This IP address has been reported a total of 10,802
times from 1,341 distinct
sources.
106.12.133.92 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Mar 26 14:29:53 ouranos sshd[6251]: Invalid user install from 106.12.133.92 port 40402
Mar 26 ... show moreMar 26 14:29:53 ouranos sshd[6251]: Invalid user install from 106.12.133.92 port 40402
Mar 26 14:40:58 ouranos sshd[8491]: Invalid user t128 from 106.12.133.92 port 45428
Mar 26 14:42:10 ouranos sshd[8687]: Invalid user intelbras from 106.12.133.92 port 35254
... show less
2025-03-26T13:27:46.989522ls.fionamaguire-art.com sshd[24216]: Invalid user install from 106.12.133. ... show more2025-03-26T13:27:46.989522ls.fionamaguire-art.com sshd[24216]: Invalid user install from 106.12.133.92 port 36108
... show less
2025-03-26T12:53:29.249503 Sodium sshd[1358266]: pam_unix(sshd:auth): authentication failure; lognam ... show more2025-03-26T12:53:29.249503 Sodium sshd[1358266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.92
2025-03-26T12:53:30.733155 Sodium sshd[1358266]: Failed password for invalid user bhanu from 106.12.133.92 port 44838 ssh2
2025-03-26T12:58:26.073109 Sodium sshd[1364384]: Invalid user mysql from 106.12.133.92 port 37986
... show less
2025-03-26T11:14:28.460523+00:00 de-fra2-git1 sshd[3727293]: Invalid user sftpshare from 106.12.133. ... show more2025-03-26T11:14:28.460523+00:00 de-fra2-git1 sshd[3727293]: Invalid user sftpshare from 106.12.133.92 port 52432
2025-03-26T11:33:00.230460+00:00 de-fra2-git1 sshd[3733920]: Invalid user user from 106.12.133.92 port 40106
2025-03-26T11:33:45.536080+00:00 de-fra2-git1 sshd[3734178]: Invalid user nksystem from 106.12.133.92 port 51548
... show less
Mar 26 10:45:28 nsmailweb sshd[1390473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMar 26 10:45:28 nsmailweb sshd[1390473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.92
Mar 26 10:45:30 nsmailweb sshd[1390473]: Failed password for invalid user jing from 106.12.133.92 port 47558 ssh2
... show less
2025-03-26T07:08:39.741692+00:00 ssh sshd[1140786]: Failed password for invalid user habib from 106. ... show more2025-03-26T07:08:39.741692+00:00 ssh sshd[1140786]: Failed password for invalid user habib from 106.12.133.92 port 49216 ssh2
2025-03-26T07:12:57.888090+00:00 ssh sshd[1142308]: Invalid user jenkins from 106.12.133.92 port 40932
2025-03-26T07:12:57.893646+00:00 ssh sshd[1142308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.92
2025-03-26T07:12:59.971169+00:00 ssh sshd[1142308]: Failed password for invalid user jenkins from 106.12.133.92 port 40932 ssh2
... show less
2025-03-26T01:50:19.545452 mail001 sshd[570644]: pam_unix(sshd:auth): authentication failure; lognam ... show more2025-03-26T01:50:19.545452 mail001 sshd[570644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.92
2025-03-26T01:50:21.859350 mail001 sshd[570644]: Failed password for invalid user student07 from 106.12.133.92 port 49434 ssh2
2025-03-26T01:52:50.361158 mail001 sshd[570653]: Invalid user zs from 106.12.133.92 port 48288
... show less
Report 1651131 with IP 1920529 for SSH brute-force attack by source 2391616 via ssh-honeypot/0.2.0+h ... show moreReport 1651131 with IP 1920529 for SSH brute-force attack by source 2391616 via ssh-honeypot/0.2.0+http show less
Mar 26 05:31:36 cow sshd[2045053]: Failed password for invalid user sahark from 106.12.133.92 port 4 ... show moreMar 26 05:31:36 cow sshd[2045053]: Failed password for invalid user sahark from 106.12.133.92 port 41380 ssh2
Mar 26 05:32:48 cow sshd[2046056]: Invalid user bbs from 106.12.133.92 port 59066
Mar 26 05:32:48 cow sshd[2046056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.92
Mar 26 05:32:50 cow sshd[2046056]: Failed password for invalid user bbs from 106.12.133.92 port 59066 ssh2
Mar 26 05:33:57 cow sshd[2046829]: Invalid user super from 106.12.133.92 port 48524
... show less
This IP address carried out 248 port scanning attempts on 25-03-2025. For more information or to rep ... show moreThis IP address carried out 248 port scanning attempts on 25-03-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less