This IP address has been reported a total of 56
times from 47 distinct
sources.
106.243.245.202 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2023-07-02T10:42:48.767940-05:00 nio.local.lan sshd[65696]: Invalid user admin from 106.243.245.202 ... show more2023-07-02T10:42:48.767940-05:00 nio.local.lan sshd[65696]: Invalid user admin from 106.243.245.202 port 34717
2023-07-02T10:42:48.973113-05:00 nio.local.lan sshd[65696]: Connection closed by invalid user admin 106.243.245.202 port 34717 [preauth]
... show less
2023-07-02 15:06:05 - Unauthorized SFTP/SSH access attempts from IP address 106.243.245.202 on port ... show more2023-07-02 15:06:05 - Unauthorized SFTP/SSH access attempts from IP address 106.243.245.202 on port 22 (2 daily hits). show less
Jul 1 22:02:34 jackstringer sshd[1790075]: Invalid user none from 106.243.245.202 port 42370
... show moreJul 1 22:02:34 jackstringer sshd[1790075]: Invalid user none from 106.243.245.202 port 42370
Jul 1 22:02:34 jackstringer sshd[1790075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.245.202
Jul 1 22:02:36 jackstringer sshd[1790075]: Failed password for invalid user none from 106.243.245.202 port 42370 ssh2
... show less
(sshd) Failed SSH login from 106.243.245.202 (KR/South Korea/-): 1 in the last 3600 secs; Ports: *; ... show more(sshd) Failed SSH login from 106.243.245.202 (KR/South Korea/-): 1 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_TRIGGER; Logs: Jul 1 17:57:48 relais-sgp1-01 sshd[376332]: Invalid user admin from 106.243.245.202 port 35870 show less
2023-06-28T17:21:45.750700+02:00 agentcobra sshd[626736]: pam_unix(sshd:auth): authentication failur ... show more2023-06-28T17:21:45.750700+02:00 agentcobra sshd[626736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.245.202
2023-06-28T17:21:47.972461+02:00 agentcobra sshd[626736]: Failed password for AD user supervisor from 106.243.245.202 port 56400 ssh2
........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.243.245.202 show less
FTP Brute-ForceHacking
Anonymous
Trying ports that it shouldn't be.
Port ScanHackingExploited Host
Anonymous
Jun 30 22:09:50 logopedia-1vcpu-1gb-nyc1-01 sshd[1359211]: Invalid user Administrator from 106.243.2 ... show moreJun 30 22:09:50 logopedia-1vcpu-1gb-nyc1-01 sshd[1359211]: Invalid user Administrator from 106.243.245.202 port 42052
... show less
Jun 30 08:19:51 ds13592 sshd[32199]: Invalid user 888888 from 106.243.245.202 port 53568
Jun 3 ... show moreJun 30 08:19:51 ds13592 sshd[32199]: Invalid user 888888 from 106.243.245.202 port 53568
Jun 30 08:19:51 ds13592 sshd[32199]: Invalid user 888888 from 106.243.245.202 port 53568
Jun 30 08:19:51 ds13592 sshd[32199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.245.202
Jun 30 08:19:51 ds13592 sshd[32199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.245.202 show less