AbuseIPDB » 117.50.99.38
Check an IP Address, Domain Name, or Subnet
e.g. 3.232.129.123, microsoft.com, or 5.188.10.0/24
117.50.99.38 was found in our database!
This IP was reported 191 times. Confidence of Abuse is 100%: ?
100%
ISP | Shanghai UCloud Information Technology Company Limited |
---|---|
Usage Type | Data Center/Web Hosting/Transit |
Domain Name | ucloud.cn |
Country |
![]() |
City | Shanghai, Shanghai |
IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.
IP Abuse Reports for 117.50.99.38:
This IP address has been reported a total of 191 times from 61 distinct sources. 117.50.99.38 was first reported on , and the most recent report was .
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Reporter | Date | Comment | Categories | |
---|---|---|---|---|
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
Anonymous |
(sshd) Failed SSH login from 117.50.99.38 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction ... show more(sshd) Failed SSH login from 117.50.99.38 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 2 13:46:06 optimus sshd[29770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root
Mar 2 13:46:08 optimus sshd[29770]: Failed password for root from 117.50.99.38 port 42046 ssh2 Mar 2 14:03:22 optimus sshd[1664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root Mar 2 14:03:24 optimus sshd[1664]: Failed password for root from 117.50.99.38 port 56452 ssh2 Mar 2 14:20:33 optimus sshd[6217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root show less |
Brute-Force | ||
Anonymous |
(sshd) Failed SSH login from 117.50.99.38 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction ... show more(sshd) Failed SSH login from 117.50.99.38 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 2 06:30:01 optimus sshd[9848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root
Mar 2 06:30:03 optimus sshd[9848]: Failed password for root from 117.50.99.38 port 36134 ssh2 Mar 2 06:50:26 optimus sshd[19050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root Mar 2 06:50:29 optimus sshd[19050]: Failed password for root from 117.50.99.38 port 50544 ssh2 Mar 2 07:11:27 optimus sshd[23954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root show less |
Brute-Force | ||
Anonymous |
(sshd) Failed SSH login from 117.50.99.38 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction ... show more(sshd) Failed SSH login from 117.50.99.38 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 2 00:16:50 optimus sshd[32218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root
Mar 2 00:16:52 optimus sshd[32218]: Failed password for root from 117.50.99.38 port 59068 ssh2 Mar 2 00:37:52 optimus sshd[5494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root Mar 2 00:37:54 optimus sshd[5494]: Failed password for root from 117.50.99.38 port 45246 ssh2 Mar 2 00:58:42 optimus sshd[11657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=root show less |
Brute-Force | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking | ||
![]() |
Mar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreMar 1 04:04:28 h2022099 sshd[23461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r
Mar 1 04:04:31 h2022099 sshd[23461]: Failed password for r.r from 117.50.99.38 port 53784 ssh2 Mar 1 04:04:31 h2022099 sshd[23461]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:13:40 h2022099 sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:13:42 h2022099 sshd[1345]: Failed password for r.r from 117.50.99.38 port 57676 ssh2 Mar 1 05:13:42 h2022099 sshd[1345]: Received disconnect from 117.50.99.38: 11: Bye Bye [preauth] Mar 1 05:29:46 h2022099 sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.38 user=r.r Mar 1 05:29:48 h2022099 sshd[3530]: Failed password for r.r from 117.50.99.38 port 34962 ssh2 Mar 1 05:29:49 h2022099 sshd[3530]: Received disconnect........ ------------------------------- show less |
FTP Brute-Force Hacking |
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩