This IP address has been reported a total of 576
times from 298 distinct
sources.
106.124.129.246 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Sep 18 07:11:45 24fire sshd[68401]: Failed password for invalid user admin from 106.124.129.246 port ... show moreSep 18 07:11:45 24fire sshd[68401]: Failed password for invalid user admin from 106.124.129.246 port 49512 ssh2
Sep 18 07:22:18 24fire sshd[68477]: Invalid user server from 106.124.129.246 port 40168
Sep 18 07:22:18 24fire sshd[68477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
Sep 18 07:22:20 24fire sshd[68477]: Failed password for invalid user server from 106.124.129.246 port 40168 ssh2
Sep 18 07:23:05 24fire sshd[68480]: Invalid user frappe from 106.124.129.246 port 48666
... show less
Sep 17 23:25:37 cm0app00 sshd[3368121]: Invalid user reza from 106.124.129.246 port 46798
Sep ... show moreSep 17 23:25:37 cm0app00 sshd[3368121]: Invalid user reza from 106.124.129.246 port 46798
Sep 17 23:31:06 cm0app00 sshd[3370762]: Invalid user deploy from 106.124.129.246 port 41024
Sep 17 23:32:05 cm0app00 sshd[3371234]: Invalid user user from 106.124.129.246 port 55218
Sep 17 23:33:07 cm0app00 sshd[3371711]: Invalid user student from 106.124.129.246 port 41184
Sep 17 23:34:04 cm0app00 sshd[3372183]: Invalid user alex from 106.124.129.246 port 55374
... show less
2024-09-17T22:35:09.411824-04:00 ariazonaa sshd[108665]: Invalid user admin1 from 106.124.129.246 po ... show more2024-09-17T22:35:09.411824-04:00 ariazonaa sshd[108665]: Invalid user admin1 from 106.124.129.246 port 45106
2024-09-17T22:36:30.975219-04:00 ariazonaa sshd[108697]: Invalid user ubuntu from 106.124.129.246 port 59822
... show less
Sep 18 09:15:37 vmi585337 sshd[3999613]: Failed password for invalid user admin from 106.124.129.246 ... show moreSep 18 09:15:37 vmi585337 sshd[3999613]: Failed password for invalid user admin from 106.124.129.246 port 32880 ssh2
Sep 18 09:17:37 vmi585337 sshd[4000350]: Invalid user alex from 106.124.129.246 port 59304
Sep 18 09:17:37 vmi585337 sshd[4000350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
Sep 18 09:17:39 vmi585337 sshd[4000350]: Failed password for invalid user alex from 106.124.129.246 port 59304 ssh2
Sep 18 09:19:22 vmi585337 sshd[4000858]: Invalid user frappe from 106.124.129.246 port 56236
... show less
Brute-ForceSSH
Anonymous
Sep 18 01:16:15 s158416 sshd[3376095]: Invalid user ftpuser from 106.124.129.246 port 51642
Se ... show moreSep 18 01:16:15 s158416 sshd[3376095]: Invalid user ftpuser from 106.124.129.246 port 51642
Sep 18 01:16:15 s158416 sshd[3376095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
Sep 18 01:16:15 s158416 sshd[3376095]: Invalid user ftpuser from 106.124.129.246 port 51642
Sep 18 01:16:17 s158416 sshd[3376095]: Failed password for invalid user ftpuser from 106.124.129.246 port 51642 ssh2
Sep 18 01:17:15 s158416 sshd[3376469]: Invalid user alex from 106.124.129.246 port 35996
... show less
Sep 18 03:15:06 choloepus sshd[4050739]: Invalid user admin from 106.124.129.246 port 38044
Se ... show moreSep 18 03:15:06 choloepus sshd[4050739]: Invalid user admin from 106.124.129.246 port 38044
Sep 18 03:15:06 choloepus sshd[4050739]: Disconnected from invalid user admin 106.124.129.246 port 38044 [preauth]
Sep 18 03:16:33 choloepus sshd[4052222]: Invalid user ftpuser from 106.124.129.246 port 54480
... show less
Sep 18 01:24:49 odin sshd[591038]: Invalid user matt from 106.124.129.246 port 43284
Sep 18 01 ... show moreSep 18 01:24:49 odin sshd[591038]: Invalid user matt from 106.124.129.246 port 43284
Sep 18 01:24:49 odin sshd[591038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
Sep 18 01:24:51 odin sshd[591038]: Failed password for invalid user matt from 106.124.129.246 port 43284 ssh2
Sep 18 01:24:56 odin sshd[590904]: Connection reset by 106.124.129.246 port 35008 [preauth]
Sep 18 01:33:51 odin sshd[593265]: Connection reset by 106.124.129.246 port 57886 [preauth] show less
Sep 17 23:22:17 h18 sshd[771116]: Failed password for invalid user test2 from 106.124.129.246 port 3 ... show moreSep 17 23:22:17 h18 sshd[771116]: Failed password for invalid user test2 from 106.124.129.246 port 36684 ssh2
Sep 17 23:25:56 h18 sshd[771576]: Invalid user ubuntu from 106.124.129.246 port 42668
Sep 17 23:25:56 h18 sshd[771576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
Sep 17 23:25:58 h18 sshd[771576]: Failed password for invalid user ubuntu from 106.124.129.246 port 42668 ssh2
Sep 17 23:26:49 h18 sshd[771697]: Invalid user odoo from 106.124.129.246 port 54166
... show less
2024-09-17T16:23:01.503946-05:00 debian-hel1 sshd[98895]: pam_unix(sshd:auth): authentication failur ... show more2024-09-17T16:23:01.503946-05:00 debian-hel1 sshd[98895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
2024-09-17T16:23:03.655360-05:00 debian-hel1 sshd[98895]: Failed password for invalid user test2 from 106.124.129.246 port 38646 ssh2
2024-09-17T16:26:01.306445-05:00 debian-hel1 sshd[98909]: Invalid user ubuntu from 106.124.129.246 port 39098
... show less