This IP address has been reported a total of 295
times from 167 distinct
sources.
52.140.200.241 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Aug 4 08:01:38 betelgeuse sshd[2663753]: Invalid user apf from 52.140.200.241 port 34874
Aug ... show moreAug 4 08:01:38 betelgeuse sshd[2663753]: Invalid user apf from 52.140.200.241 port 34874
Aug 4 08:02:48 betelgeuse sshd[2691109]: Invalid user mahesh from 52.140.200.241 port 34806
... show less
Brute-ForceSSH
Anonymous
Aug 4 04:53:31 ubuntu sshd[98525]: Failed password for root from 52.140.200.241 port 52892 ssh2<br ... show moreAug 4 04:53:31 ubuntu sshd[98525]: Failed password for root from 52.140.200.241 port 52892 ssh2
Aug 4 04:53:32 ubuntu sshd[98525]: Disconnected from authenticating user root 52.140.200.241 port 52892 [preauth]
Aug 4 04:53:32 ubuntu sshd[98525]: Disconnected from authenticating user root 52.140.200.241 port 52892 [preauth]
Aug 4 04:59:55 ubuntu sshd[98585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
Aug 4 04:59:57 ubuntu sshd[98585]: Failed password for root from 52.140.200.241 port 45640 ssh2
... show less
2024-08-04T05:33:44.297318milloweb sshd[15076]: Failed password for invalid user extension from 52.1 ... show more2024-08-04T05:33:44.297318milloweb sshd[15076]: Failed password for invalid user extension from 52.140.200.241 port 52906 ssh2
2024-08-04T05:38:29.852096milloweb sshd[15613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
2024-08-04T05:38:31.353487milloweb sshd[15613]: Failed password for root from 52.140.200.241 port 43146 ssh2
... show less
Aug 3 23:32:11 us-mfl-03 sshd[277709]: Invalid user extension from 52.140.200.241 port 51532
... show moreAug 3 23:32:11 us-mfl-03 sshd[277709]: Invalid user extension from 52.140.200.241 port 51532
... show less
Aug 4 04:18:40 ThrustRP sshd[1667931]: Failed password for invalid user hong from 52.140.200.241 po ... show moreAug 4 04:18:40 ThrustRP sshd[1667931]: Failed password for invalid user hong from 52.140.200.241 port 34804 ssh2
Aug 4 04:19:32 ThrustRP sshd[1667979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
Aug 4 04:19:34 ThrustRP sshd[1667979]: Failed password for root from 52.140.200.241 port 53100 ssh2
Aug 4 04:20:28 ThrustRP sshd[1668015]: Invalid user test1 from 52.140.200.241 port 46322
Aug 4 04:20:28 ThrustRP sshd[1668015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Aug 4 04:20:28 ThrustRP sshd[1668015]: Invalid user test1 from 52.140.200.241 port 46322
Aug 4 04:20:30 ThrustRP sshd[1668015]: Failed password for invalid user test1 from 52.140.200.241 port 46322 ssh2
... show less
Aug 3 19:17:00 LU-VPS01 sshd[5216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 3 19:17:00 LU-VPS01 sshd[5216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Aug 3 19:17:02 LU-VPS01 sshd[5216]: Failed password for invalid user tftpuser from 52.140.200.241 port 34114 ssh2
Aug 3 19:18:53 LU-VPS01 sshd[5276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
... show less
Brute-ForceSSH
Anonymous
Aug 4 01:30:20 de-fra2-ntp1 sshd[1371736]: Invalid user sami from 52.140.200.241 port 41544
A ... show moreAug 4 01:30:20 de-fra2-ntp1 sshd[1371736]: Invalid user sami from 52.140.200.241 port 41544
Aug 4 01:36:56 de-fra2-ntp1 sshd[1372456]: Invalid user chuck from 52.140.200.241 port 57876
Aug 4 01:37:49 de-fra2-ntp1 sshd[1372602]: Invalid user tod from 52.140.200.241 port 41586
... show less
Aug 4 00:56:25 uedo sshd[1446411]: Invalid user redhat from 52.140.200.241 port 41196
Aug 4 ... show moreAug 4 00:56:25 uedo sshd[1446411]: Invalid user redhat from 52.140.200.241 port 41196
Aug 4 00:57:16 uedo sshd[1447094]: Invalid user support from 52.140.200.241 port 35256
Aug 4 00:58:08 uedo sshd[1447807]: Invalid user color from 52.140.200.241 port 35590
Aug 4 01:01:01 uedo sshd[1450234]: Invalid user reimer from 52.140.200.241 port 54640
Aug 4 01:02:00 uedo sshd[1450960]: Invalid user nila from 52.140.200.241 port 34230
... show less
2024-08-04T00:53:42.585720+00:00 edge-drt-atl01.int.pdx.net.uk sshd[1792187]: Invalid user oracle fr ... show more2024-08-04T00:53:42.585720+00:00 edge-drt-atl01.int.pdx.net.uk sshd[1792187]: Invalid user oracle from 52.140.200.241 port 54230
2024-08-04T00:56:53.652095+00:00 edge-drt-atl01.int.pdx.net.uk sshd[1792413]: Invalid user redhat from 52.140.200.241 port 34058
2024-08-04T00:57:45.202866+00:00 edge-drt-atl01.int.pdx.net.uk sshd[1792448]: Invalid user support from 52.140.200.241 port 49248
... show less