.201.75 port 55413
... show less