This IP address has been reported a total of 377
times from 225 distinct
sources.
106.52.223.114 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-26T04:01:21.270360hz21.yumianalyticsweb.com sshd[6981]: Invalid user superman from 106.52.22 ... show more2024-09-26T04:01:21.270360hz21.yumianalyticsweb.com sshd[6981]: Invalid user superman from 106.52.223.114 port 34077
2024-09-26T04:04:54.523413hz21.yumianalyticsweb.com sshd[7023]: Invalid user test01 from 106.52.223.114 port 33723
2024-09-26T04:05:46.147911hz21.yumianalyticsweb.com sshd[7028]: Invalid user testuser from 106.52.223.114 port 57709
... show less
Sep 26 03:37:25 v2202301167543214332 sshd[2855337]: Failed password for root from 106.52.223.114 por ... show moreSep 26 03:37:25 v2202301167543214332 sshd[2855337]: Failed password for root from 106.52.223.114 port 47145 ssh2
Sep 26 03:37:50 v2202301167543214332 sshd[2855354]: Invalid user thomas from 106.52.223.114 port 40018
Sep 26 03:37:50 v2202301167543214332 sshd[2855354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
Sep 26 03:37:50 v2202301167543214332 sshd[2855354]: Invalid user thomas from 106.52.223.114 port 40018
Sep 26 03:37:52 v2202301167543214332 sshd[2855354]: Failed password for invalid user thomas from 106.52.223.114 port 40018 ssh2
... show less
DDoS AttackPing of DeathWeb SpamEmail SpamBrute-ForceBad Web BotSSH
Sep 25 17:31:45 dagasistemas sshd[4854]: Invalid user sysadmin from 106.52.223.114 port 25840
... show moreSep 25 17:31:45 dagasistemas sshd[4854]: Invalid user sysadmin from 106.52.223.114 port 25840
Sep 25 17:31:45 dagasistemas sshd[4854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
Sep 25 17:31:47 dagasistemas sshd[4854]: Failed password for invalid user sysadmin from 106.52.223.114 port 25840 ssh2
... show less
2024-09-25T13:33:13.354710+00:00 minio-fra-01.pdx.net.uk sshd[84538]: Invalid user test from 106.52. ... show more2024-09-25T13:33:13.354710+00:00 minio-fra-01.pdx.net.uk sshd[84538]: Invalid user test from 106.52.223.114 port 46188
2024-09-25T13:43:00.490567+00:00 minio-fra-01.pdx.net.uk sshd[84683]: Invalid user user from 106.52.223.114 port 54669
2024-09-25T13:43:33.835861+00:00 minio-fra-01.pdx.net.uk sshd[84699]: Invalid user sopuser from 106.52.223.114 port 54670
... show less
2024-09-25T11:37:37.044379+02:00 vmi985635.contaboserver.net sshd[895830]: Failed password for inval ... show more2024-09-25T11:37:37.044379+02:00 vmi985635.contaboserver.net sshd[895830]: Failed password for invalid user svn from 106.52.223.114 port 18883 ssh2
2024-09-25T11:39:53.602795+02:00 vmi985635.contaboserver.net sshd[895903]: Invalid user nexus from 106.52.223.114 port 38276
2024-09-25T11:39:53.609384+02:00 vmi985635.contaboserver.net sshd[895903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
2024-09-25T11:39:55.220189+02:00 vmi985635.contaboserver.net sshd[895903]: Failed password for invalid user nexus from 106.52.223.114 port 38276 ssh2
2024-09-25T11:40:23.276074+02:00 vmi985635.contaboserver.net sshd[895932]: Invalid user tg from 106.52.223.114 port 5498
... show less