Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: OVH SAS

Hostname: unknown

Organization: OVH SAS

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
Invalid user ee from 51.75.28.134 port 41116
2020-08-28 06:59:24
attack
Invalid user ee from 51.75.28.134 port 41116
2020-08-25 06:35:45
attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-17 23:10:55
attack
Aug 16 14:18:48 inter-technics sshd[2595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134  user=root
Aug 16 14:18:50 inter-technics sshd[2595]: Failed password for root from 51.75.28.134 port 40094 ssh2
Aug 16 14:22:47 inter-technics sshd[2965]: Invalid user tif from 51.75.28.134 port 50702
Aug 16 14:22:47 inter-technics sshd[2965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
Aug 16 14:22:47 inter-technics sshd[2965]: Invalid user tif from 51.75.28.134 port 50702
Aug 16 14:22:48 inter-technics sshd[2965]: Failed password for invalid user tif from 51.75.28.134 port 50702 ssh2
...
2020-08-17 00:53:16
attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134  user=root
Failed password for root from 51.75.28.134 port 52228 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134  user=root
Failed password for root from 51.75.28.134 port 35606 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134  user=root
2020-08-11 12:55:53
attackbotsspam
$f2bV_matches
2020-07-29 00:21:28
attackspambots
Invalid user sekretariat from 51.75.28.134 port 43488
2020-07-28 16:12:44
attackbotsspam
Jul 23 13:58:13 prod4 sshd\[26156\]: Invalid user crew from 51.75.28.134
Jul 23 13:58:15 prod4 sshd\[26156\]: Failed password for invalid user crew from 51.75.28.134 port 40840 ssh2
Jul 23 14:02:35 prod4 sshd\[28697\]: Invalid user harish from 51.75.28.134
...
2020-07-23 21:49:46
attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-17T13:16:07Z and 2020-07-17T13:24:39Z
2020-07-17 23:10:59
attackspam
$f2bV_matches
2020-07-15 04:59:13
attackspambots
2020-07-09T19:31:26.579930abusebot-5.cloudsearch.cf sshd[25914]: Invalid user oracle from 51.75.28.134 port 55078
2020-07-09T19:31:26.584794abusebot-5.cloudsearch.cf sshd[25914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.ip-51-75-28.eu
2020-07-09T19:31:26.579930abusebot-5.cloudsearch.cf sshd[25914]: Invalid user oracle from 51.75.28.134 port 55078
2020-07-09T19:31:28.496345abusebot-5.cloudsearch.cf sshd[25914]: Failed password for invalid user oracle from 51.75.28.134 port 55078 ssh2
2020-07-09T19:34:39.649190abusebot-5.cloudsearch.cf sshd[25965]: Invalid user zzs from 51.75.28.134 port 51962
2020-07-09T19:34:39.655132abusebot-5.cloudsearch.cf sshd[25965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.ip-51-75-28.eu
2020-07-09T19:34:39.649190abusebot-5.cloudsearch.cf sshd[25965]: Invalid user zzs from 51.75.28.134 port 51962
2020-07-09T19:34:41.727308abusebot-5.cloudsearch.cf sshd[25965]: Fa
...
2020-07-10 03:40:40
attack
SSH Brute-Force reported by Fail2Ban
2020-07-01 07:44:45
attackbotsspam
(sshd) Failed SSH login from 51.75.28.134 (FR/France/134.ip-51-75-28.eu): 5 in the last 3600 secs
2020-06-13 16:59:40
attackspambots
Jun  7 14:07:50 game-panel sshd[16152]: Failed password for root from 51.75.28.134 port 49322 ssh2
Jun  7 14:11:31 game-panel sshd[16460]: Failed password for root from 51.75.28.134 port 52944 ssh2
2020-06-07 22:29:35
attack
SSH Honeypot -> SSH Bruteforce / Login
2020-05-29 03:33:55
attackbotsspam
May 19 11:55:46 pornomens sshd\[4859\]: Invalid user pyp from 51.75.28.134 port 43724
May 19 11:55:46 pornomens sshd\[4859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
May 19 11:55:47 pornomens sshd\[4859\]: Failed password for invalid user pyp from 51.75.28.134 port 43724 ssh2
...
2020-05-19 23:55:41
attackspambots
May 10 07:13:45 ncomp sshd[25117]: Invalid user doloczki from 51.75.28.134
May 10 07:13:45 ncomp sshd[25117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
May 10 07:13:45 ncomp sshd[25117]: Invalid user doloczki from 51.75.28.134
May 10 07:13:47 ncomp sshd[25117]: Failed password for invalid user doloczki from 51.75.28.134 port 37312 ssh2
2020-05-10 14:55:44
attackspam
May  7 08:21:02 163-172-32-151 sshd[14188]: Invalid user minecraft from 51.75.28.134 port 45582
...
2020-05-07 18:23:47
attackspambots
May  4 07:39:42 hosting sshd[27787]: Invalid user raghu from 51.75.28.134 port 38760
...
2020-05-04 13:10:03
attackbotsspam
May  2 09:48:25 localhost sshd\[21518\]: Invalid user cisco from 51.75.28.134
May  2 09:48:25 localhost sshd\[21518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
May  2 09:48:26 localhost sshd\[21518\]: Failed password for invalid user cisco from 51.75.28.134 port 50720 ssh2
May  2 09:52:30 localhost sshd\[21726\]: Invalid user sz from 51.75.28.134
May  2 09:52:30 localhost sshd\[21726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
...
2020-05-02 17:08:49
attackbotsspam
Apr 20 09:12:07 gw1 sshd[17264]: Failed password for root from 51.75.28.134 port 45620 ssh2
...
2020-04-20 12:58:37
attackbots
Apr 16 14:18:08 srv206 sshd[26067]: Invalid user exx from 51.75.28.134
Apr 16 14:18:08 srv206 sshd[26067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.ip-51-75-28.eu
Apr 16 14:18:08 srv206 sshd[26067]: Invalid user exx from 51.75.28.134
Apr 16 14:18:09 srv206 sshd[26067]: Failed password for invalid user exx from 51.75.28.134 port 42654 ssh2
...
2020-04-16 21:04:40
attackspam
Apr 15 17:12:39 h1745522 sshd[26963]: Invalid user admin from 51.75.28.134 port 41742
Apr 15 17:12:39 h1745522 sshd[26963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
Apr 15 17:12:39 h1745522 sshd[26963]: Invalid user admin from 51.75.28.134 port 41742
Apr 15 17:12:40 h1745522 sshd[26963]: Failed password for invalid user admin from 51.75.28.134 port 41742 ssh2
Apr 15 17:16:16 h1745522 sshd[27016]: Invalid user ubuntu from 51.75.28.134 port 49710
Apr 15 17:16:16 h1745522 sshd[27016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
Apr 15 17:16:16 h1745522 sshd[27016]: Invalid user ubuntu from 51.75.28.134 port 49710
Apr 15 17:16:18 h1745522 sshd[27016]: Failed password for invalid user ubuntu from 51.75.28.134 port 49710 ssh2
Apr 15 17:19:48 h1745522 sshd[27137]: Invalid user csmig from 51.75.28.134 port 57674
...
2020-04-16 00:24:48
attackspam
k+ssh-bruteforce
2020-04-13 20:18:34
attack
2020-03-23 07:31:13 server sshd[15855]: Failed password for invalid user n from 51.75.28.134 port 40486 ssh2
2020-03-24 01:12:08
attackspam
Mar 22 22:21:30 web9 sshd\[4548\]: Invalid user unk from 51.75.28.134
Mar 22 22:21:30 web9 sshd\[4548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
Mar 22 22:21:31 web9 sshd\[4548\]: Failed password for invalid user unk from 51.75.28.134 port 45088 ssh2
Mar 22 22:25:22 web9 sshd\[5204\]: Invalid user wangtingzhang from 51.75.28.134
Mar 22 22:25:22 web9 sshd\[5204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
2020-03-23 17:27:13
attackbotsspam
Mar 17 23:51:53 gw1 sshd[17823]: Failed password for root from 51.75.28.134 port 52426 ssh2
...
2020-03-18 03:10:56
attack
Mar  7 23:31:52 hosting sshd[14015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.ip-51-75-28.eu  user=root
Mar  7 23:31:54 hosting sshd[14015]: Failed password for root from 51.75.28.134 port 52962 ssh2
...
2020-03-08 05:36:27
attack
Mar  3 03:16:58 tdfoods sshd\[29590\]: Invalid user harry from 51.75.28.134
Mar  3 03:16:58 tdfoods sshd\[29590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.ip-51-75-28.eu
Mar  3 03:17:00 tdfoods sshd\[29590\]: Failed password for invalid user harry from 51.75.28.134 port 44022 ssh2
Mar  3 03:25:23 tdfoods sshd\[30276\]: Invalid user lasse from 51.75.28.134
Mar  3 03:25:23 tdfoods sshd\[30276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.ip-51-75-28.eu
2020-03-03 21:26:23
attack
Mar  2 23:16:56 tdfoods sshd\[10018\]: Invalid user nazrul from 51.75.28.134
Mar  2 23:16:56 tdfoods sshd\[10018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.ip-51-75-28.eu
Mar  2 23:16:58 tdfoods sshd\[10018\]: Failed password for invalid user nazrul from 51.75.28.134 port 60258 ssh2
Mar  2 23:25:11 tdfoods sshd\[10671\]: Invalid user confluence from 51.75.28.134
Mar  2 23:25:11 tdfoods sshd\[10671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.ip-51-75-28.eu
2020-03-03 17:25:58
Comments on same subnet:
IP Type Details Datetime
51.75.28.25 attackbotsspam
(sshd) Failed SSH login from 51.75.28.25 (FR/France/25.ip-51-75-28.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 29 12:21:50 optimus sshd[29206]: Invalid user manager from 51.75.28.25
Sep 29 12:21:51 optimus sshd[29206]: Failed password for invalid user manager from 51.75.28.25 port 43718 ssh2
Sep 29 12:23:17 optimus sshd[32147]: Invalid user manager from 51.75.28.25
Sep 29 12:23:19 optimus sshd[32147]: Failed password for invalid user manager from 51.75.28.25 port 57774 ssh2
Sep 29 12:25:40 optimus sshd[2899]: Invalid user test from 51.75.28.25
2020-09-30 09:58:42
51.75.28.25 attackbots
(sshd) Failed SSH login from 51.75.28.25 (FR/France/25.ip-51-75-28.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 29 12:21:50 optimus sshd[29206]: Invalid user manager from 51.75.28.25
Sep 29 12:21:51 optimus sshd[29206]: Failed password for invalid user manager from 51.75.28.25 port 43718 ssh2
Sep 29 12:23:17 optimus sshd[32147]: Invalid user manager from 51.75.28.25
Sep 29 12:23:19 optimus sshd[32147]: Failed password for invalid user manager from 51.75.28.25 port 57774 ssh2
Sep 29 12:25:40 optimus sshd[2899]: Invalid user test from 51.75.28.25
2020-09-30 02:52:27
51.75.28.25 attackbots
Sep 29 07:37:46 XXX sshd[30009]: Invalid user www from 51.75.28.25 port 39970
2020-09-29 18:55:04
51.75.28.25 attackspambots
Sep 10 03:57:17 s158375 sshd[371]: Failed password for invalid user dnjenga from 51.75.28.25 port 49886 ssh2
2020-09-10 23:54:43
51.75.28.25 attack
2020-09-10T12:20:20.241584hostname sshd[29496]: Failed password for root from 51.75.28.25 port 54456 ssh2
2020-09-10T12:24:00.895638hostname sshd[30500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-51-75-28.eu  user=root
2020-09-10T12:24:03.289713hostname sshd[30500]: Failed password for root from 51.75.28.25 port 60902 ssh2
...
2020-09-10 15:19:43
51.75.28.25 attackbotsspam
Sep  9 17:53:48 l02a sshd[2578]: Invalid user admin from 51.75.28.25
Sep  9 17:53:48 l02a sshd[2578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-51-75-28.eu 
Sep  9 17:53:48 l02a sshd[2578]: Invalid user admin from 51.75.28.25
Sep  9 17:53:50 l02a sshd[2578]: Failed password for invalid user admin from 51.75.28.25 port 57492 ssh2
2020-09-10 05:56:14
51.75.28.25 attackbots
Sep  7 05:10:37 db sshd[14101]: User root from 51.75.28.25 not allowed because none of user's groups are listed in AllowGroups
...
2020-09-07 16:06:58
51.75.28.25 attackspambots
Sep  6 22:24:05 vpn01 sshd[19736]: Failed password for root from 51.75.28.25 port 40248 ssh2
...
2020-09-07 08:29:02
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.75.28.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40098
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;51.75.28.134.			IN	A

;; AUTHORITY SECTION:
.			3428	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060200 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 02 21:57:11 CST 2019
;; MSG SIZE  rcvd: 116

Host info
134.28.75.51.in-addr.arpa domain name pointer 134.ip-51-75-28.eu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
134.28.75.51.in-addr.arpa	name = 134.ip-51-75-28.eu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
77.247.108.119 attackbotsspam
01/16/2020-04:03:23.074463 77.247.108.119 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 74
2020-01-16 17:27:54
80.99.180.169 attackbots
Jan 16 07:40:37 meumeu sshd[13642]: Failed password for root from 80.99.180.169 port 59724 ssh2
Jan 16 07:46:48 meumeu sshd[14722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.99.180.169 
Jan 16 07:46:50 meumeu sshd[14722]: Failed password for invalid user ht from 80.99.180.169 port 46106 ssh2
...
2020-01-16 17:32:00
82.84.130.79 attack
Unauthorised access (Jan 16) SRC=82.84.130.79 LEN=40 TTL=242 ID=24826 DF TCP DPT=8080 WINDOW=14600 SYN
2020-01-16 17:13:51
123.231.110.66 attackbotsspam
20/1/15@23:47:32: FAIL: Alarm-Network address from=123.231.110.66
...
2020-01-16 17:48:13
115.95.219.108 attack
Unauthorized connection attempt detected from IP address 115.95.219.108 to port 2220 [J]
2020-01-16 17:43:02
49.233.147.147 attackspambots
Unauthorized connection attempt detected from IP address 49.233.147.147 to port 2220 [J]
2020-01-16 17:53:51
104.245.145.39 attack
(From triggs.clinton17@gmail.com) Are You interested in advertising that costs less than $40 per month and sends tons of people who are ready to buy directly to your website? Visit: http://www.moreleadsandsales.xyz
2020-01-16 17:47:27
193.31.24.113 attack
01/16/2020-10:35:30.845084 193.31.24.113 Protocol: 6 ET CHAT IRC PONG response
2020-01-16 17:49:18
173.201.196.170 attackbotsspam
Automatic report - XMLRPC Attack
2020-01-16 17:33:07
207.154.224.55 attackspambots
207.154.224.55 has been banned for [WebApp Attack]
...
2020-01-16 17:24:21
104.149.143.178 attackbots
Unauthorized connection attempt detected from IP address 104.149.143.178 to port 445
2020-01-16 17:37:37
192.155.246.146 attackspambots
Jan 16 05:17:54 vmd26974 sshd[26396]: Failed password for root from 192.155.246.146 port 40560 ssh2
...
2020-01-16 17:38:34
49.234.25.49 attackbotsspam
Unauthorized connection attempt detected from IP address 49.234.25.49 to port 2220 [J]
2020-01-16 17:38:08
49.146.15.5 attack
Unauthorized connection attempt detected from IP address 49.146.15.5 to port 445
2020-01-16 17:46:55
14.161.8.220 attackbots
Jan 16 05:47:37 dev sshd\[5609\]: Invalid user admin from 14.161.8.220 port 33189
Jan 16 05:47:37 dev sshd\[5609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.8.220
Jan 16 05:47:39 dev sshd\[5609\]: Failed password for invalid user admin from 14.161.8.220 port 33189 ssh2
2020-01-16 17:45:21

Recently Reported IPs

132.150.237.87 73.127.247.3 84.91.231.5 56.101.59.0
68.60.2.159 65.153.28.216 31.220.214.210 197.144.66.118
212.175.209.94 188.76.37.30 206.43.155.21 172.43.43.127
113.206.70.239 200.13.189.162 27.139.221.128 2a02:2f08:840f:4400:3846:104b:8cef:d1a
184.189.69.109 67.251.243.202 151.94.10.94 182.45.120.150