This IP address has been reported a total of 295
times from 167 distinct
sources.
52.140.200.241 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2022-12-13T06:51:54.545653-06:00 osl2019 sshd[22010]: pam_unix(sshd:auth): authentication failure; l ... show more2022-12-13T06:51:54.545653-06:00 osl2019 sshd[22010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
2022-12-13T06:51:56.730741-06:00 osl2019 sshd[22010]: Failed password for root from 52.140.200.241 port 50510 ssh2
2022-12-13T06:55:33.431157-06:00 osl2019 sshd[22402]: Invalid user mani from 52.140.200.241 port 34266
... show less
Dec 13 13:49:44 s0 sshd[990519]: Failed password for root from 52.140.200.241 port 37124 ssh2
... show moreDec 13 13:49:44 s0 sshd[990519]: Failed password for root from 52.140.200.241 port 37124 ssh2
Dec 13 13:53:11 s0 sshd[990557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
Dec 13 13:53:13 s0 sshd[990557]: Failed password for root from 52.140.200.241 port 57250 ssh2
... show less
Dec 13 09:53:28 admin sshd[1610910]: Invalid user kafka from 52.140.200.241 port 52340
Dec 13 ... show moreDec 13 09:53:28 admin sshd[1610910]: Invalid user kafka from 52.140.200.241 port 52340
Dec 13 09:53:28 admin sshd[1610910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Dec 13 09:53:28 admin sshd[1610910]: Invalid user kafka from 52.140.200.241 port 52340
Dec 13 09:53:30 admin sshd[1610910]: Failed password for invalid user kafka from 52.140.200.241 port 52340 ssh2
Dec 13 09:55:49 admin sshd[1612654]: Invalid user ly from 52.140.200.241 port 39156
... show less
Dec 13 09:46:02 choloepus sshd[3579655]: Invalid user spark from 52.140.200.241 port 45194
Dec ... show moreDec 13 09:46:02 choloepus sshd[3579655]: Invalid user spark from 52.140.200.241 port 45194
Dec 13 09:46:02 choloepus sshd[3579655]: Disconnected from invalid user spark 52.140.200.241 port 45194 [preauth]
Dec 13 09:52:34 choloepus sshd[3582307]: Invalid user kafka from 52.140.200.241 port 45056
... show less
Dec 13 09:23:46 vmi803130 sshd[1237352]: Failed password for invalid user secretaria from 52.140.200 ... show moreDec 13 09:23:46 vmi803130 sshd[1237352]: Failed password for invalid user secretaria from 52.140.200.241 port 34316 ssh2
Dec 13 09:27:13 vmi803130 sshd[1237481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
Dec 13 09:27:15 vmi803130 sshd[1237481]: Failed password for root from 52.140.200.241 port 42448 ssh2
... show less
Dec 13 09:02:55 vmi803130 sshd[1236795]: Failed password for invalid user raymond from 52.140.200.24 ... show moreDec 13 09:02:55 vmi803130 sshd[1236795]: Failed password for invalid user raymond from 52.140.200.241 port 55880 ssh2
Dec 13 09:06:23 vmi803130 sshd[1236903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
Dec 13 09:06:26 vmi803130 sshd[1236903]: Failed password for root from 52.140.200.241 port 49196 ssh2
... show less
Dec 13 08:42:06 vmi803130 sshd[1236360]: Failed password for invalid user maven from 52.140.200.241 ... show moreDec 13 08:42:06 vmi803130 sshd[1236360]: Failed password for invalid user maven from 52.140.200.241 port 36450 ssh2
Dec 13 08:45:33 vmi803130 sshd[1236442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
Dec 13 08:45:35 vmi803130 sshd[1236442]: Failed password for root from 52.140.200.241 port 42478 ssh2
... show less
Dec 13 08:24:50 vmi803130 sshd[1236094]: Invalid user user01 from 52.140.200.241 port 59868
De ... show moreDec 13 08:24:50 vmi803130 sshd[1236094]: Invalid user user01 from 52.140.200.241 port 59868
Dec 13 08:24:50 vmi803130 sshd[1236094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Dec 13 08:24:51 vmi803130 sshd[1236094]: Failed password for invalid user user01 from 52.140.200.241 port 59868 ssh2
... show less
Dec 13 08:01:38 vmi803130 sshd[1235035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreDec 13 08:01:38 vmi803130 sshd[1235035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Dec 13 08:01:40 vmi803130 sshd[1235035]: Failed password for invalid user user from 52.140.200.241 port 49226 ssh2
Dec 13 08:04:42 vmi803130 sshd[1235096]: Invalid user appuser from 52.140.200.241 port 60374
... show less
Cluster member (Omitted) (FR/France/-) said, DENY 52.140.200.241, Reason:[(sshd) Failed SSH login fr ... show moreCluster member (Omitted) (FR/France/-) said, DENY 52.140.200.241, Reason:[(sshd) Failed SSH login from 52.140.200.241 (JP/Japan/-): 3 in the last (Omitted)]
Cluster member (Omitted) (FR/France/-) said, DENY 52.140.200.241, Reason:[(sshd) Failed SSH login from 52.140.200.241 (JP/Japan/-): 3 in the last (Omitted)]
Cluster member (Omitted) (FR/France/-) said, DENY 52.140.200.241, Reason:[(sshd) Failed SSH login from 52.140.200.241 (JP/Japan/-): 3 in the last (Omitted)]
........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=52.140.200.241 show less