City: unknown
Region: unknown
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 120.52.120.5 | attackspambots | Aug 9 14:07:59 ns3164893 sshd[3141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.5 user=root Aug 9 14:08:01 ns3164893 sshd[3141]: Failed password for root from 120.52.120.5 port 34606 ssh2 ... |
2020-08-10 02:10:45 |
| 120.52.120.5 | attackspambots | Aug 7 15:08:21 master sshd[800]: Failed password for root from 120.52.120.5 port 42575 ssh2 Aug 7 15:28:53 master sshd[1332]: Failed password for root from 120.52.120.5 port 54399 ssh2 Aug 7 15:36:22 master sshd[1845]: Failed password for root from 120.52.120.5 port 50087 ssh2 Aug 7 15:43:56 master sshd[2615]: Failed password for root from 120.52.120.5 port 45776 ssh2 |
2020-08-08 04:22:33 |
| 120.52.120.5 | attack | Jul 28 13:04:36 eventyay sshd[29045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.5 Jul 28 13:04:38 eventyay sshd[29045]: Failed password for invalid user hewenqian from 120.52.120.5 port 41409 ssh2 Jul 28 13:10:52 eventyay sshd[29330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.5 ... |
2020-07-28 19:16:33 |
| 120.52.120.5 | attackbotsspam | Jul 26 05:54:00 abendstille sshd\[5484\]: Invalid user autocad from 120.52.120.5 Jul 26 05:54:00 abendstille sshd\[5484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.5 Jul 26 05:54:01 abendstille sshd\[5484\]: Failed password for invalid user autocad from 120.52.120.5 port 52859 ssh2 Jul 26 06:00:49 abendstille sshd\[12737\]: Invalid user arnaud from 120.52.120.5 Jul 26 06:00:49 abendstille sshd\[12737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.5 ... |
2020-07-26 12:08:15 |
| 120.52.120.5 | attackbots | Bruteforce detected by fail2ban |
2020-07-11 14:23:22 |
| 120.52.120.166 | attackbotsspam | Jun 17 14:02:22 odroid64 sshd\[13171\]: Invalid user hl from 120.52.120.166 Jun 17 14:02:22 odroid64 sshd\[13171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.166 ... |
2020-06-17 23:42:40 |
| 120.52.120.166 | attackbots | SSH Bruteforce attack |
2020-06-15 08:10:02 |
| 120.52.120.166 | attackspambots | SSH Honeypot -> SSH Bruteforce / Login |
2020-06-11 16:54:24 |
| 120.52.120.166 | attack | 5x Failed Password |
2020-05-28 21:10:26 |
| 120.52.120.166 | attack | May 25 16:04:09 pkdns2 sshd\[62911\]: Invalid user test from 120.52.120.166May 25 16:04:11 pkdns2 sshd\[62911\]: Failed password for invalid user test from 120.52.120.166 port 58356 ssh2May 25 16:06:03 pkdns2 sshd\[63030\]: Failed password for root from 120.52.120.166 port 39288 ssh2May 25 16:07:47 pkdns2 sshd\[63094\]: Failed password for root from 120.52.120.166 port 48447 ssh2May 25 16:09:36 pkdns2 sshd\[63172\]: Invalid user no from 120.52.120.166May 25 16:09:38 pkdns2 sshd\[63172\]: Failed password for invalid user no from 120.52.120.166 port 57610 ssh2 ... |
2020-05-25 23:31:13 |
| 120.52.121.86 | attackspam | trying to access non-authorized port |
2020-05-20 11:26:01 |
| 120.52.121.86 | attackspambots | srv02 Mass scanning activity detected Target: 32441 .. |
2020-05-06 08:12:02 |
| 120.52.121.86 | attackspam | Port scan(s) denied |
2020-04-25 17:47:36 |
| 120.52.120.166 | attack | Apr 8 03:54:59 localhost sshd\[10759\]: Invalid user informix from 120.52.120.166 port 45118 Apr 8 03:54:59 localhost sshd\[10759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.166 Apr 8 03:55:01 localhost sshd\[10759\]: Failed password for invalid user informix from 120.52.120.166 port 45118 ssh2 ... |
2020-04-08 17:04:54 |
| 120.52.121.86 | attackspam | " " |
2020-03-31 16:32:57 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '120.52.0.0 - 120.52.255.255'
% Abuse contact for '120.52.0.0 - 120.52.255.255' is 'xingxin2@chinaunicom.cn'
inetnum: 120.52.0.0 - 120.52.255.255
netname: CU-CDC
descr: CHINA UNICOM CLOUD DATA COMPANY LIMITED
descr: A133, Xidan North Avenue, Xicheng District, Beijing.
country: CN
admin-c: ZM909-AP
tech-c: ZM909-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-CU-CDC-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:57:00Z
source: APNIC
irt: IRT-CU-CDC-CN
address: A133,Xidan North Avenue, Xicheng District, Beijing
e-mail: xingxin2@chinaunicom.cn
abuse-mailbox: xingxin2@chinaunicom.cn
admin-c: ZM909-AP
tech-c: ZM909-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:35:11Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Xin Xing
address: A133,Xidan North Avenue, Xicheng District, Beijing
country: CN
phone: +86-18618215599
e-mail: xingxin2@chinaunicom.cn
nic-hdl: ZM909-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2013-10-12T09:06:01Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.52.12.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;120.52.12.84. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042800 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 22:14:33 CST 2026
;; MSG SIZE rcvd: 105
Host 84.12.52.120.in-addr.arpa not found: 2(SERVFAIL)
server can't find 120.52.12.84.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 71.6.232.9 | attackbotsspam | Unauthorized connection attempt detected from IP address 71.6.232.9 to port 8080 |
2020-04-28 22:50:07 |
| 41.78.75.45 | attackspam | 2020-04-28T10:52:38.092563sorsha.thespaminator.com sshd[2737]: Invalid user wwwrun from 41.78.75.45 port 17832 2020-04-28T10:52:40.378577sorsha.thespaminator.com sshd[2737]: Failed password for invalid user wwwrun from 41.78.75.45 port 17832 ssh2 ... |
2020-04-28 23:27:12 |
| 49.232.167.41 | attackspam | Apr 28 15:13:00 server sshd[23564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.167.41 Apr 28 15:13:03 server sshd[23564]: Failed password for invalid user ruth from 49.232.167.41 port 38300 ssh2 Apr 28 15:16:16 server sshd[24055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.167.41 ... |
2020-04-28 23:06:10 |
| 125.165.102.220 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-28 22:52:05 |
| 51.75.121.252 | attackspam | Apr 28 13:18:31 sshgateway sshd\[7831\]: Invalid user manager from 51.75.121.252 Apr 28 13:18:31 sshgateway sshd\[7831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=252.ip-51-75-121.eu Apr 28 13:18:34 sshgateway sshd\[7831\]: Failed password for invalid user manager from 51.75.121.252 port 60056 ssh2 |
2020-04-28 22:56:40 |
| 67.207.89.207 | attack | Apr 28 14:12:51 nextcloud sshd\[14437\]: Invalid user server from 67.207.89.207 Apr 28 14:12:51 nextcloud sshd\[14437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.89.207 Apr 28 14:12:53 nextcloud sshd\[14437\]: Failed password for invalid user server from 67.207.89.207 port 60980 ssh2 |
2020-04-28 22:53:44 |
| 175.24.107.214 | attack | SSH Brute-Force Attack |
2020-04-28 23:12:11 |
| 94.231.136.137 | attack | Unauthorised access (Apr 28) SRC=94.231.136.137 LEN=52 TTL=120 ID=8030 DF TCP DPT=445 WINDOW=8192 SYN |
2020-04-28 23:23:00 |
| 80.211.79.220 | attackbots | 2020-04-28T10:20:09.0013141495-001 sshd[14652]: Failed password for invalid user pmc2 from 80.211.79.220 port 42682 ssh2 2020-04-28T10:27:06.0526801495-001 sshd[15032]: Invalid user nd from 80.211.79.220 port 54356 2020-04-28T10:27:06.0559921495-001 sshd[15032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.79.220 2020-04-28T10:27:06.0526801495-001 sshd[15032]: Invalid user nd from 80.211.79.220 port 54356 2020-04-28T10:27:08.0226861495-001 sshd[15032]: Failed password for invalid user nd from 80.211.79.220 port 54356 ssh2 2020-04-28T10:34:05.4282661495-001 sshd[15667]: Invalid user bharat from 80.211.79.220 port 37798 ... |
2020-04-28 23:18:07 |
| 210.211.101.194 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-28 23:21:48 |
| 193.112.247.104 | attackbots | Apr 28 14:12:52 vmd17057 sshd[4000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.247.104 Apr 28 14:12:55 vmd17057 sshd[4000]: Failed password for invalid user stq from 193.112.247.104 port 56884 ssh2 ... |
2020-04-28 22:51:13 |
| 51.255.35.58 | attackspam | Apr 26 23:09:14 mail sshd[5057]: Failed password for root from 51.255.35.58 port 55288 ssh2 ... |
2020-04-28 23:15:10 |
| 87.107.158.204 | attackspam | port scan and connect, tcp 23 (telnet) |
2020-04-28 23:11:37 |
| 164.132.107.245 | attack | Apr 28 17:16:52 haigwepa sshd[1567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.107.245 Apr 28 17:16:53 haigwepa sshd[1567]: Failed password for invalid user liz from 164.132.107.245 port 46844 ssh2 ... |
2020-04-28 23:24:32 |
| 141.98.81.108 | attackspambots | Apr 28 15:17:24 sshgateway sshd\[8554\]: Invalid user admin from 141.98.81.108 Apr 28 15:17:24 sshgateway sshd\[8554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.108 Apr 28 15:17:26 sshgateway sshd\[8554\]: Failed password for invalid user admin from 141.98.81.108 port 33099 ssh2 |
2020-04-28 23:20:22 |