This IP address has been reported a total of 5,158
times from 602 distinct
sources.
212.64.102.106 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2020-11-22T09:10:54.375004ionos.janbro.de sshd[74062]: pam_unix(sshd:auth): authentication failure; ... show more2020-11-22T09:10:54.375004ionos.janbro.de sshd[74062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
2020-11-22T09:10:56.244927ionos.janbro.de sshd[74062]: Failed password for root from 212.64.102.106 port 36246 ssh2
2020-11-22T09:14:39.949975ionos.janbro.de sshd[74085]: Invalid user windows from 212.64.102.106 port 58230
2020-11-22T09:14:39.956531ionos.janbro.de sshd[74085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2020-11-22T09:14:39.949975ionos.janbro.de sshd[74085]: Invalid user windows from 212.64.102.106 port 58230
2020-11-22T09:14:42.047871ionos.janbro.de sshd[74085]: Failed password for invalid user windows from 212.64.102.106 port 58230 ssh2
2020-11-22T09:18:32.941627ionos.janbro.de sshd[74094]: Invalid user thomas from 212.64.102.106 port 52124
2020-11-22T09:18:32.948169ionos.janbro.de sshd[74094]: pam_unix(sshd:auth): authentication failure; logna
... show less
Nov 22 11:45:07 hosting sshd[30613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreNov 22 11:45:07 hosting sshd[30613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Nov 22 11:45:09 hosting sshd[30613]: Failed password for root from 212.64.102.106 port 58892 ssh2
Nov 22 12:04:26 hosting sshd[32228]: Invalid user daniela from 212.64.102.106 port 38290
Nov 22 12:04:26 hosting sshd[32228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 22 12:04:26 hosting sshd[32228]: Invalid user daniela from 212.64.102.106 port 38290
Nov 22 12:04:29 hosting sshd[32228]: Failed password for invalid user daniela from 212.64.102.106 port 38290 ssh2
... show less
2020-11-22T09:54:37.501015paragon sshd[973830]: Invalid user mysql from 212.64.102.106 port 54022<br ... show more2020-11-22T09:54:37.501015paragon sshd[973830]: Invalid user mysql from 212.64.102.106 port 54022
2020-11-22T09:54:37.503376paragon sshd[973830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2020-11-22T09:54:37.501015paragon sshd[973830]: Invalid user mysql from 212.64.102.106 port 54022
2020-11-22T09:54:38.928482paragon sshd[973830]: Failed password for invalid user mysql from 212.64.102.106 port 54022 ssh2
2020-11-22T09:57:13.381048paragon sshd[973925]: Invalid user shoutcast from 212.64.102.106 port 58748
... show less
2020-11-22T09:38:44.783724paragon sshd[973186]: Invalid user marry from 212.64.102.106 port 53682<br ... show more2020-11-22T09:38:44.783724paragon sshd[973186]: Invalid user marry from 212.64.102.106 port 53682
2020-11-22T09:38:44.787272paragon sshd[973186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2020-11-22T09:38:44.783724paragon sshd[973186]: Invalid user marry from 212.64.102.106 port 53682
2020-11-22T09:38:47.050218paragon sshd[973186]: Failed password for invalid user marry from 212.64.102.106 port 53682 ssh2
2020-11-22T09:41:22.233155paragon sshd[973284]: Invalid user web3 from 212.64.102.106 port 58394
... show less
Brute-ForceSSH
Anonymous
Nov 21 19:38:11 kapalua sshd\[22677\]: Invalid user marry from 212.64.102.106
Nov 21 19:38:11 ... show moreNov 21 19:38:11 kapalua sshd\[22677\]: Invalid user marry from 212.64.102.106
Nov 21 19:38:11 kapalua sshd\[22677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 21 19:38:13 kapalua sshd\[22677\]: Failed password for invalid user marry from 212.64.102.106 port 33298 ssh2
Nov 21 19:40:44 kapalua sshd\[23086\]: Invalid user web3 from 212.64.102.106
Nov 21 19:40:44 kapalua sshd\[23086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 show less
2020-11-22T09:22:55.520732paragon sshd[972461]: pam_unix(sshd:auth): authentication failure; logname ... show more2020-11-22T09:22:55.520732paragon sshd[972461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2020-11-22T09:22:55.517689paragon sshd[972461]: Invalid user ubuntu from 212.64.102.106 port 53328
2020-11-22T09:22:58.170015paragon sshd[972461]: Failed password for invalid user ubuntu from 212.64.102.106 port 53328 ssh2
2020-11-22T09:25:40.088209paragon sshd[972591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
2020-11-22T09:25:42.054354paragon sshd[972591]: Failed password for root from 212.64.102.106 port 58150 ssh2
... show less
Brute-ForceSSH
Anonymous
Nov 21 19:11:51 kapalua sshd\[20237\]: Invalid user teamspeak from 212.64.102.106
Nov 21 19:11 ... show moreNov 21 19:11:51 kapalua sshd\[20237\]: Invalid user teamspeak from 212.64.102.106
Nov 21 19:11:51 kapalua sshd\[20237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 21 19:11:54 kapalua sshd\[20237\]: Failed password for invalid user teamspeak from 212.64.102.106 port 42210 ssh2
Nov 21 19:14:29 kapalua sshd\[20471\]: Invalid user metin2 from 212.64.102.106
Nov 21 19:14:29 kapalua sshd\[20471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 show less
2020-11-22T09:07:17.804847paragon sshd[971779]: Invalid user student from 212.64.102.106 port 53136< ... show more2020-11-22T09:07:17.804847paragon sshd[971779]: Invalid user student from 212.64.102.106 port 53136
2020-11-22T09:07:17.807166paragon sshd[971779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2020-11-22T09:07:17.804847paragon sshd[971779]: Invalid user student from 212.64.102.106 port 53136
2020-11-22T09:07:20.350702paragon sshd[971779]: Failed password for invalid user student from 212.64.102.106 port 53136 ssh2
2020-11-22T09:09:51.035382paragon sshd[971901]: Invalid user cyrusimap from 212.64.102.106 port 57860
... show less
2020-11-22T08:52:02.155817paragon sshd[971060]: Invalid user ftpuser from 212.64.102.106 port 53286< ... show more2020-11-22T08:52:02.155817paragon sshd[971060]: Invalid user ftpuser from 212.64.102.106 port 53286
2020-11-22T08:52:02.158606paragon sshd[971060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2020-11-22T08:52:02.155817paragon sshd[971060]: Invalid user ftpuser from 212.64.102.106 port 53286
2020-11-22T08:52:03.754100paragon sshd[971060]: Failed password for invalid user ftpuser from 212.64.102.106 port 53286 ssh2
2020-11-22T08:54:36.130284paragon sshd[971176]: Invalid user user from 212.64.102.106 port 57954
... show less
Brute-ForceSSH
Anonymous
Nov 21 18:46:25 kapalua sshd\[17906\]: Invalid user pms from 212.64.102.106
Nov 21 18:46:25 ka ... show moreNov 21 18:46:25 kapalua sshd\[17906\]: Invalid user pms from 212.64.102.106
Nov 21 18:46:25 kapalua sshd\[17906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 21 18:46:27 kapalua sshd\[17906\]: Failed password for invalid user pms from 212.64.102.106 port 51864 ssh2
Nov 21 18:49:00 kapalua sshd\[18084\]: Invalid user lty from 212.64.102.106
Nov 21 18:49:00 kapalua sshd\[18084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 show less
2020-11-22T08:37:09.496631paragon sshd[970380]: Failed password for root from 212.64.102.106 port 53 ... show more2020-11-22T08:37:09.496631paragon sshd[970380]: Failed password for root from 212.64.102.106 port 53696 ssh2
2020-11-22T08:39:25.973045paragon sshd[970515]: Invalid user linux from 212.64.102.106 port 58232
2020-11-22T08:39:25.976008paragon sshd[970515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2020-11-22T08:39:25.973045paragon sshd[970515]: Invalid user linux from 212.64.102.106 port 58232
2020-11-22T08:39:28.319259paragon sshd[970515]: Failed password for invalid user linux from 212.64.102.106 port 58232 ssh2
... show less
Brute-ForceSSH
Anonymous
Nov 21 18:31:33 kapalua sshd\[16579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid= ... show moreNov 21 18:31:33 kapalua sshd\[16579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=www-data
Nov 21 18:31:35 kapalua sshd\[16579\]: Failed password for www-data from 212.64.102.106 port 52322 ssh2
Nov 21 18:33:58 kapalua sshd\[16786\]: Invalid user webmaster from 212.64.102.106
Nov 21 18:33:58 kapalua sshd\[16786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Nov 21 18:33:59 kapalua sshd\[16786\]: Failed password for invalid user webmaster from 212.64.102.106 port 56870 ssh2 show less
2020-11-22T08:19:49.109298paragon sshd[969592]: Failed password for invalid user toor from 212.64.10 ... show more2020-11-22T08:19:49.109298paragon sshd[969592]: Failed password for invalid user toor from 212.64.102.106 port 49534 ssh2
2020-11-22T08:22:25.083814paragon sshd[969699]: Invalid user developer from 212.64.102.106 port 54182
2020-11-22T08:22:25.086920paragon sshd[969699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2020-11-22T08:22:25.083814paragon sshd[969699]: Invalid user developer from 212.64.102.106 port 54182
2020-11-22T08:22:27.064282paragon sshd[969699]: Failed password for invalid user developer from 212.64.102.106 port 54182 ssh2
... show less