This IP address has been reported a total of 309
times from 178 distinct
sources.
104.168.57.106 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
This IP address carried out 110 SSH credential attack (attempts) on 04-10-2023. For more information ... show moreThis IP address carried out 110 SSH credential attack (attempts) on 04-10-2023. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
2023-10-07T06:09:40.694449+00:00 Linux08 sshd[501828]: Failed password for invalid user rails from 1 ... show more2023-10-07T06:09:40.694449+00:00 Linux08 sshd[501828]: Failed password for invalid user rails from 104.168.57.106 port 47238 ssh2
2023-10-07T06:11:02.888939+00:00 Linux08 sshd[506376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.57.106 user=root
2023-10-07T06:11:04.946469+00:00 Linux08 sshd[506376]: Failed password for root from 104.168.57.106 port 48412 ssh2
2023-10-07T06:12:26.840463+00:00 Linux08 sshd[510877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.57.106 user=root
2023-10-07T06:12:28.431379+00:00 Linux08 sshd[510877]: Failed password for root from 104.168.57.106 port 49582 ssh2
2023-10-07T06:13:48.832033+00:00 Linux08 sshd[515144]: Invalid user jimmy from 104.168.57.106 port 50752
2023-10-07T06:13:48.834190+00:00 Linux08 sshd[515144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.57.106
2023-10-07T06:13:51.348890+00:00 Lin
... show less
Brute-ForceSSH
Anonymous
Oct 7 06:07:23 f2b auth.info sshd[62293]: Failed password for root from 104.168.57.106 port 55066 s ... show moreOct 7 06:07:23 f2b auth.info sshd[62293]: Failed password for root from 104.168.57.106 port 55066 ssh2
Oct 7 06:09:03 f2b auth.info sshd[62295]: Invalid user app from 104.168.57.106 port 58440
Oct 7 06:09:03 f2b auth.info sshd[62295]: Failed password for invalid user app from 104.168.57.106 port 58440 ssh2
... show less
Oct 7 05:46:05 instance-20221219-1303 sshd[1824944]: Invalid user fanjiahui from 104.168.57.106 por ... show moreOct 7 05:46:05 instance-20221219-1303 sshd[1824944]: Invalid user fanjiahui from 104.168.57.106 port 44484
... show less
Oct 7 05:31:03 instance-20221219-1303 sshd[1824724]: Invalid user guest from 104.168.57.106 port 58 ... show moreOct 7 05:31:03 instance-20221219-1303 sshd[1824724]: Invalid user guest from 104.168.57.106 port 58586
... show less
This IP address carried out 133 SSH credential attack (attempts) on 06-10-2023. For more information ... show moreThis IP address carried out 133 SSH credential attack (attempts) on 06-10-2023. For more information or to report interesting/incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
This IP address carried out 669 port scanning attempts on 06-10-2023. For more information or to rep ... show moreThis IP address carried out 669 port scanning attempts on 06-10-2023. For more information or to report interesting/incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
Oct 7 05:15:23 instance-20221219-1303 sshd[1824481]: Invalid user tests from 104.168.57.106 port 39 ... show moreOct 7 05:15:23 instance-20221219-1303 sshd[1824481]: Invalid user tests from 104.168.57.106 port 39002
... show less
Brute-ForceSSH
Anonymous
Oct 7 04:29:31 de-fra2-nc2 sshd[1305338]: Invalid user dan from 104.168.57.106 port 38522
Oct ... show moreOct 7 04:29:31 de-fra2-nc2 sshd[1305338]: Invalid user dan from 104.168.57.106 port 38522
Oct 7 04:31:52 de-fra2-nc2 sshd[1305357]: Invalid user ts from 104.168.57.106 port 46924
Oct 7 04:34:32 de-fra2-nc2 sshd[1305401]: Invalid user xip from 104.168.57.106 port 48662
... show less
Oct 7 04:13:56 xproot sshd[1996698]: Failed password for root from 104.168.57.106 port 33974 ssh2<b ... show moreOct 7 04:13:56 xproot sshd[1996698]: Failed password for root from 104.168.57.106 port 33974 ssh2
Oct 7 04:15:18 xproot sshd[1996712]: Invalid user upload from 104.168.57.106 port 34896
Oct 7 04:15:18 xproot sshd[1996712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.57.106
Oct 7 04:15:20 xproot sshd[1996712]: Failed password for invalid user upload from 104.168.57.106 port 34896 ssh2
Oct 7 04:16:43 xproot sshd[1996728]: Invalid user ec2 from 104.168.57.106 port 35816
... show less
Oct 7 04:00:34 xproot sshd[1996492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreOct 7 04:00:34 xproot sshd[1996492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.57.106
Oct 7 04:00:36 xproot sshd[1996492]: Failed password for invalid user yum from 104.168.57.106 port 53000 ssh2
Oct 7 04:01:56 xproot sshd[1996510]: Invalid user f from 104.168.57.106 port 53924
Oct 7 04:01:56 xproot sshd[1996510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.57.106
Oct 7 04:01:58 xproot sshd[1996510]: Failed password for invalid user f from 104.168.57.106 port 53924 ssh2
... show less
Oct 7 03:47:14 xproot sshd[1996342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreOct 7 03:47:14 xproot sshd[1996342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.57.106 user=root
Oct 7 03:47:16 xproot sshd[1996342]: Failed password for root from 104.168.57.106 port 43760 ssh2
Oct 7 03:48:32 xproot sshd[1996354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.57.106 user=root
Oct 7 03:48:34 xproot sshd[1996354]: Failed password for root from 104.168.57.106 port 44690 ssh2
Oct 7 03:49:53 xproot sshd[1996364]: Invalid user pim from 104.168.57.106 port 45610
... show less