This IP address has been reported a total of 3,914
times from 828 distinct
sources.
190.12.106.242 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
(sshd) Failed SSH login from 190.12.106.242 (AR/-/host242.106.12.190.cps.com.ar): 5 in the last 3600 ... show more(sshd) Failed SSH login from 190.12.106.242 (AR/-/host242.106.12.190.cps.com.ar): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Dec 9 05:30:28 na-s3 sshd[3622215]: Invalid user test12 from 190.12.106.242 port 45076
Dec 9 05:30:30 na-s3 sshd[3622215]: Failed password for invalid user test12 from 190.12.106.242 port 45076 ssh2
Dec 9 05:34:32 na-s3 sshd[3667930]: Invalid user ubuntu from 190.12.106.242 port 38360
Dec 9 05:34:34 na-s3 sshd[3667930]: Failed password for invalid user ubuntu from 190.12.106.242 port 38360 ssh2
Dec 9 05:36:00 na-s3 sshd[3686798]: Invalid user testftp from 190.12.106.242 port 56964 show less
Dec 9 10:43:28 h2608077 sshd[65042]: Invalid user postgres from 190.12.106.242 port 42660
Dec ... show moreDec 9 10:43:28 h2608077 sshd[65042]: Invalid user postgres from 190.12.106.242 port 42660
Dec 9 10:49:08 h2608077 sshd[65333]: Invalid user admin from 190.12.106.242 port 42182
... show less
Dec 9 08:53:56 racetecweb sshd[2415341]: User root from 190.12.106.242 not allowed because not list ... show moreDec 9 08:53:56 racetecweb sshd[2415341]: User root from 190.12.106.242 not allowed because not listed in AllowUsers
Dec 9 09:00:08 racetecweb sshd[2415383]: User root from 190.12.106.242 not allowed because not listed in AllowUsers
Dec 9 09:01:53 racetecweb sshd[2415427]: User root from 190.12.106.242 not allowed because not listed in AllowUsers
... show less
2023-12-09T06:25:05.639306+00:00 mapir-proxmox sshd[1251199]: Invalid user test from 190.12.106.242 ... show more2023-12-09T06:25:05.639306+00:00 mapir-proxmox sshd[1251199]: Invalid user test from 190.12.106.242 port 33486
2023-12-09T06:25:05.640724+00:00 mapir-proxmox sshd[1251199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.12.106.242
2023-12-09T06:25:08.320655+00:00 mapir-proxmox sshd[1251199]: Failed password for invalid user test from 190.12.106.242 port 33486 ssh2
... show less
Dec 9 04:00:28 vps-de sshd[1418409]: Failed password for invalid user root from 190.12.106.242 port ... show moreDec 9 04:00:28 vps-de sshd[1418409]: Failed password for invalid user root from 190.12.106.242 port 58298 ssh2
Dec 9 04:01:51 vps-de sshd[1418416]: User root from 190.12.106.242 not allowed because not listed in AllowUsers
Dec 9 04:01:51 vps-de sshd[1418416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.12.106.242 user=root
Dec 9 04:01:53 vps-de sshd[1418416]: Failed password for invalid user root from 190.12.106.242 port 50856 ssh2
Dec 9 04:03:09 vps-de sshd[1418427]: User root from 190.12.106.242 not allowed because not listed in AllowUsers
Dec 9 04:03:09 vps-de sshd[1418427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.12.106.242 user=root
Dec 9 04:03:11 vps-de sshd[1418427]: Failed password for invalid user root from 190.12.106.242 port 32954 ssh2
Dec 9 04:04:26 vps-de sshd[1418442]: User root from 190.12.106.242 not allowed because not listed in AllowUsers
Dec 9 04:04:26 vps-d
... show less
Dec 9 03:00:58 vps-d7931dc8 sshd[394933]: pam_unix(sshd:auth): authentication failure; logname= uid ... show moreDec 9 03:00:58 vps-d7931dc8 sshd[394933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.12.106.242 user=root
Dec 9 03:01:00 vps-d7931dc8 sshd[394933]: Failed password for root from 190.12.106.242 port 39448 ssh2
Dec 9 03:01:01 vps-d7931dc8 sshd[394933]: Disconnected from authenticating user root 190.12.106.242 port 39448 [preauth]
Dec 9 03:02:24 vps-d7931dc8 sshd[394955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.12.106.242 user=root
Dec 9 03:02:25 vps-d7931dc8 sshd[394955]: Failed password for root from 190.12.106.242 port 53546 ssh2 show less
Brute-ForceSSH
Anonymous
Dec 9 02:27:08 fra1 sshd[2338003]: Invalid user tinku from 190.12.106.242 port 48042
Dec 9 0 ... show moreDec 9 02:27:08 fra1 sshd[2338003]: Invalid user tinku from 190.12.106.242 port 48042
Dec 9 02:28:32 fra1 sshd[2338221]: Invalid user modi from 190.12.106.242 port 41310
... show less
Attempts to access SSH server with wrong credentials
SSH
Anonymous
Dec 9 02:05:35 fra1 sshd[2335339]: Invalid user kanshi from 190.12.106.242 port 37432
Dec 9 ... show moreDec 9 02:05:35 fra1 sshd[2335339]: Invalid user kanshi from 190.12.106.242 port 37432
Dec 9 02:10:08 fra1 sshd[2335876]: Invalid user ajith from 190.12.106.242 port 49562
Dec 9 02:11:38 fra1 sshd[2336082]: Invalid user subra from 190.12.106.242 port 57914
... show less