This IP address has been reported a total of 5,158
times from 602 distinct
sources.
212.64.102.106 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Mar 8 22:34:19 rahona.network sshd[7013]: Failed password for root from 212.64.102.106 port 38640 s ... show moreMar 8 22:34:19 rahona.network sshd[7013]: Failed password for root from 212.64.102.106 port 38640 ssh2
Mar 8 22:40:20 rahona.network sshd[7272]: Failed password for root from 212.64.102.106 port 35480 ssh2 show less
Mar 8 20:02:14 cp sshd[23361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t ... show moreMar 8 20:02:14 cp sshd[23361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 8 20:02:16 cp sshd[23361]: Failed password for root from 212.64.102.106 port 49616 ssh2
Mar 8 20:02:16 cp sshd[23361]: Disconnected from authenticating user root 212.64.102.106 port 49616 [preauth]
Mar 8 20:03:51 cp sshd[24452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 8 20:03:53 cp sshd[24452]: Failed password for root from 212.64.102.106 port 37246 ssh2
... show less
Mar 8 17:54:24 SweetBerry sshd[13370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMar 8 17:54:24 SweetBerry sshd[13370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 8 17:54:26 SweetBerry sshd[13370]: Failed password for invalid user lisa3 from 212.64.102.106 port 56374 ssh2
Mar 8 17:56:28 SweetBerry sshd[13464]: Invalid user activemq from 212.64.102.106 port 49720
Mar 8 17:56:28 SweetBerry sshd[13464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 8 17:56:30 SweetBerry sshd[13464]: Failed password for invalid user activemq from 212.64.102.106 port 49720 ssh2
... show less
Mar 8 16:07:12 scw-tender-jepsen sshd[21228]: Failed password for root from 212.64.102.106 port 341 ... show moreMar 8 16:07:12 scw-tender-jepsen sshd[21228]: Failed password for root from 212.64.102.106 port 34150 ssh2 show less
2022-03-08T11:06:17.606522-0300 [cowrie.ssh.factory.CowrieSSHFactory] New connection: 212.64.102.106 ... show more2022-03-08T11:06:17.606522-0300 [cowrie.ssh.factory.CowrieSSHFactory] New connection: 212.64.102.106:37508 (::ffff:177.23.168.20:2222) [session: 5b4c44c2eef0]
... show less
Brute-ForceSSH
Anonymous
(sshd) Failed SSH login from 212.64.102.106 (CN/China/-): 5 in the last 3600 secs; Ports: *; Directi ... show more(sshd) Failed SSH login from 212.64.102.106 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 8 07:42:33 server4 sshd[2780]: Invalid user tester from 212.64.102.106
Mar 8 07:42:33 server4 sshd[2780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 8 07:42:35 server4 sshd[2780]: Failed password for invalid user tester from 212.64.102.106 port 33048 ssh2
Mar 8 07:49:13 server4 sshd[6025]: Invalid user admin from 212.64.102.106
Mar 8 07:49:13 server4 sshd[6025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 show less
Mar 8 13:24:07 gateway17 sshd[481872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMar 8 13:24:07 gateway17 sshd[481872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 8 13:24:09 gateway17 sshd[481872]: Failed password for root from 212.64.102.106 port 56010 ssh2
Mar 8 13:25:09 gateway17 sshd[481878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 8 13:25:11 gateway17 sshd[481878]: Failed password for root from 212.64.102.106 port 39988 ssh2
Mar 8 13:26:27 gateway17 sshd[481880]: Invalid user history from 212.64.102.106 port 52376
Mar 8 13:26:27 gateway17 sshd[481880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 8 13:26:27 gateway17 sshd[481880]: Invalid user history from 212.64.102.106 port 52376
Mar 8 13:26:29 gateway17 sshd[481880]: Failed password for invalid user history from 212.64.102.106 port 52376 ssh2
Mar 8 13:27:24 gateway17 sshd[481882]: pam_u
... show less
Mar 8 12:44:11 gateway18 sshd[588054]: Invalid user hadoop from 212.64.102.106 port 53528
Mar ... show moreMar 8 12:44:11 gateway18 sshd[588054]: Invalid user hadoop from 212.64.102.106 port 53528
Mar 8 12:44:13 gateway18 sshd[588054]: Failed password for invalid user hadoop from 212.64.102.106 port 53528 ssh2
Mar 8 12:44:44 gateway18 sshd[588056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 8 12:44:46 gateway18 sshd[588056]: Failed password for root from 212.64.102.106 port 60312 ssh2
Mar 8 12:45:20 gateway18 sshd[588065]: Invalid user oracle from 212.64.102.106 port 38906
Mar 8 12:45:20 gateway18 sshd[588065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 8 12:45:20 gateway18 sshd[588065]: Invalid user oracle from 212.64.102.106 port 38906
Mar 8 12:45:22 gateway18 sshd[588065]: Failed password for invalid user oracle from 212.64.102.106 port 38906 ssh2
Mar 8 12:45:53 gateway18 sshd[588067]: pam_unix(sshd:auth): authentication failure; logname= ui
... show less
2022-03-08T09:43:32.200194mumei.effik.cz sshd[452169]: Failed password for root from 212.64.102.106 ... show more2022-03-08T09:43:32.200194mumei.effik.cz sshd[452169]: Failed password for root from 212.64.102.106 port 49576 ssh2
2022-03-08T09:46:30.674685mumei.effik.cz sshd[453083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
2022-03-08T09:46:32.592647mumei.effik.cz sshd[453083]: Failed password for root from 212.64.102.106 port 53458 ssh2
2022-03-08T09:47:52.550989mumei.effik.cz sshd[453145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
2022-03-08T09:47:54.725033mumei.effik.cz sshd[453145]: Failed password for root from 212.64.102.106 port 41168 ssh2
... show less