This IP address has been reported a total of 264
times from 135 distinct
sources.
36.138.80.52 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 4 15:52:56 localhost sshd[2673016]: Failed password for invalid user admin from 36.138.80.52 po ... show moreDec 4 15:52:56 localhost sshd[2673016]: Failed password for invalid user admin from 36.138.80.52 port 13314 ssh2
Dec 4 15:54:02 localhost sshd[2673021]: Invalid user default from 36.138.80.52 port 4602
Dec 4 15:54:03 localhost sshd[2673021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
Dec 4 15:54:04 localhost sshd[2673021]: Failed password for invalid user default from 36.138.80.52 port 4602 ssh2
Dec 4 15:56:01 localhost sshd[2673110]: Invalid user user from 36.138.80.52 port 58282
... show less
2023-12-04T11:25:50.272177vps-331c9132.vps.ovh.us sshd[420208]: Failed password for invalid user ans ... show more2023-12-04T11:25:50.272177vps-331c9132.vps.ovh.us sshd[420208]: Failed password for invalid user ansible from 36.138.80.52 port 41130 ssh2
2023-12-04T11:27:59.849492vps-331c9132.vps.ovh.us sshd[420223]: Invalid user default from 36.138.80.52 port 65510
2023-12-04T11:28:00.148203vps-331c9132.vps.ovh.us sshd[420223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
2023-12-04T11:28:01.538935vps-331c9132.vps.ovh.us sshd[420223]: Failed password for invalid user default from 36.138.80.52 port 65510 ssh2
2023-12-04T11:28:36.213146vps-331c9132.vps.ovh.us sshd[420226]: Invalid user minecraft from 36.138.80.52 port 40050
... show less
Dec 3 18:31:17 alpha sshd[46461]: Failed password for invalid user oracle from 36.138.80.52 port 50 ... show moreDec 3 18:31:17 alpha sshd[46461]: Failed password for invalid user oracle from 36.138.80.52 port 50404 ssh2
Dec 3 18:32:06 alpha sshd[46885]: Invalid user esuser from 36.138.80.52 port 6996
Dec 3 18:32:06 alpha sshd[46885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
Dec 3 18:32:07 alpha sshd[46885]: Failed password for invalid user esuser from 36.138.80.52 port 6996 ssh2
Dec 3 18:32:59 alpha sshd[47326]: Invalid user nagiosuser from 36.138.80.52 port 11006
... show less
SSH Brute force: 6 attempts were recorded from 36.138.80.52
2023-12-03T18:13:13+01:00 Invalid ... show moreSSH Brute force: 6 attempts were recorded from 36.138.80.52
2023-12-03T18:13:13+01:00 Invalid user admin from 36.138.80.52 port 41150
2023-12-03T18:14:22+01:00 Invalid user default from 36.138.80.52 port 22494
2023-12-03T18:15:11+01:00 Invalid user minecraft from 36.138.80.52 port 37858
2023-12-03T18:15:36+01:00 Invalid user mcserver from 36.138.80.52 port 19734
2023-12-03T18:16:25+01:00 Invalid user test from 36.138.80.52 port 41696
2023-12-03T18:20:02+01:00 Connection closed by authenticating user root 36.138.80.52 port 8326 [preauth] show less
2023-12-03T12:39:41.734236ee-nginx-elbernabeu sshd[10499]: Invalid user admin from 36.138.80.52 port ... show more2023-12-03T12:39:41.734236ee-nginx-elbernabeu sshd[10499]: Invalid user admin from 36.138.80.52 port 34388
2023-12-03T12:40:31.713161ee-nginx-elbernabeu sshd[10562]: Invalid user fa from 36.138.80.52 port 44506
2023-12-03T12:40:36.831388ee-nginx-elbernabeu sshd[10570]: Invalid user default from 36.138.80.52 port 56340
... show less
(sshd) Failed SSH login from 36.138.80.52 (CN/China/-)
Brute-ForceSSH
Anonymous
Dec 2 22:35:51 C1D543E sshd[95781]: Invalid user default from 36.138.80.52 port 43046
Dec 2 ... show moreDec 2 22:35:51 C1D543E sshd[95781]: Invalid user default from 36.138.80.52 port 43046
Dec 2 22:35:51 C1D543E sshd[95781]: Failed password for invalid user default from 36.138.80.52 port 43046 ssh2
Dec 2 22:36:39 C1D543E sshd[95812]: Invalid user minecraft from 36.138.80.52 port 40772
Dec 2 22:36:39 C1D543E sshd[95812]: Failed password for invalid user minecraft from 36.138.80.52 port 40772 ssh2
Dec 2 22:37:27 C1D543E sshd[95826]: Invalid user user from 36.138.80.52 port 44696
... show less
2023-12-02T19:10:46.173118 localhost.localdomain sshd[389053]: Invalid user devops from 36.138.80.52 ... show more2023-12-02T19:10:46.173118 localhost.localdomain sshd[389053]: Invalid user devops from 36.138.80.52 port 27660
2023-12-02T19:10:46.435292 localhost.localdomain sshd[389053]: Failed password for invalid user devops from 36.138.80.52 port 27660 ssh2
2023-12-02T19:11:38.458588 localhost.localdomain sshd[389058]: Invalid user admin from 36.138.80.52 port 25492
2023-12-02T19:11:38.723050 localhost.localdomain sshd[389058]: Failed password for invalid user admin from 36.138.80.52 port 25492 ssh2
2023-12-02T19:13:44.087232 localhost.localdomain sshd[389066]: Invalid user minecraft from 36.138.80.52 port 49510
... show less
SSH Brute force: 12 attempts were recorded from 36.138.80.52
2023-12-02T09:22:14+01:00 Invalid ... show moreSSH Brute force: 12 attempts were recorded from 36.138.80.52
2023-12-02T09:22:14+01:00 Invalid user moxa from 36.138.80.52 port 28222
2023-12-02T09:22:35+01:00 Invalid user fa from 36.138.80.52 port 16256
2023-12-02T09:24:28+01:00 Invalid user mc from 36.138.80.52 port 59422
2023-12-02T09:24:48+01:00 Invalid user guest from 36.138.80.52 port 52716
2023-12-02T09:25:07+01:00 Connection closed by authenticating user root 36.138.80.52 port 46342 [preauth]
2023-12-02T09:25:30+01:00 Connection closed by authenticating user root 36.138.80.52 port 28168 [preauth]
2023-12-02T09:25:48+01:00 Connection closed by authenticating user root 36.138.80.52 port 26986 [preauth]
2023-12-02T09:26:25+01:00 Connection closed by authenticating user root 36.138.80.52 port 49376 [preauth]
2023-12-02T09:27:16+01:00 Connection closed by authenticating user root 36.138.80.52 port 59870 [preauth]
2023-12-02T09:28:14+ show less