e.g. 44.200.171.156, microsoft.com, or 5.188.10.0/24
104.29.50.73 was found in our database!
This IP was reported 530 times. Confidence of Abuse is 0%: ?
0%
ISP
CloudFlare Inc.
Usage Type
Content Delivery Network
Domain Name
cloudflare.com
Country
United States of America
City
San Jose, California
IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.
Important Note: 104.29.50.73 is an IP address from within our whitelist. Whitelisted netblocks are typically owned by trusted entities, such as Google or Microsoft who may use them for search engine spiders. However, these same entities sometimes also provide cloud servers and mail services which are easily abused. Pay special attention when trusting or distrusting these IPs.
According to our records, this IP belongs to the subnet 104.16.0.0/12, identified as: "Cloudflare Reverse Proxy"
This IP address has been reported a total of 530 times from 210 distinct sources.
104.29.50.73 was first reported on , and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
SSH login attempts (SSH bruteforce attack). For more information, or to report interesting/incorrect ... show moreSSH login attempts (SSH bruteforce attack). For more information, or to report interesting/incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
DATE:2023-02-21 14:39:36, IP:104.29.50.73, PORT:ssh SSH brute force auth on honeypot server (epe-hon ... show moreDATE:2023-02-21 14:39:36, IP:104.29.50.73, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq) show less
(sshd) Failed SSH login from 104.29.50.73 (US/United States/-): 5 in the last 3600 secs; Ports: *; D ... show more(sshd) Failed SSH login from 104.29.50.73 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Feb 21 07:21:18 16175 sshd[20227]: Invalid user admin from 104.29.50.73 port 43292
Feb 21 07:21:21 16175 sshd[20227]: Failed password for invalid user admin from 104.29.50.73 port 43292 ssh2
Feb 21 07:24:55 16175 sshd[20466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73 user=root
Feb 21 07:24:57 16175 sshd[20466]: Failed password for root from 104.29.50.73 port 50778 ssh2
Feb 21 07:26:42 16175 sshd[20597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73 user=root show less
2023-02-21T20:55:26.186080+11:00 sshd[886192]: pam_unix(sshd:auth): authentication failure; logname ... show more2023-02-21T20:55:26.186080+11:00 sshd[886192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73
2023-02-21T20:55:28.556155+11:00 sshd[886192]: Failed password for invalid user testuser from 104.29.50.73 port 44836 ssh2
... show less
Feb 21 10:31:13 odin sshd[4462]: Failed password for root from 104.29.50.73 port 55268 ssh2
Fe ... show moreFeb 21 10:31:13 odin sshd[4462]: Failed password for root from 104.29.50.73 port 55268 ssh2
Feb 21 10:32:52 odin sshd[4550]: Failed password for root from 104.29.50.73 port 57052 ssh2 show less
Feb 21 10:13:12 odin sshd[461]: Failed password for root from 104.29.50.73 port 35560 ssh2
Feb ... show moreFeb 21 10:13:12 odin sshd[461]: Failed password for root from 104.29.50.73 port 35560 ssh2
Feb 21 10:14:51 odin sshd[588]: Failed password for root from 104.29.50.73 port 37444 ssh2 show less
(sshd) Failed SSH login from 104.29.50.73 (US/United States/-): 5 in the last 3600 secs; Ports: *; D ... show more(sshd) Failed SSH login from 104.29.50.73 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Feb 21 03:08:36 13908 sshd[29162]: Invalid user oracle from 104.29.50.73 port 60726
Feb 21 03:08:38 13908 sshd[29162]: Failed password for invalid user oracle from 104.29.50.73 port 60726 ssh2
Feb 21 03:13:34 13908 sshd[29599]: Invalid user admin from 104.29.50.73 port 37870
Feb 21 03:13:36 13908 sshd[29599]: Failed password for invalid user admin from 104.29.50.73 port 37870 ssh2
Feb 21 03:20:08 13908 sshd[30165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73 user=root show less
Feb 21 09:52:26 odin sshd[28434]: Failed password for root from 104.29.50.73 port 46542 ssh2
F ... show moreFeb 21 09:52:26 odin sshd[28434]: Failed password for root from 104.29.50.73 port 46542 ssh2
Feb 21 09:58:16 odin sshd[29482]: Failed password for root from 104.29.50.73 port 47738 ssh2 show less
Feb 21 09:14:03 fogg sshd[3844650]: Failed password for root from 104.29.50.73 port 35060 ssh2 ... show moreFeb 21 09:14:03 fogg sshd[3844650]: Failed password for root from 104.29.50.73 port 35060 ssh2
Feb 21 09:15:59 fogg sshd[3848122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73 user=root
Feb 21 09:16:01 fogg sshd[3848122]: Failed password for root from 104.29.50.73 port 40158 ssh2
... show less
Feb 21 08:28:04 server sshd[1980565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreFeb 21 08:28:04 server sshd[1980565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73 user=root
Feb 21 08:28:06 server sshd[1980565]: Failed password for root from 104.29.50.73 port 58536 ssh2
Feb 21 08:29:45 server sshd[1981126]: Invalid user user2 from 104.29.50.73 port 33866
Feb 21 08:29:45 server sshd[1981126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73
Feb 21 08:29:47 server sshd[1981126]: Failed password for invalid user user2 from 104.29.50.73 port 33866 ssh2
... show less
Feb 21 05:44:02 localhost sshd[385985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreFeb 21 05:44:02 localhost sshd[385985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73 user=root
Feb 21 05:44:04 localhost sshd[385985]: Failed password for root from 104.29.50.73 port 40492 ssh2
Feb 21 05:49:18 localhost sshd[386009]: Invalid user admin from 104.29.50.73 port 56482
Feb 21 05:49:18 localhost sshd[386009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.29.50.73
Feb 21 05:49:20 localhost sshd[386009]: Failed password for invalid user admin from 104.29.50.73 port 56482 ssh2
... show less