This IP address has been reported a total of 295
times from 167 distinct
sources.
52.140.200.241 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-08-03T23:30:24.860855 ******* sshd[4001813]: Invalid user sanjit from 52.140.200.241 port 38534 ... show more2024-08-03T23:30:24.860855 ******* sshd[4001813]: Invalid user sanjit from 52.140.200.241 port 38534
2024-08-03T23:30:25.090859 ******* sshd[4001813]: Disconnected from invalid user sanjit 52.140.200.241 port 38534 [preauth]
2024-08-03T23:36:45.548411 ******* sshd[4003905]: Disconnected from authenticating user root 52.140.200.241 port 60530 [preauth] show less
Brute-ForceSSH
Anonymous
Aug 3 20:54:46 ubuntu sshd[96752]: Disconnected from authenticating user root 52.140.200.241 port 3 ... show moreAug 3 20:54:46 ubuntu sshd[96752]: Disconnected from authenticating user root 52.140.200.241 port 35548 [preauth]
Aug 3 20:57:35 ubuntu sshd[96771]: Invalid user ubuntu from 52.140.200.241 port 35318
Aug 3 20:57:35 ubuntu sshd[96771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Aug 3 20:57:38 ubuntu sshd[96771]: Failed password for invalid user ubuntu from 52.140.200.241 port 35318 ssh2
Aug 3 20:57:39 ubuntu sshd[96771]: Disconnected from invalid user ubuntu 52.140.200.241 port 35318 [preauth]
... show less
Aug 3 20:09:27 sneaky sshd[3843383]: Invalid user dep from 52.140.200.241 port 49272
Aug 3 2 ... show moreAug 3 20:09:27 sneaky sshd[3843383]: Invalid user dep from 52.140.200.241 port 49272
Aug 3 20:11:21 sneaky sshd[3843411]: Invalid user nigeria from 52.140.200.241 port 39800
Aug 3 20:13:29 sneaky sshd[3843455]: Invalid user ts from 52.140.200.241 port 56926
Aug 3 20:14:43 sneaky sshd[3843477]: Invalid user test from 52.140.200.241 port 58992
Aug 3 20:15:58 sneaky sshd[3843509]: Invalid user cahn from 52.140.200.241 port 60310
... show less
Aug 3 21:45:37 qube2 sshd[3090247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 3 21:45:37 qube2 sshd[3090247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
Aug 3 21:45:39 qube2 sshd[3090247]: Failed password for root from 52.140.200.241 port 52748 ssh2
Aug 3 21:45:59 qube2 sshd[3091298]: Invalid user sudo1 from 52.140.200.241 port 38726
... show less
Aug 3 16:19:00 mail sshd[449711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreAug 3 16:19:00 mail sshd[449711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Aug 3 16:19:03 mail sshd[449711]: Failed password for invalid user peter from 52.140.200.241 port 48404 ssh2
Aug 3 16:19:54 mail sshd[449753]: Invalid user roberto from 52.140.200.241 port 42562
Aug 3 16:19:54 mail sshd[449753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Aug 3 16:19:55 mail sshd[449753]: Failed password for invalid user roberto from 52.140.200.241 port 42562 ssh2
... show less
Report 1278587 with IP 2326137 for SSH brute-force attack by source 2320812 via ssh-honeypot/0.2.0+h ... show moreReport 1278587 with IP 2326137 for SSH brute-force attack by source 2320812 via ssh-honeypot/0.2.0+http show less
[rede-44-49] (sshd) Failed SSH login from 52.140.200.241 (JP/Japan/-): 5 in the last 3600 secs; Port ... show more[rede-44-49] (sshd) Failed SSH login from 52.140.200.241 (JP/Japan/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 3 09:40:53 sshd[26724]: Invalid user [USERNAME] from 52.140.200.241 port 46660
Aug 3 09:40:55 sshd[26724]: Failed password for invalid user [USERNAME] from 52.140.200.241 port 46660 ssh2
Aug 3 09:48:42 sshd[27006]: Invalid user [USERNAME] from 52.140.200.241 port 54622
Aug 3 09:48:43 sshd[27006]: Failed password for invalid user [USERNAME] from 52.140.200.241 port 54622 ssh2
Aug 3 09:49:37 sshd[27049]: Invalid user [USERNAME] from 52.140.200.241 port 52460 show less
Aug 3 11:34:19 cc sshd[87920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t ... show moreAug 3 11:34:19 cc sshd[87920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241
Aug 3 11:34:20 cc sshd[87920]: Failed password for invalid user lxh from 52.140.200.241 port 54050 ssh2
Aug 3 11:34:56 cc sshd[87922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.200.241 user=root
Aug 3 11:34:57 cc sshd[87922]: Failed password for root from 52.140.200.241 port 42636 ssh2
Aug 3 11:35:35 cc sshd[87925]: Invalid user data from 52.140.200.241 port 35776
... show less
2024-08-03T12:57:42.721039srv1 sshd[26770]: Invalid user lft from 52.140.200.241 port 47896
20 ... show more2024-08-03T12:57:42.721039srv1 sshd[26770]: Invalid user lft from 52.140.200.241 port 47896
2024-08-03T12:58:38.551049srv1 sshd[26844]: Invalid user lb from 52.140.200.241 port 60074
2024-08-03T13:00:48.544671srv1 sshd[27021]: Invalid user clinton from 52.140.200.241 port 45488
... show less