Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
119.90.52.36 attackspam
Invalid user free from 119.90.52.36 port 55258
2020-10-13 21:49:05
119.90.52.36 attack
Invalid user free from 119.90.52.36 port 55258
2020-10-13 13:14:10
119.90.52.36 attack
Oct 12 23:52:06 jane sshd[19911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36 
Oct 12 23:52:08 jane sshd[19911]: Failed password for invalid user harris from 119.90.52.36 port 54123 ssh2
...
2020-10-13 06:00:12
119.90.52.36 attackspam
2019-12-27T22:54:21.928989abusebot-4.cloudsearch.cf sshd[10592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36  user=root
2019-12-27T22:54:23.954978abusebot-4.cloudsearch.cf sshd[10592]: Failed password for root from 119.90.52.36 port 41976 ssh2
2019-12-27T22:54:28.432293abusebot-4.cloudsearch.cf sshd[10594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36  user=root
2019-12-27T22:54:30.418336abusebot-4.cloudsearch.cf sshd[10594]: Failed password for root from 119.90.52.36 port 44250 ssh2
2019-12-27T22:54:34.316747abusebot-4.cloudsearch.cf sshd[10597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36  user=root
2019-12-27T22:54:36.794472abusebot-4.cloudsearch.cf sshd[10597]: Failed password for root from 119.90.52.36 port 46405 ssh2
2019-12-27T22:54:41.914001abusebot-4.cloudsearch.cf sshd[10599]: Invalid user elision from 119.90
...
2019-12-28 08:29:56
119.90.52.36 attackspambots
ssh failed login
2019-12-26 16:50:29
119.90.52.36 attack
Automated report - ssh fail2ban:
Sep 8 21:30:13 authentication failure 
Sep 8 21:30:14 wrong password, user=qazwsx, port=58298, ssh2
Sep 8 21:35:09 authentication failure
2019-09-09 03:42:26
119.90.52.36 attackbots
Sep  6 10:45:25 vps691689 sshd[11845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
Sep  6 10:45:26 vps691689 sshd[11845]: Failed password for invalid user gmodserver1 from 119.90.52.36 port 38040 ssh2
...
2019-09-06 17:05:27
119.90.52.36 attackspambots
Sep  1 09:57:37 sachi sshd\[23878\]: Invalid user zelma from 119.90.52.36
Sep  1 09:57:37 sachi sshd\[23878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
Sep  1 09:57:39 sachi sshd\[23878\]: Failed password for invalid user zelma from 119.90.52.36 port 52838 ssh2
Sep  1 10:02:32 sachi sshd\[24275\]: Invalid user rso from 119.90.52.36
Sep  1 10:02:32 sachi sshd\[24275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
2019-09-02 05:25:03
119.90.52.36 attackspambots
Sep  1 05:19:22 sachi sshd\[30101\]: Invalid user mah from 119.90.52.36
Sep  1 05:19:22 sachi sshd\[30101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
Sep  1 05:19:24 sachi sshd\[30101\]: Failed password for invalid user mah from 119.90.52.36 port 35646 ssh2
Sep  1 05:26:01 sachi sshd\[30644\]: Invalid user ivan from 119.90.52.36
Sep  1 05:26:01 sachi sshd\[30644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
2019-09-01 23:30:23
119.90.52.36 attackbotsspam
Invalid user og from 119.90.52.36 port 54018
2019-08-30 20:47:03
119.90.52.36 attack
Aug 15 12:32:56 hiderm sshd\[14728\]: Invalid user demo from 119.90.52.36
Aug 15 12:32:56 hiderm sshd\[14728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
Aug 15 12:32:58 hiderm sshd\[14728\]: Failed password for invalid user demo from 119.90.52.36 port 42998 ssh2
Aug 15 12:38:02 hiderm sshd\[15243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36  user=root
Aug 15 12:38:04 hiderm sshd\[15243\]: Failed password for root from 119.90.52.36 port 33644 ssh2
2019-08-16 06:45:47
119.90.52.36 attackbotsspam
Jun 29 21:13:59 dallas01 sshd[25139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
Jun 29 21:14:02 dallas01 sshd[25139]: Failed password for invalid user Alphanetworks from 119.90.52.36 port 47916 ssh2
Jun 29 21:16:01 dallas01 sshd[25468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
Jun 29 21:16:02 dallas01 sshd[25468]: Failed password for invalid user speech-dispatcher from 119.90.52.36 port 35932 ssh2
2019-08-01 01:12:56
119.90.52.36 attackspam
Jul 29 21:36:47 ip-172-31-62-245 sshd\[5544\]: Invalid user git from 119.90.52.36\
Jul 29 21:36:49 ip-172-31-62-245 sshd\[5544\]: Failed password for invalid user git from 119.90.52.36 port 55122 ssh2\
Jul 29 21:41:26 ip-172-31-62-245 sshd\[5643\]: Invalid user sleeper from 119.90.52.36\
Jul 29 21:41:28 ip-172-31-62-245 sshd\[5643\]: Failed password for invalid user sleeper from 119.90.52.36 port 47098 ssh2\
Jul 29 21:46:10 ip-172-31-62-245 sshd\[5667\]: Invalid user chase from 119.90.52.36\
2019-07-30 06:15:53
119.90.52.36 attack
2019-07-10T21:00:04.671889stark.klein-stark.info sshd\[1193\]: Invalid user vikram from 119.90.52.36 port 37368
2019-07-10T21:00:04.679175stark.klein-stark.info sshd\[1193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
2019-07-10T21:00:07.006722stark.klein-stark.info sshd\[1193\]: Failed password for invalid user vikram from 119.90.52.36 port 37368 ssh2
...
2019-07-11 09:58:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.90.52.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.90.52.54.			IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:05:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
54.52.90.119.in-addr.arpa domain name pointer undefine.inidc.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.52.90.119.in-addr.arpa	name = undefine.inidc.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
74.222.24.78 attackbots
Unauthorized connection attempt detected from IP address 74.222.24.78 to port 2220 [J]
2020-01-28 01:06:43
77.227.65.219 attackspam
Unauthorized connection attempt detected from IP address 77.227.65.219 to port 23 [J]
2020-01-28 01:04:31
104.129.72.66 attackbots
Unauthorized connection attempt from IP address 104.129.72.66 on Port 445(SMB)
2020-01-28 00:50:55
52.34.83.11 attack
01/27/2020-17:23:54.015226 52.34.83.11 Protocol: 6 SURICATA TLS invalid record/traffic
2020-01-28 00:24:24
80.82.70.106 attack
Jan 27 17:52:44 debian-2gb-nbg1-2 kernel: \[2403233.556890\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.70.106 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=59572 PROTO=TCP SPT=44030 DPT=11114 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-28 00:54:39
51.75.66.89 attackspam
Jan 27 10:11:36 ws22vmsma01 sshd[237001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.89
Jan 27 10:11:38 ws22vmsma01 sshd[237001]: Failed password for invalid user teamspeak from 51.75.66.89 port 57474 ssh2
...
2020-01-28 00:36:09
41.38.214.240 attackspam
Unauthorized connection attempt from IP address 41.38.214.240 on Port 445(SMB)
2020-01-28 01:04:55
122.49.219.98 attackbotsspam
Unauthorized connection attempt from IP address 122.49.219.98 on Port 445(SMB)
2020-01-28 00:51:17
104.168.176.40 attack
Subject: PURCHASE ORDER
Date: 27 Jan 2020 03:00:45 -0800
Message ID: <20200127030045.ECCFCF967DD3C3F7@dragonsourcing.com>
Virus/Unauthorized code: >>> Trojan.Gen-SH in '18108029_3X_AR_PA2__UK765C5F3.bat'
2020-01-28 01:02:08
58.209.234.87 attack
Jan 27 10:05:56 nbi-636 sshd[26870]: Invalid user usuario from 58.209.234.87 port 52802
Jan 27 10:05:58 nbi-636 sshd[26870]: Failed password for invalid user usuario from 58.209.234.87 port 52802 ssh2
Jan 27 10:05:58 nbi-636 sshd[26870]: Received disconnect from 58.209.234.87 port 52802:11: Bye Bye [preauth]
Jan 27 10:05:58 nbi-636 sshd[26870]: Disconnected from 58.209.234.87 port 52802 [preauth]
Jan 27 10:11:41 nbi-636 sshd[28866]: Invalid user yang from 58.209.234.87 port 51460
Jan 27 10:11:43 nbi-636 sshd[28866]: Failed password for invalid user yang from 58.209.234.87 port 51460 ssh2
Jan 27 10:11:43 nbi-636 sshd[28866]: Received disconnect from 58.209.234.87 port 51460:11: Bye Bye [preauth]
Jan 27 10:11:43 nbi-636 sshd[28866]: Disconnected from 58.209.234.87 port 51460 [preauth]
Jan 27 10:14:18 nbi-636 sshd[29640]: Invalid user coffee from 58.209.234.87 port 37414
Jan 27 10:14:20 nbi-636 sshd[29640]: Failed password for invalid user coffee from 58.209.234.87 port 37........
-------------------------------
2020-01-28 01:00:35
94.113.241.246 attackspambots
Unauthorized connection attempt detected from IP address 94.113.241.246 to port 2220 [J]
2020-01-28 00:33:14
209.141.6.210 attack
Unauthorized connection attempt from IP address 209.141.6.210 on Port 445(SMB)
2020-01-28 01:00:59
122.129.107.18 attack
Unauthorized connection attempt from IP address 122.129.107.18 on Port 445(SMB)
2020-01-28 00:28:38
36.76.145.7 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-01-2020 09:50:13.
2020-01-28 00:58:10
37.29.7.66 attackspam
Unauthorized connection attempt from IP address 37.29.7.66 on Port 445(SMB)
2020-01-28 00:53:22

Recently Reported IPs

31.59.227.34 103.43.7.17 125.45.10.117 41.34.223.204
124.105.69.32 185.9.91.74 105.27.197.250 116.53.45.149
189.76.80.225 197.0.85.235 175.107.0.173 185.247.225.85
66.181.191.186 189.213.150.184 114.237.54.154 34.83.246.213
45.227.34.162 106.13.14.38 143.0.213.142 81.43.50.44