This IP address has been reported a total of 5,158
times from 602 distinct
sources.
212.64.102.106 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Reporter
IoA Timestamp in UTC
Comment
Categories
Anonymous
Mar 7 00:15:34 discord sshd[439594]: Invalid user jorge from 212.64.102.106 port 52504
Mar 7 ... show moreMar 7 00:15:34 discord sshd[439594]: Invalid user jorge from 212.64.102.106 port 52504
Mar 7 00:15:37 discord sshd[439594]: Failed password for invalid user jorge from 212.64.102.106 port 52504 ssh2
... show less
Mar 6 06:45:36 uisp sshd[10169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... show moreMar 6 06:45:36 uisp sshd[10169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 6 06:45:38 uisp sshd[10169]: Failed password for invalid user louis from 212.64.102.106 port 43014 ssh2
... show less
Mar 6 14:29:01 km20725 sshd[800]: Failed password for invalid user stest from 212.64.102.106 port 5 ... show moreMar 6 14:29:01 km20725 sshd[800]: Failed password for invalid user stest from 212.64.102.106 port 55416 ssh2
Mar 6 14:30:00 km20725 sshd[837]: Failed password for invalid user user2 from 212.64.102.106 port 36132 ssh2
Mar 6 14:30:38 km20725 sshd[968]: Failed password for root from 212.64.102.106 port 42746 ssh2
Mar 6 14:31:15 km20725 sshd[1094]: Failed password for root from 212.64.102.106 port 49334 ssh2
... show less
Mar 6 13:56:22 server sshd\[20361\]: Failed password for root from 212.64.102.106 port 49798 ssh2Ma ... show moreMar 6 13:56:22 server sshd\[20361\]: Failed password for root from 212.64.102.106 port 49798 ssh2Mar 6 13:58:24 server sshd\[20434\]: Invalid user gil from 212.64.102.106Mar 6 13:58:26 server sshd\[20434\]: Failed password for invalid user gil from 212.64.102.106 port 41754 ssh2Mar 6 14:01:55 server sshd\[20670\]: Failed password for root from 212.64.102.106 port 48250 ssh2Mar 6 14:03:31 server sshd\[20740\]: Invalid user admin from 212.64.102.106Mar 6 14:03:33 server sshd\[20740\]: Failed password for invalid user admin from 212.64.102.106 port 37340 ssh2
... show less
Brute-ForceSSH
Anonymous
Mar 6 13:57:40 Ubuntu-Main sshd[275586]: Invalid user gil from 212.64.102.106 port 59422
Mar ... show moreMar 6 13:57:40 Ubuntu-Main sshd[275586]: Invalid user gil from 212.64.102.106 port 59422
Mar 6 13:57:42 Ubuntu-Main sshd[275586]: Failed password for invalid user gil from 212.64.102.106 port 59422 ssh2
Mar 6 14:01:09 Ubuntu-Main sshd[275595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 6 14:01:11 Ubuntu-Main sshd[275595]: Failed password for root from 212.64.102.106 port 37710 ssh2
Mar 6 14:02:55 Ubuntu-Main sshd[275603]: Invalid user admin from 212.64.102.106 port 55104
... show less
Mar 6 09:56:58 ws12vmsma01 sshd[53885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMar 6 09:56:58 ws12vmsma01 sshd[53885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 6 09:56:58 ws12vmsma01 sshd[53885]: Invalid user gil from 212.64.102.106
Mar 6 09:57:00 ws12vmsma01 sshd[53885]: Failed password for invalid user gil from 212.64.102.106 port 55594 ssh2
... show less
(sshd) Failed SSH login from 212.64.102.106 (CN/China/-/-/-/[AS45090 Shenzhen Tencent Computer Syste ... show more(sshd) Failed SSH login from 212.64.102.106 (CN/China/-/-/-/[AS45090 Shenzhen Tencent Computer Systems Company Limited]): 2 in the last 3600 secs show less
Mar 6 04:59:17 km20725 sshd[13425]: Failed password for invalid user mike from 212.64.102.106 port ... show moreMar 6 04:59:17 km20725 sshd[13425]: Failed password for invalid user mike from 212.64.102.106 port 38048 ssh2
Mar 6 05:00:17 km20725 sshd[13565]: Failed password for invalid user kfk from 212.64.102.106 port 49210 ssh2
Mar 6 05:01:10 km20725 sshd[13637]: Failed password for invalid user transfer from 212.64.102.106 port 59022 ssh2
Mar 6 05:01:56 km20725 sshd[13671]: Failed password for invalid user arun from 212.64.102.106 port 40510 ssh2
... show less
2022-03-05T23:07:45.250553lavrinenko.info sshd[25566]: Invalid user postgres from 212.64.102.106 por ... show more2022-03-05T23:07:45.250553lavrinenko.info sshd[25566]: Invalid user postgres from 212.64.102.106 port 34392
2022-03-05T23:07:45.261016lavrinenko.info sshd[25566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2022-03-05T23:07:45.250553lavrinenko.info sshd[25566]: Invalid user postgres from 212.64.102.106 port 34392
2022-03-05T23:07:46.836425lavrinenko.info sshd[25566]: Failed password for invalid user postgres from 212.64.102.106 port 34392 ssh2
2022-03-05T23:08:51.618849lavrinenko.info sshd[25579]: Invalid user teste from 212.64.102.106 port 49208
... show less
2022-03-05T22:42:34.081624lavrinenko.info sshd[24339]: pam_unix(sshd:auth): authentication failure; ... show more2022-03-05T22:42:34.081624lavrinenko.info sshd[24339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
2022-03-05T22:42:34.070204lavrinenko.info sshd[24339]: Invalid user ngdc from 212.64.102.106 port 60690
2022-03-05T22:42:36.224105lavrinenko.info sshd[24339]: Failed password for invalid user ngdc from 212.64.102.106 port 60690 ssh2
2022-03-05T22:43:39.222664lavrinenko.info sshd[24405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
2022-03-05T22:43:41.289920lavrinenko.info sshd[24405]: Failed password for root from 212.64.102.106 port 47242 ssh2
... show less
Brute-ForceSSH
Anonymous
2022-03-05T13:35:09.557741-07:00 suse-nuc sshd[21729]: Invalid user tanaka from 212.64.102.106 port ... show more2022-03-05T13:35:09.557741-07:00 suse-nuc sshd[21729]: Invalid user tanaka from 212.64.102.106 port 34400
... show less
Mar 5 21:28:17 gateway18 sshd[564178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreMar 5 21:28:17 gateway18 sshd[564178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106 user=root
Mar 5 21:28:19 gateway18 sshd[564178]: Failed password for root from 212.64.102.106 port 60908 ssh2
Mar 5 21:29:07 gateway18 sshd[564180]: Invalid user kevin from 212.64.102.106 port 44808
Mar 5 21:29:07 gateway18 sshd[564180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 5 21:29:07 gateway18 sshd[564180]: Invalid user kevin from 212.64.102.106 port 44808
Mar 5 21:29:09 gateway18 sshd[564180]: Failed password for invalid user kevin from 212.64.102.106 port 44808 ssh2
Mar 5 21:30:03 gateway18 sshd[564182]: Invalid user deployer from 212.64.102.106 port 57012
Mar 5 21:30:03 gateway18 sshd[564182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.102.106
Mar 5 21:30:03 gateway18 sshd[564182]: Invalid user deployer from 21
... show less