This IP address has been reported a total of 79,102
times from 2,044 distinct
sources.
154.68.39.6 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "ftpuser" at 2025-03-03T12:09:46Z
Brute-ForceSSH
Anonymous
Mar 3 07:56:53 odoo16c sshd[119958]: Invalid user gitlab-runner from 154.68.39.6 port 55413
M ... show moreMar 3 07:56:53 odoo16c sshd[119958]: Invalid user gitlab-runner from 154.68.39.6 port 55413
Mar 3 08:12:38 odoo16c sshd[124605]: Invalid user consultor from 154.68.39.6 port 41523
Mar 3 08:17:44 odoo16c sshd[126145]: Invalid user test from 154.68.39.6 port 37183
... show less
2025-03-03T12:16:03.223325+01:00 nirox sshd[227419]: Invalid user test1 from 154.68.39.6 port 49606< ... show more2025-03-03T12:16:03.223325+01:00 nirox sshd[227419]: Invalid user test1 from 154.68.39.6 port 49606
... show less
2025-03-03T11:06:20.157252+01:00 vm21 sshd[1279819]: Invalid user liukunlong from 154.68.39.6 port 4 ... show more2025-03-03T11:06:20.157252+01:00 vm21 sshd[1279819]: Invalid user liukunlong from 154.68.39.6 port 48421
2025-03-03T11:29:29.956081+01:00 vm21 sshd[1280055]: Invalid user user3 from 154.68.39.6 port 42446
... show less
2025-03-03T10:15:54.832496+01:00 haigwepa sshd[20478]: Failed password for root from 154.68.39.6 por ... show more2025-03-03T10:15:54.832496+01:00 haigwepa sshd[20478]: Failed password for root from 154.68.39.6 port 33049 ssh2
2025-03-03T10:21:04.188059+01:00 haigwepa sshd[20574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 user=root
2025-03-03T10:21:06.941419+01:00 haigwepa sshd[20574]: Failed password for root from 154.68.39.6 port 38039 ssh2
... show less