This IP address has been reported a total of 377
times from 225 distinct
sources.
106.52.223.114 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Invalid user support from 106.52.223.114 port 51074
Brute-ForceSSH
Anonymous
Sep 24 18:32:23 s158416 sshd[2572841]: Invalid user username from 106.52.223.114 port 14639
Se ... show moreSep 24 18:32:23 s158416 sshd[2572841]: Invalid user username from 106.52.223.114 port 14639
Sep 24 18:32:23 s158416 sshd[2572841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
Sep 24 18:32:23 s158416 sshd[2572841]: Invalid user username from 106.52.223.114 port 14639
Sep 24 18:32:25 s158416 sshd[2572841]: Failed password for invalid user username from 106.52.223.114 port 14639 ssh2
Sep 24 18:33:11 s158416 sshd[2573148]: Invalid user acer from 106.52.223.114 port 2002
... show less
Sep 25 02:05:51 vmi585337 sshd[4048402]: Failed password for invalid user test from 106.52.223.114 p ... show moreSep 25 02:05:51 vmi585337 sshd[4048402]: Failed password for invalid user test from 106.52.223.114 port 5777 ssh2
Sep 25 02:08:38 vmi585337 sshd[4049262]: Invalid user thomas from 106.52.223.114 port 53207
Sep 25 02:08:38 vmi585337 sshd[4049262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
Sep 25 02:08:41 vmi585337 sshd[4049262]: Failed password for invalid user thomas from 106.52.223.114 port 53207 ssh2
Sep 25 02:09:26 vmi585337 sshd[4049728]: Invalid user test from 106.52.223.114 port 38210
... show less
Brute-ForceSSH
Anonymous
Sep 24 18:08:35 s158416 sshd[2564181]: Invalid user thomas from 106.52.223.114 port 16965
Sep ... show moreSep 24 18:08:35 s158416 sshd[2564181]: Invalid user thomas from 106.52.223.114 port 16965
Sep 24 18:08:35 s158416 sshd[2564181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
Sep 24 18:08:35 s158416 sshd[2564181]: Invalid user thomas from 106.52.223.114 port 16965
Sep 24 18:08:37 s158416 sshd[2564181]: Failed password for invalid user thomas from 106.52.223.114 port 16965 ssh2
Sep 24 18:09:24 s158416 sshd[2564572]: Invalid user test from 106.52.223.114 port 47717
... show less
Invalid user hadoop from 106.52.223.114 port 27256
Brute-ForceSSH
Anonymous
Failed password for invalid user nexus from 106.52.223.114 port 20837 ssh2
Invalid user tomcat ... show moreFailed password for invalid user nexus from 106.52.223.114 port 20837 ssh2
Invalid user tomcat from 106.52.223.114 port 29388
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
Failed password for invalid user tomcat from 106.52.223.114 port 29388 ssh2
Invalid user ubuntu from 106.52.223.114 port 49420 show less
2024-09-24T12:31:21.062954vmi1989674.contaboserver.net sshd[3566392]: Invalid user test from 106.52. ... show more2024-09-24T12:31:21.062954vmi1989674.contaboserver.net sshd[3566392]: Invalid user test from 106.52.223.114 port 38565
2024-09-24T12:33:10.730358vmi1989674.contaboserver.net sshd[3566858]: Invalid user support from 106.52.223.114 port 31107
... show less
Report 1351246 with IP 2392740 for SSH brute-force attack by source 2387415 via ssh-honeypot/0.2.0+h ... show moreReport 1351246 with IP 2392740 for SSH brute-force attack by source 2387415 via ssh-honeypot/0.2.0+http show less
[rede-164-29] (sshd) Failed SSH login from 106.52.223.114 (CN/China/-): 5 in the last 3600 secs; Por ... show more[rede-164-29] (sshd) Failed SSH login from 106.52.223.114 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 24 04:48:39 sshd[19832]: Invalid user [USERNAME] from 106.52.223.114 port 7520
Sep 24 04:48:40 sshd[19832]: Failed password for invalid user [USERNAME] from 106.52.223.114 port 7520 ssh2
Sep 24 04:50:59 sshd[19924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114 user=[USERNAME]
Sep 24 04:51:01 sshd[19924]: Failed password for [USERNAME] from 106.52.223.114 port 59754 ssh2
Sep 24 04:51:55 sshd[20072]: Invalid user [USERNAME] from 106.52 show less
Port Scan
Anonymous
106.52.223.114 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Por ... show more106.52.223.114 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 24 03:50:25 server5 sshd[25085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.105.112.113 user=root
Sep 24 03:50:27 server5 sshd[25085]: Failed password for root from 202.105.112.113 port 52806 ssh2
Sep 24 03:50:05 server5 sshd[24998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.229.103.137 user=root
Sep 24 03:50:07 server5 sshd[24998]: Failed password for root from 221.229.103.137 port 41998 ssh2
Sep 24 03:51:05 server5 sshd[25202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114 user=root
Sep 24 03:50:42 server5 sshd[25117]: Failed password for root from 51.178.43.161 port 42176 ssh2
IP Addresses Blocked:
202.105.112.113 (CN/China/-)
221.229.103.137 (CN/China/-) show less