This IP address has been reported a total of 377
times from 225 distinct
sources.
106.52.223.114 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-09-21T04:12:14.367532+01:00 pi sshd[1451]: pam_unix(sshd:auth): authentication failure; logname ... show more2024-09-21T04:12:14.367532+01:00 pi sshd[1451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114 user=root
2024-09-21T04:12:16.314237+01:00 pi sshd[1451]: Failed password for root from 106.52.223.114 port 43963 ssh2
2024-09-21T04:17:26.164498+01:00 pi sshd[2268]: Invalid user tuan from 106.52.223.114 port 14737
2024-09-21T04:17:26.186084+01:00 pi sshd[2268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
2024-09-21T04:17:28.298582+01:00 pi sshd[2268]: Failed password for invalid user tuan from 106.52.223.114 port 14737 ssh2
... show less
2024-09-21T03:01:50.246160+00:00 BAW-C01 sshd-session[764675]: Failed password for invalid user tomc ... show more2024-09-21T03:01:50.246160+00:00 BAW-C01 sshd-session[764675]: Failed password for invalid user tomcat from 106.52.223.114 port 46671 ssh2
2024-09-21T03:03:54.835183+00:00 BAW-C01 sshd-session[764768]: Invalid user pzuser from 106.52.223.114 port 14441
2024-09-21T03:03:54.845213+00:00 BAW-C01 sshd-session[764768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
2024-09-21T03:03:56.489177+00:00 BAW-C01 sshd-session[764768]: Failed password for invalid user pzuser from 106.52.223.114 port 14441 ssh2
2024-09-21T03:08:03.624160+00:00 BAW-C01 sshd-session[764954]: Invalid user ubuntu from 106.52.223.114 port 18841
... show less
2024-09-21T03:41:05.465305+01:00 pi sshd[28779]: pam_unix(sshd:auth): authentication failure; lognam ... show more2024-09-21T03:41:05.465305+01:00 pi sshd[28779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
2024-09-21T03:41:07.830039+01:00 pi sshd[28779]: Failed password for invalid user user from 106.52.223.114 port 59239 ssh2
2024-09-21T03:44:19.243282+01:00 pi sshd[29319]: Invalid user ubuntu from 106.52.223.114 port 27324
2024-09-21T03:44:19.254316+01:00 pi sshd[29319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.223.114
2024-09-21T03:44:21.252118+01:00 pi sshd[29319]: Failed password for invalid user ubuntu from 106.52.223.114 port 27324 ssh2
... show less
Sep 20 23:38:55 logopedia-1vcpu-1gb-nyc1-01 sshd[1072457]: Failed password for root from 106.52.223. ... show moreSep 20 23:38:55 logopedia-1vcpu-1gb-nyc1-01 sshd[1072457]: Failed password for root from 106.52.223.114 port 9552 ssh2
... show less
(sshd) Failed SSH login from 106.52.223.114 (CN/China/-): ; Ports: *; Direction: inout; Trigger: LF_ ... show more(sshd) Failed SSH login from 106.52.223.114 (CN/China/-): ; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 14:38:56 temporary sshd[3665064]: Invalid user user from 106.52.223.114 port 15979 show less
2024-09-20T17:51:02.081999+02:00 pingusmc sshd-session[3524554]: Invalid user test01 from 106.52.223 ... show more2024-09-20T17:51:02.081999+02:00 pingusmc sshd-session[3524554]: Invalid user test01 from 106.52.223.114 port 8809
2024-09-20T17:54:19.723194+02:00 pingusmc sshd-session[3524882]: Invalid user testuser from 106.52.223.114 port 56946
2024-09-20T17:55:16.404264+02:00 pingusmc sshd-session[3524998]: Invalid user abhishek from 106.52.223.114 port 64564
2024-09-20T17:56:11.442028+02:00 pingusmc sshd-session[3525103]: Invalid user ubuntu from 106.52.223.114 port 4725
2024-09-20T17:57:09.177232+02:00 pingusmc sshd-session[3525258]: Invalid user test_user from 106.52.223.114 port 57482
... show less
Sep 20 08:14:12 debian-gitlab sshd[2949290]: Invalid user test from 106.52.223.114 port 2922
S ... show moreSep 20 08:14:12 debian-gitlab sshd[2949290]: Invalid user test from 106.52.223.114 port 2922
Sep 20 08:17:58 debian-gitlab sshd[2949443]: Invalid user test_user from 106.52.223.114 port 30473
Sep 20 08:21:52 debian-gitlab sshd[2949635]: Invalid user support from 106.52.223.114 port 33836
... show less