This IP address has been reported a total of 377
times from 225 distinct
sources.
106.52.223.114 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Sep 22 11:42:09 crazyapi sshd[1409072]: Invalid user test from 106.52.223.114 port 37071
Sep 2 ... show moreSep 22 11:42:09 crazyapi sshd[1409072]: Invalid user test from 106.52.223.114 port 37071
Sep 22 11:42:09 crazyapi sshd[1409072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
Sep 22 11:42:11 crazyapi sshd[1409072]: Failed password for invalid user test from 106.52.223.114 port 37071 ssh2
... show less
Sep 22 06:44:46 luna sshd[3433229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreSep 22 06:44:46 luna sshd[3433229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
Sep 22 06:44:48 luna sshd[3433229]: Failed password for invalid user username from 106.52.223.114 port 35131 ssh2
Sep 22 06:50:50 luna sshd[3433848]: Invalid user acer from 106.52.223.114 port 47898
... show less
Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2024-09-22T06:44:39Z and 2024-09-2 ... show moreCowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2024-09-22T06:44:39Z and 2024-09-22T06:44:42Z show less
2024-09-22T05:59:36.592815+02:00 PWS-PM-WEB01 sshd[2108640]: pam_unix(sshd:auth): authentication fai ... show more2024-09-22T05:59:36.592815+02:00 PWS-PM-WEB01 sshd[2108640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
2024-09-22T05:59:38.242582+02:00 PWS-PM-WEB01 sshd[2108640]: Failed password for invalid user usuario from 106.52.223.114 port 26357 ssh2
2024-09-22T06:00:24.673888+02:00 PWS-PM-WEB01 sshd[2108726]: Invalid user test from 106.52.223.114 port 48730
... show less
2024-09-22T05:34:20.869748+02:00 PWS-PM-WEB01 sshd[2106605]: Failed password for invalid user test f ... show more2024-09-22T05:34:20.869748+02:00 PWS-PM-WEB01 sshd[2106605]: Failed password for invalid user test from 106.52.223.114 port 60577 ssh2
2024-09-22T05:38:17.222710+02:00 PWS-PM-WEB01 sshd[2106917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114 user=root
2024-09-22T05:38:18.621628+02:00 PWS-PM-WEB01 sshd[2106917]: Failed password for root from 106.52.223.114 port 32699 ssh2
... show less
[rede-44-49] (sshd) Failed SSH login from 106.52.223.114 (CN/China/-): 5 in the last 3600 secs; Port ... show more[rede-44-49] (sshd) Failed SSH login from 106.52.223.114 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 21 19:24:41 sshd[11011]: Invalid user [USERNAME] from 106.52.223.114 port 54679
Sep 21 19:24:43 sshd[11011]: Failed password for invalid user [USERNAME] from 106.52.223.114 port 54679 ssh2
Sep 21 19:26:31 sshd[11176]: Invalid user [USERNAME] from 106.52.223.114 port 44705
Sep 21 19:26:33 sshd[11176]: Failed password for invalid user [USERNAME] from 106.52.223.114 port 44705 ssh2
Sep 21 19:27:20 sshd[11248]: Invalid user [USERNAME] from 106.52.223.114 port 40771 show less
2024-09-21T21:40:23.078463+02:00 proxmox sshd[2871229]: Invalid user tg from 106.52.223.114 port 360 ... show more2024-09-21T21:40:23.078463+02:00 proxmox sshd[2871229]: Invalid user tg from 106.52.223.114 port 3600
2024-09-21T21:40:23.079714+02:00 proxmox sshd[2871229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
2024-09-21T21:40:25.368990+02:00 proxmox sshd[2871229]: Failed password for invalid user tg from 106.52.223.114 port 3600 ssh2
... show less