This IP address has been reported a total of 18,111
times from 1,440 distinct
sources.
36.92.107.106 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Oct 3 15:33:16 cp sshd[3859660]: Failed password for invalid user ubuntu from 36.92.107.106 port 40 ... show moreOct 3 15:33:16 cp sshd[3859660]: Failed password for invalid user ubuntu from 36.92.107.106 port 40580 ssh2
Oct 3 15:34:14 cp sshd[3860008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
Oct 3 15:34:16 cp sshd[3860008]: Failed password for root from 36.92.107.106 port 41716 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-10-03T12:50:05.512069+00:00 t301 sshd[13238]: Failed password for root from 36.92.107.106 port ... show more2024-10-03T12:50:05.512069+00:00 t301 sshd[13238]: Failed password for root from 36.92.107.106 port 42342 ssh2
2024-10-03T12:50:49.643409+00:00 t301 sshd[13313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
2024-10-03T12:50:51.267000+00:00 t301 sshd[13313]: Failed password for root from 36.92.107.106 port 35676 ssh2
... show less
Oct 3 12:47:59 v22019038103785759 sshd\[4783\]: pam_unix\(sshd:auth\): authentication failure\; log ... show moreOct 3 12:47:59 v22019038103785759 sshd\[4783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
Oct 3 12:48:01 v22019038103785759 sshd\[4783\]: Failed password for root from 36.92.107.106 port 43646 ssh2
Oct 3 12:54:07 v22019038103785759 sshd\[5253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
Oct 3 12:54:09 v22019038103785759 sshd\[5253\]: Failed password for root from 36.92.107.106 port 43246 ssh2
Oct 3 12:54:56 v22019038103785759 sshd\[5308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
... show less
Brute-ForceSSH
Anonymous
Oct 3 10:41:12 s158416 sshd[2750741]: Failed password for root from 36.92.107.106 port 36600 ssh2<b ... show moreOct 3 10:41:12 s158416 sshd[2750741]: Failed password for root from 36.92.107.106 port 36600 ssh2
Oct 3 10:41:57 s158416 sshd[2750829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
Oct 3 10:41:59 s158416 sshd[2750829]: Failed password for root from 36.92.107.106 port 45780 ssh2
Oct 3 10:42:43 s158416 sshd[2751270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
Oct 3 10:42:44 s158416 sshd[2751270]: Failed password for root from 36.92.107.106 port 47528 ssh2
... show less
Oct 3 04:39:48 b146-35 sshd[366045]: Failed password for root from 36.92.107.106 port 60458 ssh2<br ... show moreOct 3 04:39:48 b146-35 sshd[366045]: Failed password for root from 36.92.107.106 port 60458 ssh2
Oct 3 04:40:36 b146-35 sshd[366204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
Oct 3 04:40:38 b146-35 sshd[366204]: Failed password for root from 36.92.107.106 port 41090 ssh2
... show less
2024-10-03T09:43:06.042054angela sshd[1252697]: Failed password for root from 36.92.107.106 port 450 ... show more2024-10-03T09:43:06.042054angela sshd[1252697]: Failed password for root from 36.92.107.106 port 45002 ssh2
2024-10-03T09:43:51.838754angela sshd[1252761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
2024-10-03T09:43:53.761758angela sshd[1252761]: Failed password for root from 36.92.107.106 port 40906 ssh2
... show less
Oct 3 05:13:18 mail sshd[4056238]: Failed password for root from 36.92.107.106 port 34648 ssh2<br / ... show moreOct 3 05:13:18 mail sshd[4056238]: Failed password for root from 36.92.107.106 port 34648 ssh2
Oct 3 05:14:07 mail sshd[4056525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=root
Oct 3 05:14:09 mail sshd[4056525]: Failed password for root from 36.92.107.106 port 56898 ssh2
... show less
2024-10-03T06:57:25.608736 mail2.akcurate.de sshd[256981]: Disconnected from authenticating user roo ... show more2024-10-03T06:57:25.608736 mail2.akcurate.de sshd[256981]: Disconnected from authenticating user root 36.92.107.106 port 49800 [preauth]
2024-10-03T06:59:15.667098 mail2.akcurate.de sshd[257001]: Disconnected from authenticating user root 36.92.107.106 port 51362 [preauth]
... show less
[rede-168-134] (sshd) Failed SSH login from 36.92.107.106 (ID/Indonesia/-): 5 in the last 3600 secs; ... show more[rede-168-134] (sshd) Failed SSH login from 36.92.107.106 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Oct 3 00:49:17 sshd[22287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=[USERNAME]
Oct 3 00:49:20 sshd[22287]: Failed password for [USERNAME] from 36.92.107.106 port 40378 ssh2
Oct 3 00:55:35 sshd[22517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.106 user=[USERNAME]
Oct 3 00:55:37 sshd[22517]: Failed password for [USERNAME] from 36.92.107.106 port 51514 ssh2
Oct 3 00:56:2 show less
2024-10-03T04:52:41.245658fra01.de.pop.as202427.net sshd[2729339]: User root from 36.92.107.106 not ... show more2024-10-03T04:52:41.245658fra01.de.pop.as202427.net sshd[2729339]: User root from 36.92.107.106 not allowed because not listed in AllowUsers
2024-10-03T04:58:34.815781fra01.de.pop.as202427.net sshd[2731067]: User root from 36.92.107.106 not allowed because not listed in AllowUsers
2024-10-03T04:59:21.041397fra01.de.pop.as202427.net sshd[2731417]: Invalid user ubuntu from 36.92.107.106 port 55784
... show less