www.abuseipdb.com Open in urlscan Pro
2606:4700:20::681a:d26  Public Scan

URL: https://www.abuseipdb.com/check/174.138.52.50?d=2021-02-05T01:09:41.000Z
Submission: On April 06 via api from IE — Scanned from DE

Form analysis 2 forms found in the DOM

https://www.abuseipdb.com/check

<form action="https://www.abuseipdb.com/check" class="lookup">
  <div class="input-group">
    <input type="text" name="query" class="form-control" value="2a03:1b20:6:f011::2e" onfocus="if (this.value=='2a03:1b20:6:f011::2e') this.value='';" onblur="if (this.value=='' || this.value == ' ') this.value='2a03:1b20:6:f011::2e';">
    <span class="input-group-btn"><button type="submit" class="btn btn-warning search-button">Check</button></span>
  </div>
</form>

<form id="instantFeedbackForm" novalidate="novalidate">
  <input name="_token" hidden="" value="1cF5v4WbVoOy11BO7Zu6yjXnUMcLwvYpekvjQE0p">
  <div class="modal fade" id="instantFeedbackModal" tabindex="-1" role="dialog" aria-labelledby="myModalLabel">
    <div class="modal-dialog" role="document">
      <div class="modal-content">
        <div class="modal-header">
          <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button>
          <h4 class="modal-title" id="myModalLabel" style="color:#fff">
            <span class="glyphicon glyphicon-comment"></span> &nbsp; AbuseIPDB Instant Feedback
          </h4>
        </div>
        <div class="modal-body">
          <p>
            <b>We value your feedback!</b> Do you have a comment or correction concerning this page? Let us know in a single click. We read every comment!
          </p>
          <hr>
          <div class="form-group">
            <textarea id="instantFeedbackText" name="feedback" class="form-control" placeholder="Did you find what you were looking for? How can we improve this page?" maxlength="200"></textarea>
            <p style="text-align:right;font-size:.8em;margin-top:10px">Characters left: <span class="instant-feedback-char-count">200</span>/200</p>
          </div>
          <div class="form-group input-group">
            <span class="input-group-addon">
              <span class="glyphicon glyphicon-envelope"></span>
            </span>
            <input id="instantFeedbackEmail" name="email" type="email" class="form-control" placeholder="Email (optional, if you want a response)">
          </div>
        </div>
        <input type="hidden" name="url" value="https://www.abuseipdb.com/check/174.138.52.50">
        <div class="modal-footer">
          <button type="button" class="btn btn-default" data-dismiss="modal">
            <span class="glyphicon glyphicon-remove"></span> &nbsp; Cancel </button>
          <button type="submit" class="btn btn-primary" id="instantFeedbackSend">
            <span class="glyphicon glyphicon-send"></span> &nbsp; Send Feedback </button>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

Toggle navigation
 * Home
 * Report IP
 * Bulk Reporter
 * Pricing
 * About
 * FAQ
 * Documentation
   * APIv2 Documentation
   * Fail2Ban Integration
   * CSF Integration
   * Suricata Integration
   * ArGoSoft Integration
   * Splunk© Integration
   * Report Categories
 * Statistics
 * IP Tools
   * Convert IP Address Format
   * Subnet Calculator
   * Bulkcheck Tool
   * Ping IP
   * DNS Lookup
 * Contact

Login Sign Up


ABUSEIPDB » 174.138.52.50

CHECK AN IP ADDRESS, DOMAIN NAME, OR SUBNET

e.g. 2a03:1b20:6:f011::2e, microsoft.com, or 5.188.10.0/24

Check


174.138.52.50 WAS FOUND IN OUR DATABASE!

This IP was reported 7,908 times. Confidence of Abuse is 100%: ?

100%

ISP DigitalOcean LLC Usage Type Data Center/Web Hosting/Transit Domain Name
digitalocean.com Country United States of America City Clifton, New Jersey

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated
monthly.

Report 174.138.52.50
Whois 174.138.52.50
Your new development career awaits. Check out the latest listings.ads via Carbon



IP ABUSE REPORTS FOR 174.138.52.50:

This IP address has been reported a total of 7,908 times from 727 distinct
sources. 174.138.52.50 was first reported on November 21st 2020, and the most
recent report was 2 hours ago.

Recent Reports: We have received reports of abusive activity from this IP
address within the last week. It is potentially still actively engaged in
abusive activities.



Reporter Date Comment Categories itbyhf 2 hours ago
Apr 6 07:17:20 ns08 sshd[699276]: Invalid user alfa from 174.138.52.50 port
60258 Apr 6 07:1 ... show moreApr 6 07:17:20 ns08 sshd[699276]: Invalid user
alfa from 174.138.52.50 port 60258
Apr 6 07:17:20 ns08 sshd[699276]: pam_unix(sshd:auth): authentication failure;
logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.52.50
Apr 6 07:17:20 ns08 sshd[699276]: Invalid user alfa from 174.138.52.50 port
60258
Apr 6 07:17:22 ns08 sshd[699276]: Failed password for invalid user alfa from
174.138.52.50 port 60258 ssh2
Apr 6 07:19:06 ns08 sshd[699297]: Invalid user nuttapong from 174.138.52.50 port
59998
... show less
Brute-Force SSH georgengelmann 2 hours ago
Apr 6 08:13:55 electroncash sshd[57616]: Failed password for invalid user galaxy
from 174.138.52.50 ... show moreApr 6 08:13:55 electroncash sshd[57616]: Failed
password for invalid user galaxy from 174.138.52.50 port 47852 ssh2
Apr 6 08:16:51 electroncash sshd[59432]: Invalid user alfa from 174.138.52.50
port 33478
Apr 6 08:16:51 electroncash sshd[59432]: pam_unix(sshd:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.52.50
Apr 6 08:16:54 electroncash sshd[59432]: Failed password for invalid user alfa
from 174.138.52.50 port 33478 ssh2
Apr 6 08:18:44 electroncash sshd[60619]: Invalid user nuttapong from
174.138.52.50 port 33218
... show less
Brute-Force SSH Kolja 3 hours ago
Apr 6 08:10:54 server sshd[4124482]: Invalid user galaxy from 174.138.52.50 port
53930 Apr 6 ... show moreApr 6 08:10:54 server sshd[4124482]: Invalid user
galaxy from 174.138.52.50 port 53930
Apr 6 08:10:54 server sshd[4124482]: pam_unix(sshd:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.52.50
Apr 6 08:10:55 server sshd[4124482]: Failed password for invalid user galaxy
from 174.138.52.50 port 53930 ssh2
Apr 6 08:15:38 server sshd[4128391]: Invalid user alfa from 174.138.52.50 port
40554
... show less
Brute-Force SSH sid3windr 3 hours ago
sshd[31025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0
tty=ssh ruser= rhost ... show moresshd[31025]: pam_unix(sshd:auth):
authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.52.50
sshd[31025]: Failed password for invalid user galaxy from 174.138.52.50 port
51826 ssh2 show less
Brute-Force SSH Darcy Ganga 4 hours ago
2022-04-06T01:07:05.761957lprvsftp01.derco.cl sshd[2425732]:
pam_unix(sshd:auth): authentication fai ... show
more2022-04-06T01:07:05.761957lprvsftp01.derco.cl sshd[2425732]:
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
ruser= rhost=174.138.52.50
2022-04-06T01:07:07.592131lprvsftp01.derco.cl sshd[2425732]: Failed password for
invalid user mailtester from 174.138.52.50 port 52962 ssh2
2022-04-06T01:08:20.497890lprvsftp01.derco.cl sshd[2425890]: Invalid user
ursolov from 174.138.52.50 port 40150
... show less
Brute-Force SSH lancairtalk.net 4 hours ago
2022-04-06T00:06:27.284370server.lancairtalk.net sshd[27607]: Invalid user
mailtester from 174.138.5 ... show
more2022-04-06T00:06:27.284370server.lancairtalk.net sshd[27607]: Invalid user
mailtester from 174.138.52.50 port 38704
... show less
Brute-Force SSH pr0vieh 6 hours ago
Apr 6 04:16:52 Linux06 sshd[1800017]: Failed password for invalid user matt from
174.138.52.50 port ... show moreApr 6 04:16:52 Linux06 sshd[1800017]: Failed
password for invalid user matt from 174.138.52.50 port 47546 ssh2
Apr 6 04:20:17 Linux06 sshd[1810904]: Invalid user lukasz from 174.138.52.50
port 36920
Apr 6 04:20:17 Linux06 sshd[1810904]: pam_unix(sshd:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.52.50
Apr 6 04:20:19 Linux06 sshd[1810904]: Failed password for invalid user lukasz
from 174.138.52.50 port 36920 ssh2
Apr 6 04:23:24 Linux06 sshd[1821156]: Invalid user tvcc from 174.138.52.50 port
54518
Apr 6 04:23:24 Linux06 sshd[1821156]: pam_unix(sshd:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.52.50
Apr 6 04:23:26 Linux06 sshd[1821156]: Failed password for invalid user tvcc from
174.138.52.50 port 54518 ssh2
Apr 6 04:26:15 Linux06 sshd[1830774]: Invalid user manco from 174.138.52.50 port
43884
Apr 6 04:26:15 Linux06 sshd[1830774]: pam_unix(sshd:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh
... show less
Brute-Force SSH Hirte 8 hours ago
MYH: Brutforce ssh Login
Brute-Force 33three.eu 11 hours ago
SSH Invalid Login
Brute-Force SSH Punto de miel 13 hours ago
Apr 5 19:45:39 sidrat sshd[217551]: Invalid user owner from 174.138.52.50 port
42636 Apr 5 1 ... show moreApr 5 19:45:39 sidrat sshd[217551]: Invalid user
owner from 174.138.52.50 port 42636
Apr 5 19:45:39 sidrat sshd[217551]: pam_unix(sshd:auth): authentication failure;
logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.52.50
Apr 5 19:45:41 sidrat sshd[217551]: Failed password for invalid user owner from
174.138.52.50 port 42636 ssh2
... show less
Brute-Force SSH stvnrdg.me 15 hours ago
2022-04-05 19:03:04,751 fail2ban.actions [694]: NOTICE [sshd] Ban 174.138.52.50
2022-0 ... show more2022-04-05 19:03:04,751 fail2ban.actions [694]: NOTICE
[sshd] Ban 174.138.52.50
2022-04-05 19:38:51,503 fail2ban.actions [694]: NOTICE [sshd] Ban 174.138.52.50
2022-04-05 20:14:24,740 fail2ban.actions [694]: NOTICE [sshd] Ban 174.138.52.50
... show less
Brute-Force datateam.center 16 hours ago
2022-04-05T18:55:40.559088web.datateam.center sshd[1607]: pam_unix(sshd:auth):
authentication failur ... show more2022-04-05T18:55:40.559088web.datateam.center
sshd[1607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0
tty=ssh ruser= rhost=174.138.52.50
2022-04-05T18:55:42.741106web.datateam.center sshd[1607]: Failed password for
invalid user nontarat from 174.138.52.50 port 49812 ssh2
2022-04-05T19:00:10.249925web.datateam.center sshd[2124]: Invalid user huangt
from 174.138.52.50 port 57260
... show less
Brute-Force joschuak 16 hours ago
SSH brute force attack detected from [174.138.52.50]
Brute-Force SSH amit177 22 hours ago

Brute-Force SSH Anonymous 22 hours ago
Brute force SSH login
Brute-Force SSH

Showing 1 to 15 of 7908 reports

 * ‹
 * 1
 * 2
 * 3
 * 4
 * 5
 * 6
 * 7
 * 8
 * ...
 * 527
 * 528
 * ›

--------------------------------------------------------------------------------

Is this your IP? You may request to takedown any associated reports. We will
attempt to verify your ownership. Request Takedown 🚩


RECENTLY REPORTED IPS:

178.22.168.220
122.194.229.9
61.177.172.91
68.179.159.54
198.199.126.186
12.189.115.130
2001:41d0:1004:113c::
82.156.19.77
46.19.139.42
180.167.207.234
176.111.173.242
221.150.58.128
154.121.34.219
61.177.172.98
45.137.21.208
40.101.125.93
137.184.52.136
192.140.153.74
46.101.113.206
93.95.240.60

© 2022 AbuseIPDB. All rights reserved. View IP List. Usage is subject to our
Terms and Privacy Policy.

Support AbuseIPDB - donate Bitcoin to 1DqaKKSh6d31GqCTdd4LGHERaqHFv9CmTN

Blog | About Us | Frequently Asked Questions | API (Status) | Donate

feedback
×

  ABUSEIPDB INSTANT FEEDBACK

We value your feedback! Do you have a comment or correction concerning this
page? Let us know in a single click. We read every comment!

--------------------------------------------------------------------------------

Characters left: 200/200


  Cancel   Send Feedback
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com