This IP address has been reported a total of 5,158
times from 602 distinct
sources.
212.64.102.106 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Nov 30 10:31:59 v2878 sshd[6890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreNov 30 10:31:59 v2878 sshd[6890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 30 10:32:01 v2878 sshd[6890]: Failed password for invalid user mma from 212.64.102.106 port 36594 ssh2 show less
2020-04-21T05:18:18.362301-07:00 suse-nuc sshd[19326]: Invalid user ds from 212.64.102.106 port 3940 ... show more2020-04-21T05:18:18.362301-07:00 suse-nuc sshd[19326]: Invalid user ds from 212.64.102.106 port 39404
... show less
Nov 30 05:19:11 vps782520 sshd[18645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreNov 30 05:19:11 vps782520 sshd[18645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 30 05:19:13 vps782520 sshd[18645]: Failed password for invalid user mqb from 212.64.102.106 port 53074 ssh2 show less
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 212.64.102.106 (CN/China/-): 5 in the last 3600 secs; Ports: *; Directi ... show more(sshd) Failed SSH login from 212.64.102.106 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 29 20:11:44 server5 sshd[16516]: Invalid user kjc from 212.64.102.106
Nov 29 20:11:44 server5 sshd[16516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 29 20:11:46 server5 sshd[16516]: Failed password for invalid user kjc from 212.64.102.106 port 59562 ssh2
Nov 29 20:32:24 server5 sshd[25369]: Invalid user dao from 212.64.102.106
Nov 29 20:32:24 server5 sshd[25369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 show less
Connection to SSH Honeypot - Detected by HoneypotDB
SSH
Anonymous
(sshd) Failed SSH login from 212.64.102.106 (CN/China/-): 5 in the last 3600 secs; Ports: *; Directi ... show more(sshd) Failed SSH login from 212.64.102.106 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 29 12:21:30 server2 sshd[2566]: Invalid user xkn from 212.64.102.106
Nov 29 12:21:30 server2 sshd[2566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 29 12:21:31 server2 sshd[2566]: Failed password for invalid user xkn from 212.64.102.106 port 55140 ssh2
Nov 29 12:30:18 server2 sshd[7921]: Invalid user stck from 212.64.102.106
Nov 29 12:30:18 server2 sshd[7921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 show less
Nov 29 09:15:47 honeypot sshd[9738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreNov 29 09:15:47 honeypot sshd[9738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 29 09:15:49 honeypot sshd[9738]: Failed password for invalid user monitoring from 212.64.102.106 port 36262 ssh2 show less
Nov 29 07:20:31 honeypot sshd[8758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreNov 29 07:20:31 honeypot sshd[8758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 29 07:20:34 honeypot sshd[8758]: Failed password for invalid user vnc from 212.64.102.106 port 47982 ssh2 show less