This IP address has been reported a total of 264
times from 135 distinct
sources.
36.138.80.52 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 25 01:58:22 worker-07 sshd[1889185]: Invalid user devops from 36.138.80.52 port 31192
Dec ... show moreDec 25 01:58:22 worker-07 sshd[1889185]: Invalid user devops from 36.138.80.52 port 31192
Dec 25 01:59:44 worker-07 sshd[1890063]: Invalid user moxa from 36.138.80.52 port 51008
Dec 25 01:59:50 worker-07 sshd[1890117]: Invalid user esuser from 36.138.80.52 port 63750
Dec 25 02:00:26 worker-07 sshd[1890473]: Invalid user default from 36.138.80.52 port 29380
Dec 25 02:00:43 worker-07 sshd[1890678]: Invalid user postgres from 36.138.80.52 port 23186
... show less
2023-12-25T01:56:08.466985+01:00 earnapp sshd[3722012]: Failed password for root from 36.138.80.52 p ... show more2023-12-25T01:56:08.466985+01:00 earnapp sshd[3722012]: Failed password for root from 36.138.80.52 port 13522 ssh2
2023-12-25T01:56:43.681017+01:00 earnapp sshd[3723186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52 user=root
2023-12-25T01:56:45.730109+01:00 earnapp sshd[3723186]: Failed password for root from 36.138.80.52 port 1878 ssh2
... show less
Dec 24 09:06:59 debian-gitlab sshd[3363515]: Invalid user nagios from 36.138.80.52 port 32554
... show moreDec 24 09:06:59 debian-gitlab sshd[3363515]: Invalid user nagios from 36.138.80.52 port 32554
Dec 24 09:07:38 debian-gitlab sshd[3363531]: Invalid user es from 36.138.80.52 port 56938
Dec 24 09:08:17 debian-gitlab sshd[3363550]: Invalid user fa from 36.138.80.52 port 28400
... show less
Dec 24 20:34:43 us04 sshd[705046]: Invalid user devops from 36.138.80.52 port 58604
Dec 24 20: ... show moreDec 24 20:34:43 us04 sshd[705046]: Invalid user devops from 36.138.80.52 port 58604
Dec 24 20:34:44 us04 sshd[705046]: Failed password for invalid user devops from 36.138.80.52 port 58604 ssh2
Dec 24 20:36:49 us04 sshd[705057]: Invalid user default from 36.138.80.52 port 12932
... show less
2023-12-24T06:53:09.267630-05:00 debian-8gb-ash-1 sshd[2572250]: Invalid user oracle from 36.138.80. ... show more2023-12-24T06:53:09.267630-05:00 debian-8gb-ash-1 sshd[2572250]: Invalid user oracle from 36.138.80.52 port 39582
... show less
2023-12-24T05:03:19.546687+01:00 earnapp sshd[2288582]: pam_unix(sshd:auth): authentication failure; ... show more2023-12-24T05:03:19.546687+01:00 earnapp sshd[2288582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
2023-12-24T05:03:21.063273+01:00 earnapp sshd[2288582]: Failed password for invalid user minecraft from 36.138.80.52 port 37962 ssh2
2023-12-24T05:03:55.435996+01:00 earnapp sshd[2288906]: Invalid user mc from 36.138.80.52 port 3858
... show less
2023-12-23T16:28:57.799293ee-nginx-elbernabeu sshd[8270]: Invalid user devops from 36.138.80.52 port ... show more2023-12-23T16:28:57.799293ee-nginx-elbernabeu sshd[8270]: Invalid user devops from 36.138.80.52 port 44060
2023-12-23T16:30:37.002051ee-nginx-elbernabeu sshd[8382]: Invalid user esuser from 36.138.80.52 port 32844
2023-12-23T16:30:46.158172ee-nginx-elbernabeu sshd[8420]: Invalid user fa from 36.138.80.52 port 56464
... show less
Brute-ForceSSH
Anonymous
The sucker tried to brute force my teeny tiny SSH server
2023-12-23T14:15:17.511969 mail2.akcurate.de sshd[218059]: Invalid user esuser from 36.138.80.52 por ... show more2023-12-23T14:15:17.511969 mail2.akcurate.de sshd[218059]: Invalid user esuser from 36.138.80.52 port 38044
2023-12-23T14:15:17.760566 mail2.akcurate.de sshd[218059]: Connection closed by invalid user esuser 36.138.80.52 port 38044 [preauth]
2023-12-23T14:15:19.386423 mail2.akcurate.de sshd[218061]: Invalid user fa from 36.138.80.52 port 44340
... show less
2023-12-23T11:34:06.117129vps-331c9132.vps.ovh.us sshd[1231742]: Failed password for invalid user an ... show more2023-12-23T11:34:06.117129vps-331c9132.vps.ovh.us sshd[1231742]: Failed password for invalid user ansible from 36.138.80.52 port 7976 ssh2
2023-12-23T11:36:29.813322vps-331c9132.vps.ovh.us sshd[1231751]: Invalid user nagiosuser from 36.138.80.52 port 15262
2023-12-23T11:36:30.109395vps-331c9132.vps.ovh.us sshd[1231751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
2023-12-23T11:36:31.937705vps-331c9132.vps.ovh.us sshd[1231751]: Failed password for invalid user nagiosuser from 36.138.80.52 port 15262 ssh2
2023-12-23T11:37:58.903733vps-331c9132.vps.ovh.us sshd[1231762]: Invalid user user from 36.138.80.52 port 50372
... show less
2023-12-23T10:10:58.291794+00:00 bluefire sshd[3463458]: pam_unix(sshd:auth): authentication failure ... show more2023-12-23T10:10:58.291794+00:00 bluefire sshd[3463458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
2023-12-23T10:10:59.908764+00:00 bluefire sshd[3463458]: Failed password for invalid user devops from 36.138.80.52 port 21146 ssh2
2023-12-23T10:11:19.228300+00:00 bluefire sshd[3463490]: Invalid user nagios from 36.138.80.52 port 9972
... show less