Check whether these attempts were all made from different IP addresses
In such case this was/is a DOS (denial of service) attack.
a.) experienced a Port Scan (such as by nmap or similar software... nmap seen here--> http://www.insecure.org/nmap/)
b.) Is experiencing someone (or a group of people) trying to login to this router using the RSHELL port (TCP port 512).
This could be a DOS (Denial Of Service) attack.
There is a write up on this on Cisco's homepage at these locations...
http://www.cisco.com/warp/public/707/21.html
http://www.cisco.com/warp/public/707/22.html
These will help identify the type of DOS attack going on and how to defend against it.
Basically the Router should only accept TCP connections from known IP addresses, and not just anywhere.
One method to resolve this attach would be to impliment Access lists.
I did not see any config indicating that you are supporting RSHELL configs.
So what you will want to do is block the RSHELL destination port (512) with an access list.
--> Here is an "example" of an access list that could be used to block the RSHELL connection attempts -->
access-list 151 deny tcp any any eq 512
access-list 151 permit ip any any
You will want to apply this to the outbound interface of the device nearest the host in question.
An example of this would be-->
interface POS11/0/0
IP access-group 151 out