This IP address has been reported a total of 264
times from 135 distinct
sources.
36.138.80.52 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2023-12-20T15:26:12.941004-05:00 collabhost.computernewb.com sshd[147057]: Failed password for inval ... show more2023-12-20T15:26:12.941004-05:00 collabhost.computernewb.com sshd[147057]: Failed password for invalid user default from 36.138.80.52 port 61570 ssh2
2023-12-20T15:26:48.027455-05:00 collabhost.computernewb.com sshd[147068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52 user=postgres
2023-12-20T15:26:49.923539-05:00 collabhost.computernewb.com sshd[147068]: Failed password for postgres from 36.138.80.52 port 33026 ssh2
... show less
Report 899399 with IP 1946943 for SSH brute-force attack by source 1941624 via ssh-honeypot/0.2.0+ht ... show moreReport 899399 with IP 1946943 for SSH brute-force attack by source 1941624 via ssh-honeypot/0.2.0+http show less
Dec 20 10:54:31 backup sshd[3735184]: Invalid user moxa from 36.138.80.52 port 9974
Dec 20 10: ... show moreDec 20 10:54:31 backup sshd[3735184]: Invalid user moxa from 36.138.80.52 port 9974
Dec 20 10:54:32 backup sshd[3735184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
Dec 20 10:54:33 backup sshd[3735184]: Failed password for invalid user moxa from 36.138.80.52 port 9974 ssh2
Dec 20 11:01:30 backup sshd[3736375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52 user=root
Dec 20 11:01:32 backup sshd[3736375]: Failed password for root from 36.138.80.52 port 48764 ssh2
... show less
Brute-ForceSSH
Anonymous
2023-12-20T03:10:48.996469 SPARTAN sshd[7038]: Invalid user moxa from 36.138.80.52 port 33838
... show more2023-12-20T03:10:48.996469 SPARTAN sshd[7038]: Invalid user moxa from 36.138.80.52 port 33838
2023-12-20T03:10:49.289605 SPARTAN sshd[7038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
2023-12-20T03:10:51.256379 SPARTAN sshd[7038]: Failed password for invalid user moxa from 36.138.80.52 port 33838 ssh2
2023-12-20T03:11:10.150906 SPARTAN sshd[7133]: Invalid user fa from 36.138.80.52 port 43192
... show less
2023-12-20T01:11:48.499540racknerd-2df238 sshd[897822]: Invalid user es from 36.138.80.52 port 48492 ... show more2023-12-20T01:11:48.499540racknerd-2df238 sshd[897822]: Invalid user es from 36.138.80.52 port 48492
2023-12-20T01:11:50.632512racknerd-2df238 sshd[897822]: Failed password for invalid user es from 36.138.80.52 port 48492 ssh2
2023-12-20T01:12:12.697691racknerd-2df238 sshd[897824]: Invalid user esuser from 36.138.80.52 port 60628
... show less
2023-12-19T12:49:04.618983server2.ebullit.com sshd[11346]: Failed password for invalid user postgres ... show more2023-12-19T12:49:04.618983server2.ebullit.com sshd[11346]: Failed password for invalid user postgres from 36.138.80.52 port 51532 ssh2
2023-12-19T12:50:00.239418server2.ebullit.com sshd[12155]: Invalid user mc from 36.138.80.52 port 15272
2023-12-19T12:50:01.404587server2.ebullit.com sshd[12155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
2023-12-19T12:50:03.883070server2.ebullit.com sshd[12155]: Failed password for invalid user mc from 36.138.80.52 port 15272 ssh2
2023-12-19T12:50:11.520787server2.ebullit.com sshd[12409]: Invalid user user from 36.138.80.52 port 50364
... show less
Dec 19 17:08:12 ubuntu sshd[2440646]: Invalid user ansible from 36.138.80.52 port 48864
Dec 19 ... show moreDec 19 17:08:12 ubuntu sshd[2440646]: Invalid user ansible from 36.138.80.52 port 48864
Dec 19 17:08:15 ubuntu sshd[2440646]: Failed password for invalid user ansible from 36.138.80.52 port 48864 ssh2
... show less
Dec 19 14:05:42 vmd109304 sshd[2890472]: Failed password for invalid user nagiosuser from 36.138.80. ... show moreDec 19 14:05:42 vmd109304 sshd[2890472]: Failed password for invalid user nagiosuser from 36.138.80.52 port 19662 ssh2
Dec 19 14:06:55 vmd109304 sshd[2898044]: Invalid user mc from 36.138.80.52 port 40674
Dec 19 14:06:55 vmd109304 sshd[2898044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.138.80.52
Dec 19 14:06:57 vmd109304 sshd[2898044]: Failed password for invalid user mc from 36.138.80.52 port 40674 ssh2
... show less