This IP address has been reported a total of 1,510
times from 528 distinct
sources.
106.55.187.66 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 6 18:38:20 racetecweb sshd[2372118]: Invalid user home from 106.55.187.66 port 42422
Dec ... show moreDec 6 18:38:20 racetecweb sshd[2372118]: Invalid user home from 106.55.187.66 port 42422
Dec 6 18:43:19 racetecweb sshd[2372311]: Invalid user developer from 106.55.187.66 port 53320
Dec 6 18:44:54 racetecweb sshd[2372396]: Invalid user satish from 106.55.187.66 port 41546
... show less
2023-12-06T16:47:30.060782elastic2 sshd[25629]: Invalid user iptv from 106.55.187.66 port 55344<br / ... show more2023-12-06T16:47:30.060782elastic2 sshd[25629]: Invalid user iptv from 106.55.187.66 port 55344
2023-12-06T16:48:30.972383elastic2 sshd[25708]: Invalid user dev from 106.55.187.66 port 37036
2023-12-06T16:50:33.530414elastic2 sshd[25860]: Invalid user admin from 106.55.187.66 port 56874
... show less
Dec 6 16:46:24 dev sshd[2280224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreDec 6 16:46:24 dev sshd[2280224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.187.66
Dec 6 16:46:26 dev sshd[2280224]: Failed password for invalid user server from 106.55.187.66 port 59670 ssh2
Dec 6 16:47:25 dev sshd[2280253]: Invalid user iptv from 106.55.187.66 port 41350
Dec 6 16:47:25 dev sshd[2280253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.187.66
Dec 6 16:47:27 dev sshd[2280253]: Failed password for invalid user iptv from 106.55.187.66 port 41350 ssh2
... show less
Dec 6 16:43:28 pl sshd[4007495]: Invalid user deamon from 106.55.187.66 port 36964
Dec 6 16: ... show moreDec 6 16:43:28 pl sshd[4007495]: Invalid user deamon from 106.55.187.66 port 36964
Dec 6 16:52:34 pl sshd[4007841]: Invalid user btm from 106.55.187.66 port 49564
Dec 6 17:01:48 pl sshd[4008348]: Invalid user rootadmin from 106.55.187.66 port 47946
Dec 6 17:03:17 pl sshd[4008407]: Invalid user sonia from 106.55.187.66 port 33564
Dec 6 17:42:37 pl sshd[4010419]: Invalid user autumn from 106.55.187.66 port 54710 show less
Dec 6 13:56:07 server sshd[63213]: Invalid user ubuntu from 106.55.187.66 port 47670
Dec 6 1 ... show moreDec 6 13:56:07 server sshd[63213]: Invalid user ubuntu from 106.55.187.66 port 47670
Dec 6 14:07:51 server sshd[63240]: Invalid user roman from 106.55.187.66 port 45482
Dec 6 14:10:54 server sshd[63255]: Invalid user exx from 106.55.187.66 port 44928
... show less
2023-12-06T13:52:00.687461+01:00 monitoring.crazycraftland.net sshd[3024043]: Invalid user admin fro ... show more2023-12-06T13:52:00.687461+01:00 monitoring.crazycraftland.net sshd[3024043]: Invalid user admin from 106.55.187.66 port 36032
2023-12-06T14:01:50.320162+01:00 monitoring.crazycraftland.net sshd[3024459]: Invalid user kadmin from 106.55.187.66 port 45252
2023-12-06T14:03:54.256222+01:00 monitoring.crazycraftland.net sshd[3024508]: Invalid user ahmed from 106.55.187.66 port 37264
... show less
2023-12-06T10:34:09.417589shield sshd\[30283\]: Invalid user mysql from 106.55.187.66 port 38208<br ... show more2023-12-06T10:34:09.417589shield sshd\[30283\]: Invalid user mysql from 106.55.187.66 port 38208
2023-12-06T10:34:09.422060shield sshd\[30283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.187.66
2023-12-06T10:34:11.339543shield sshd\[30283\]: Failed password for invalid user mysql from 106.55.187.66 port 38208 ssh2
2023-12-06T10:43:54.759742shield sshd\[32466\]: Invalid user ubuntu from 106.55.187.66 port 54908
2023-12-06T10:43:54.764888shield sshd\[32466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.187.66 show less
Report 875510 with IP 1731021 for SSH brute-force attack by source 1917735 via ssh-honeypot/0.2.0+ht ... show moreReport 875510 with IP 1731021 for SSH brute-force attack by source 1917735 via ssh-honeypot/0.2.0+http show less
Brute-ForceSSH
Anonymous
Dec 6 10:30:44 rendez-vous sshd[244999]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreDec 6 10:30:44 rendez-vous sshd[244999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.187.66
Dec 6 10:30:45 rendez-vous sshd[244999]: Failed password for invalid user t from 106.55.187.66 port 36392 ssh2
Dec 6 10:32:16 rendez-vous sshd[245040]: Invalid user device from 106.55.187.66 port 33838 show less
Brute-ForceSSH
Anonymous
Dec 6 10:03:11 rendez-vous sshd[243862]: pam_unix(sshd:auth): authentication failure; logname= uid= ... show moreDec 6 10:03:11 rendez-vous sshd[243862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.187.66
Dec 6 10:03:13 rendez-vous sshd[243862]: Failed password for invalid user xchen from 106.55.187.66 port 45572 ssh2
Dec 6 10:08:42 rendez-vous sshd[244003]: Invalid user bee from 106.55.187.66 port 41146 show less
Dec 5 20:34:31 cohoe sshd[967798]: Failed password for invalid user ubuntu from 106.55.187.66 port ... show moreDec 5 20:34:31 cohoe sshd[967798]: Failed password for invalid user ubuntu from 106.55.187.66 port 54862 ssh2
Dec 5 20:43:55 cohoe sshd[968231]: Invalid user ubuntu from 106.55.187.66 port 57874
Dec 5 20:43:55 cohoe sshd[968231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.187.66
Dec 5 20:43:56 cohoe sshd[968231]: Failed password for invalid user ubuntu from 106.55.187.66 port 57874 ssh2
Dec 5 20:45:13 cohoe sshd[968301]: Invalid user jenkins from 106.55.187.66 port 47136
... show less