This IP address has been reported a total of 2,141
times from 702 distinct
sources.
106.250.1.54 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-12-08T19:09:49.876970+02:00 BlackEyesRp1312 sshd[110410]: Invalid user matin from 106.250.1.54 ... show more2024-12-08T19:09:49.876970+02:00 BlackEyesRp1312 sshd[110410]: Invalid user matin from 106.250.1.54 port 53242
2024-12-08T19:09:49.881937+02:00 BlackEyesRp1312 sshd[110410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.1.54
2024-12-08T19:09:51.748006+02:00 BlackEyesRp1312 sshd[110410]: Failed password for invalid user matin from 106.250.1.54 port 53242 ssh2
2024-12-08T19:12:25.301153+02:00 BlackEyesRp1312 sshd[110515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.1.54 user=root
2024-12-08T19:12:26.916437+02:00 BlackEyesRp1312 sshd[110515]: Failed password for root from 106.250.1.54 port 48606 ssh2
... show less
Brute-ForceSSH
Anonymous
Dec 8 17:05:31 f2b auth.info sshd[8549]: Invalid user nav from 106.250.1.54 port 46940
Dec 8 ... show moreDec 8 17:05:31 f2b auth.info sshd[8549]: Invalid user nav from 106.250.1.54 port 46940
Dec 8 17:05:31 f2b auth.info sshd[8549]: Failed password for invalid user nav from 106.250.1.54 port 46940 ssh2
Dec 8 17:05:31 f2b auth.info sshd[8549]: Disconnected from invalid user nav 106.250.1.54 port 46940 [preauth]
... show less
2024-12-08T18:03:28.937400 phoenix sshd[1741416]: pam_unix(sshd:auth): authentication failure; logna ... show more2024-12-08T18:03:28.937400 phoenix sshd[1741416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.1.54
2024-12-08T18:03:31.165978 phoenix sshd[1741416]: Failed password for invalid user nav from 106.250.1.54 port 53774 ssh2
2024-12-08T18:03:33.012356 phoenix sshd[1741416]: Disconnected from invalid user nav 106.250.1.54 port 53774 [preauth]
... show less
Brute-ForceSSH
Anonymous
Dec 8 16:01:14 s1 sshd[1142053]: Invalid user arcadia from 106.250.1.54 port 56034
Dec 8 16: ... show moreDec 8 16:01:14 s1 sshd[1142053]: Invalid user arcadia from 106.250.1.54 port 56034
Dec 8 16:09:46 s1 sshd[1143940]: Invalid user dinesh from 106.250.1.54 port 33938
Dec 8 16:11:47 s1 sshd[1144187]: Invalid user smb from 106.250.1.54 port 60842
Dec 8 16:13:54 s1 sshd[1144454]: Invalid user bsc from 106.250.1.54 port 33918
Dec 8 16:16:00 s1 sshd[1144744]: Invalid user http from 106.250.1.54 port 48588 show less
2024-12-08T11:02:57.549980monsters1 sshd[24524]: pam_unix(sshd:auth): authentication failure; lognam ... show more2024-12-08T11:02:57.549980monsters1 sshd[24524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.1.54 user=root
2024-12-08T11:02:59.639875monsters1 sshd[24524]: Failed password for root from 106.250.1.54 port 35640 ssh2
2024-12-08T11:05:06.722057monsters1 sshd[24575]: Invalid user king from 106.250.1.54 port 41890
2024-12-08T11:05:06.732040monsters1 sshd[24575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.1.54
2024-12-08T11:05:08.530656monsters1 sshd[24575]: Failed password for invalid user king from 106.250.1.54 port 41890 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-12-08T23:56:38.666379+08:00 kltw-debian sshd[641581]: Invalid user arcadia from 106.250.1.54 po ... show more2024-12-08T23:56:38.666379+08:00 kltw-debian sshd[641581]: Invalid user arcadia from 106.250.1.54 port 43342
2024-12-08T23:56:38.712931+08:00 kltw-debian sshd[641581]: Disconnected from invalid user arcadia 106.250.1.54 port 43342 [preauth]
2024-12-09T00:00:11.100665+08:00 kltw-debian sshd[641602]: Disconnected from authenticating user root 106.250.1.54 port 57864 [preauth]
2024-12-09T00:02:17.520903+08:00 kltw-debian sshd[641618]: Invalid user king from 106.250.1.54 port 36514
2024-12-09T00:02:17.565056+08:00 kltw-debian sshd[641618]: Disconnected from invalid user king 106.250.1.54 port 36514 [preauth]
... show less
Multiple login attempts via RDP and/or SSH using wrong credentials. Attack automatically blocked by ... show moreMultiple login attempts via RDP and/or SSH using wrong credentials. Attack automatically blocked by SkyDancer Ai. EXT-SYS-4 show less