This IP address has been reported a total of 371
times from 217 distinct
sources.
20.244.106.62 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Dec 3 23:14:15 ovh sshd[1821049]: Failed password for invalid user cer from 20.244.106.62 port 4676 ... show moreDec 3 23:14:15 ovh sshd[1821049]: Failed password for invalid user cer from 20.244.106.62 port 46768 ssh2
Dec 3 23:16:51 ovh sshd[1822119]: Invalid user bruno from 20.244.106.62 port 55324
Dec 3 23:16:51 ovh sshd[1822119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.244.106.62
Dec 3 23:16:53 ovh sshd[1822119]: Failed password for invalid user bruno from 20.244.106.62 port 55324 ssh2
Dec 3 23:19:34 ovh sshd[1823287]: Invalid user inca from 20.244.106.62 port 37804
... show less
Dec 3 23:00:42 ovh sshd[1815290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreDec 3 23:00:42 ovh sshd[1815290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.244.106.62
Dec 3 23:00:44 ovh sshd[1815290]: Failed password for invalid user eugene from 20.244.106.62 port 36540 ssh2
Dec 3 23:02:55 ovh sshd[1816417]: Invalid user gea from 20.244.106.62 port 60026
Dec 3 23:02:55 ovh sshd[1816417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.244.106.62
Dec 3 23:02:57 ovh sshd[1816417]: Failed password for invalid user gea from 20.244.106.62 port 60026 ssh2
... show less
Dec 3 17:53:33 us-mfl-01 sshd[2443745]: Invalid user lrendon from 20.244.106.62 port 37392
.. ... show moreDec 3 17:53:33 us-mfl-01 sshd[2443745]: Invalid user lrendon from 20.244.106.62 port 37392
... show less
[rede-166-249] (sshd) Failed SSH login from 20.244.106.62 (IN/India/-): 5 in the last 3600 secs; Por ... show more[rede-166-249] (sshd) Failed SSH login from 20.244.106.62 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 3 19:34:58 sshd[13590]: Invalid user [USERNAME] from 20.244.106.62 port 37234
Dec 3 19:34:59 sshd[13590]: Failed password for invalid user [USERNAME] from 20.244.106.62 port 37234 ssh2
Dec 3 19:37:40 sshd[13816]: Invalid user [USERNAME] from 20.244.106.62 port 50102
Dec 3 19:37:42 sshd[13816]: Failed password for invalid user [USERNAME] from 20.244.106.62 port 50102 ssh2
Dec 3 19:40:11 sshd[14035]: Invalid user [USERNAME] from 20.244.106.62 port 53258 show less
Dec 3 16:45:04 us-mfl-01 sshd[1239022]: Invalid user alexander from 20.244.106.62 port 57200
... show moreDec 3 16:45:04 us-mfl-01 sshd[1239022]: Invalid user alexander from 20.244.106.62 port 57200
... show less
[rede-166-249] (sshd) Failed SSH login from 20.244.106.62 (IN/India/-): 5 in the last 3600 secs; Por ... show more[rede-166-249] (sshd) Failed SSH login from 20.244.106.62 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 3 18:27:07 sshd[7655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.244.106.62 user=[USERNAME]
Dec 3 18:27:08 sshd[7655]: Failed password for [USERNAME] from 20.244.106.62 port 51312 ssh2
Dec 3 18:30:09 sshd[7908]: Invalid user [USERNAME] from 20.244.106.62 port 36170
Dec 3 18:30:11 sshd[7908]: Failed password for invalid user [USERNAME] from 20.244.106.62 port 36170 ssh2
Dec 3 18:32:14 sshd[8134]: Invalid user [USERNAME] from 20.244.106.62 show less
Dec 3 16:29:53 us-mfl-01 sshd[970959]: Invalid user management from 20.244.106.62 port 52850
... show moreDec 3 16:29:53 us-mfl-01 sshd[970959]: Invalid user management from 20.244.106.62 port 52850
... show less