This IP address has been reported a total of 5,158
times from 602 distinct
sources.
212.64.102.106 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2022-03-13T22:11:18.933430correo.[domain] sshd[25622]: Failed password for root from 212.64.102.106 ... show more2022-03-13T22:11:18.933430correo.[domain] sshd[25622]: Failed password for root from 212.64.102.106 port 41216 ssh2 2022-03-13T22:12:14.037436correo.[domain] sshd[25672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root 2022-03-13T22:12:15.794744correo.[domain] sshd[25672]: Failed password for root from 212.64.102.106 port 50648 ssh2 ... show less
Mar 14 01:48:01 cho sshd[402224]: Failed password for root from 212.64.102.106 port 59396 ssh2 ... show moreMar 14 01:48:01 cho sshd[402224]: Failed password for root from 212.64.102.106 port 59396 ssh2
Mar 14 01:49:32 cho sshd[402390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 14 01:49:34 cho sshd[402390]: Failed password for root from 212.64.102.106 port 51686 ssh2
Mar 14 01:50:57 cho sshd[402518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 14 01:50:58 cho sshd[402518]: Failed password for root from 212.64.102.106 port 43862 ssh2
... show less
Mar 13 21:10:03 vmd53462 sshd[24825]: Failed password for root from 212.64.102.106 port 59188 ssh2<b ... show moreMar 13 21:10:03 vmd53462 sshd[24825]: Failed password for root from 212.64.102.106 port 59188 ssh2
... show less
Mar 13 12:52:18 ubuntu sshd[261219]: Failed password for root from 212.64.102.106 port 54174 ssh2<br ... show moreMar 13 12:52:18 ubuntu sshd[261219]: Failed password for root from 212.64.102.106 port 54174 ssh2
Mar 13 12:54:24 ubuntu sshd[261263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 13 12:54:26 ubuntu sshd[261263]: Failed password for root from 212.64.102.106 port 53622 ssh2
Mar 13 12:56:28 ubuntu sshd[261295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 13 12:56:30 ubuntu sshd[261295]: Failed password for root from 212.64.102.106 port 52994 ssh2
... show less
Mar 13 12:33:25 ubuntu sshd[260876]: Failed password for root from 212.64.102.106 port 59494 ssh2<br ... show moreMar 13 12:33:25 ubuntu sshd[260876]: Failed password for root from 212.64.102.106 port 59494 ssh2
Mar 13 12:35:34 ubuntu sshd[260924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 13 12:35:37 ubuntu sshd[260924]: Failed password for root from 212.64.102.106 port 58960 ssh2
Mar 13 12:37:35 ubuntu sshd[260960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 13 12:37:37 ubuntu sshd[260960]: Failed password for root from 212.64.102.106 port 58310 ssh2
... show less
Mar 13 08:28:00 colopoint sshd[21820]: Failed password for root from 212.64.102.106 port 58112 ssh2< ... show moreMar 13 08:28:00 colopoint sshd[21820]: Failed password for root from 212.64.102.106 port 58112 ssh2
Mar 13 08:30:59 colopoint sshd[21859]: Failed password for root from 212.64.102.106 port 37532 ssh2
... show less
Mar 13 12:28:11 beaker sshd[153317]: Disconnected from authenticating user root 212.64.102.106 port ... show moreMar 13 12:28:11 beaker sshd[153317]: Disconnected from authenticating user root 212.64.102.106 port 56788 [preauth]
... show less