This IP address has been reported a total of 576
times from 298 distinct
sources.
106.124.129.246 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Aug 16 14:46:03 Torux sshd[392380]: Invalid user hsi from 106.124.129.246 port 51362
Aug 16 14 ... show moreAug 16 14:46:03 Torux sshd[392380]: Invalid user hsi from 106.124.129.246 port 51362
Aug 16 14:46:03 Torux sshd[392380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
Aug 16 14:46:04 Torux sshd[392380]: Failed password for invalid user hsi from 106.124.129.246 port 51362 ssh2
Aug 16 14:50:33 Torux sshd[397727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246 user=root
Aug 16 14:50:35 Torux sshd[397727]: Failed password for root from 106.124.129.246 port 59336 ssh2
... show less
2024-08-16T11:32:15.844058fra sshd[203188]: Invalid user valeria from 106.124.129.246 port 44608<br ... show more2024-08-16T11:32:15.844058fra sshd[203188]: Invalid user valeria from 106.124.129.246 port 44608
2024-08-16T11:32:15.848902fra sshd[203188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
2024-08-16T11:32:17.661497fra sshd[203188]: Failed password for invalid user valeria from 106.124.129.246 port 44608 ssh2
2024-08-16T11:32:46.145333fra sshd[203193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246 user=root
2024-08-16T11:32:48.550843fra sshd[203193]: Failed password for root from 106.124.129.246 port 50228 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 16 10:17:02 s158416 sshd[3493852]: Failed password for invalid user VPN from 106.124.129.246 por ... show moreAug 16 10:17:02 s158416 sshd[3493852]: Failed password for invalid user VPN from 106.124.129.246 port 46306 ssh2
Aug 16 10:18:06 s158416 sshd[3494190]: Invalid user xmldme from 106.124.129.246 port 59612
Aug 16 10:18:06 s158416 sshd[3494190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
Aug 16 10:18:06 s158416 sshd[3494190]: Invalid user xmldme from 106.124.129.246 port 59612
Aug 16 10:18:09 s158416 sshd[3494190]: Failed password for invalid user xmldme from 106.124.129.246 port 59612 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 16 09:52:27 s158416 sshd[3485324]: Failed password for invalid user otrs from 106.124.129.246 po ... show moreAug 16 09:52:27 s158416 sshd[3485324]: Failed password for invalid user otrs from 106.124.129.246 port 37614 ssh2
Aug 16 09:53:31 s158416 sshd[3485694]: Invalid user jaka from 106.124.129.246 port 50920
Aug 16 09:53:31 s158416 sshd[3485694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
Aug 16 09:53:31 s158416 sshd[3485694]: Invalid user jaka from 106.124.129.246 port 50920
Aug 16 09:53:34 s158416 sshd[3485694]: Failed password for invalid user jaka from 106.124.129.246 port 50920 ssh2
... show less
Brute-ForceSSH
Anonymous
Fail2Ban SSH
Brute-ForceSSH
Anonymous
Aug 16 10:34:07 wolf1 sshd[1902867]: Invalid user zhuhong from 106.124.129.246 port 56602
Aug ... show moreAug 16 10:34:07 wolf1 sshd[1902867]: Invalid user zhuhong from 106.124.129.246 port 56602
Aug 16 10:35:28 wolf1 sshd[1902949]: Invalid user test from 106.124.129.246 port 38742
Aug 16 10:37:19 wolf1 sshd[1903066]: Invalid user oracle from 106.124.129.246 port 43984
Aug 16 10:39:04 wolf1 sshd[1903206]: Invalid user ubuntu from 106.124.129.246 port 59530
Aug 16 10:39:30 wolf1 sshd[1903235]: Invalid user nu from 106.124.129.246 port 36470
... show less
DDoS AttackFTP Brute-ForcePort ScanHackingSQL InjectionSpoofingBrute-ForceBad Web BotSSHIoT Targeted
[rede-44-49] (sshd) Failed SSH login from 106.124.129.246 (CN/China/-): 5 in the last 3600 secs; Por ... show more[rede-44-49] (sshd) Failed SSH login from 106.124.129.246 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 16 00:30:04 sshd[25280]: Invalid user [USERNAME] from 106.124.129.246 port 49654
Aug 16 00:30:06 sshd[25280]: Failed password for invalid user [USERNAME] from 106.124.129.246 port 49654 ssh2
Aug 16 00:37:13 sshd[25913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246 user=[USERNAME]
Aug 16 00:37:16 sshd[25913]: Failed password for [USERNAME] from 106.124.129.246 port 43416 ssh2
Aug 16 00:37:51 sshd[25975]: Invalid user [USERNAME] from show less
Port Scan
Anonymous
2024-08-16T02:09:34.705803+02:00 mordor sshd[966606]: Invalid user ts from 106.124.129.246 port 6033 ... show more2024-08-16T02:09:34.705803+02:00 mordor sshd[966606]: Invalid user ts from 106.124.129.246 port 60332
2024-08-16T02:09:35.003934+02:00 mordor sshd[966606]: Disconnected from invalid user ts 106.124.129.246 port 60332 [preauth]
2024-08-16T02:18:14.980403+02:00 mordor sshd[966645]: Disconnected from authenticating user root 106.124.129.246 port 36050 [preauth]
... show less
Aug 16 00:13:07 webo sshd[129295]: Invalid user ts from 106.124.129.246 port 32978
Aug 16 00:1 ... show moreAug 16 00:13:07 webo sshd[129295]: Invalid user ts from 106.124.129.246 port 32978
Aug 16 00:13:07 webo sshd[129295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
... show less
2024-08-15T18:33:31.094562-05:00 instance-20240522-152753 sshd[1130105]: Invalid user al from 106.12 ... show more2024-08-15T18:33:31.094562-05:00 instance-20240522-152753 sshd[1130105]: Invalid user al from 106.124.129.246 port 57466
2024-08-15T18:33:51.307900-05:00 instance-20240522-152753 sshd[1130118]: Invalid user curtis from 106.124.129.246 port 33024
2024-08-15T18:34:52.958061-05:00 instance-20240522-152753 sshd[1130151]: Invalid user wma from 106.124.129.246 port 44392
2024-08-15T18:35:15.520108-05:00 instance-20240522-152753 sshd[1130189]: Invalid user nadege from 106.124.129.246 port 48184
... show less
SSH Brute force: 11 attempts were recorded from 106.124.129.246
2024-08-16T01:22:57+02:00 Conn ... show moreSSH Brute force: 11 attempts were recorded from 106.124.129.246
2024-08-16T01:22:57+02:00 Connection from 106.124.129.246 port 49904 on <redacted> port 22 rdomain ""
2024-08-16T01:22:58+02:00 Invalid user sci from 106.124.129.246 port 49904
2024-08-16T01:22:58+02:00 Disconnected from invalid user sci 106.124.129.246 port 49904 [preauth]
2024-08-16T01:32:44+02:00 Disconnected from authenticating user root 106.124.129.246 port 51946 [preauth]
2024-08-16T01:33:04+02:00 Connection from 106.124.129.246 port 55734 on <redacted> port 22 rdomain ""
2024-08-16T01:33:05+02:00 Invalid user centos from 106.124.129.246 port 55734
2024-08-16T01:33:05+02:00 Disconnected from invalid user centos 106.124.129.246 port 55734 [preauth]
2024-08-16T01:33:29+02:00 Connection from 106.124.129.246 port 59528 on <redacted> port 22 rdomain ""
2024-08-16T01:33:31+02:00 Invalid user al from 106.124.129.246 port 5952 show less
Brute-ForceSSH
Anonymous
2024-08-15T22:46:28.038997front1.int sshd[222389]: Invalid user tibco from 106.124.129.246 port 5860 ... show more2024-08-15T22:46:28.038997front1.int sshd[222389]: Invalid user tibco from 106.124.129.246 port 58606
2024-08-15T22:46:28.042703front1.int sshd[222389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246
2024-08-15T22:46:30.131842front1.int sshd[222389]: Failed password for invalid user tibco from 106.124.129.246 port 58606 ssh2
2024-08-15T22:48:43.296200front1.int sshd[223477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246 user=root
2024-08-15T22:48:45.588394front1.int sshd[223477]: Failed password for root from 106.124.129.246 port 44622 ssh2
... show less
(sshd) Failed SSH login from 106.124.129.246 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direct ... show more(sshd) Failed SSH login from 106.124.129.246 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Aug 15 21:59:43 24110 sshd[21175]: Invalid user mayumi from 106.124.129.246 port 56288
Aug 15 21:59:45 24110 sshd[21175]: Failed password for invalid user mayumi from 106.124.129.246 port 56288 ssh2
Aug 15 22:03:19 24110 sshd[21474]: Invalid user hy from 106.124.129.246 port 52150
Aug 15 22:03:21 24110 sshd[21474]: Failed password for invalid user hy from 106.124.129.246 port 52150 ssh2
Aug 15 22:03:47 24110 sshd[21479]: Invalid user adsl from 106.124.129.246 port 57648 show less
106.124.129.246 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Po ... show more106.124.129.246 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_DISTATTACK; Logs: Aug 15 16:25:08 13895 sshd[26627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.129.246 user=root
Aug 15 15:57:58 13895 sshd[24512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.107.119.116 user=root
Aug 15 15:58:00 13895 sshd[24512]: Failed password for root from 47.107.119.116 port 59996 ssh2
Aug 15 15:58:04 13895 sshd[24512]: Failed password for root from 47.107.119.116 port 59996 ssh2
Aug 15 15:58:08 13895 sshd[24512]: Failed password for root from 47.107.119.116 port 59996 ssh2
Aug 15 15:58:10 13895 sshd[24512]: Failed password for root from 47.107.119.116 port 59996 ssh2