This IP address has been reported a total of 5,158
times from 602 distinct
sources.
212.64.102.106 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Mar 11 19:32:41 debian-4gb-hel1-1 sshd[185877]: Failed password for invalid user rica from 212.64.10 ... show moreMar 11 19:32:41 debian-4gb-hel1-1 sshd[185877]: Failed password for invalid user rica from 212.64.102.106 port 57398 ssh2
Mar 11 19:34:51 debian-4gb-hel1-1 sshd[185917]: Invalid user wen from 212.64.102.106 port 49804
Mar 11 19:34:51 debian-4gb-hel1-1 sshd[185917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 11 19:34:53 debian-4gb-hel1-1 sshd[185917]: Failed password for invalid user wen from 212.64.102.106 port 49804 ssh2
Mar 11 19:36:34 debian-4gb-hel1-1 sshd[185934]: Invalid user mdb from 212.64.102.106 port 38774
... show less
Mar 11 10:16:03 Linux09 sshd[563637]: Failed password for invalid user html from 212.64.102.106 port ... show moreMar 11 10:16:03 Linux09 sshd[563637]: Failed password for invalid user html from 212.64.102.106 port 52418 ssh2
Mar 11 10:16:39 Linux09 sshd[568786]: Invalid user monti1 from 212.64.102.106 port 59932
Mar 11 10:16:39 Linux09 sshd[568786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 11 10:16:41 Linux09 sshd[568786]: Failed password for invalid user monti1 from 212.64.102.106 port 59932 ssh2
Mar 11 10:17:15 Linux09 sshd[574086]: Invalid user zaragus from 212.64.102.106 port 39170
Mar 11 10:17:15 Linux09 sshd[574086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 11 10:17:17 Linux09 sshd[574086]: Failed password for invalid user zaragus from 212.64.102.106 port 39170 ssh2
Mar 11 10:18:09 Linux09 sshd[581838]: Invalid user hee from 212.64.102.106 port 46874
Mar 11 10:18:09 Linux09 sshd[581838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=s
... show less
Brute-ForceSSH
Anonymous
Mar 11 09:29:07 mail sshd[1306161]: Invalid user pepes from 212.64.102.106 port 39308
Mar 11 0 ... show moreMar 11 09:29:07 mail sshd[1306161]: Invalid user pepes from 212.64.102.106 port 39308
Mar 11 09:29:07 mail sshd[1306161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 11 09:29:07 mail sshd[1306161]: Invalid user pepes from 212.64.102.106 port 39308
Mar 11 09:29:09 mail sshd[1306161]: Failed password for invalid user pepes from 212.64.102.106 port 39308 ssh2
Mar 11 09:31:43 mail sshd[1306556]: Invalid user john from 212.64.102.106 port 34578
... show less
Mar 11 00:48:07 oa sshd[51686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t ... show moreMar 11 00:48:07 oa sshd[51686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 11 00:48:10 oa sshd[51686]: Failed password for root from 212.64.102.106 port 42352 ssh2
Mar 11 00:49:12 oa sshd[51714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 11 00:49:14 oa sshd[51714]: Failed password for root from 212.64.102.106 port 57842 ssh2
Mar 11 00:50:14 oa sshd[51721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 11 00:50:16 oa sshd[51721]: Failed password for root from 212.64.102.106 port 45066 ssh2
Mar 11 00:51:18 oa sshd[51733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 11 00:51:20 oa sshd[51733]: Failed password for root from 212.64.102.106 port 60536 ssh2
... show less