Go
106.51.66.214
is a
Hacker
100 %
India
Report Abuse
1014attacks reported
828Brute-ForceSSH
75Brute-Force
46SSH
17Port ScanBrute-ForceSSH
14HackingBrute-ForceSSH
8Port ScanHackingBrute-ForceWeb App AttackSSH
6uncategorized
3Brute-ForceSSHWeb App Attack
3DDoS Attack
3
...
2abuse reported
2Email Spam
from 154 distinct reporters
and 9 distinct sources : BadIPs.com, Blocklist.de, darklist.de, FireHOL, Charles Haley, VoIPBL.org, NoThink.org, NormShield.com, AbuseIPDB
106.51.66.214 was first signaled at 2017-12-22 21:02 and last record was at 2019-06-23 03:07.
IP

106.51.66.214

Organization
Atria Convergence Technologies Pvt. Ltd. Broadband Internet Service Provider INDIA
Localisation
India
Karnataka, Bangalore
NetRange : First & Last IP
106.51.32.0 - 106.51.32.254
Network CIDR
106.51.32.0/24

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-04-04 21:01 attacks Brute-ForceSSH AbuseIPDB Apr 5 02:00:42 TORMINT sshd\[17529\]: Invalid user spark from 106.51.66.214 Apr 5 02:00:42 TORMINT sshd\[17529\]: pam_unix\(sshd:auth\): authenticatio
2019-04-04 20:05 attacks Brute-ForceSSH AbuseIPDB  
2019-04-04 15:53 attacks Brute-Force AbuseIPDB Apr 5 00:52:57 unicornsoft sshd\[27695\]: Invalid user ubuntu from 106.51.66.214 Apr 5 00:52:57 unicornsoft sshd\[27695\]: pam_unix\(sshd:auth\): auth
2019-04-04 15:30 attacks Brute-ForceSSH AbuseIPDB 2019-04-05T02:29:20.5000801240 sshd\[14694\]: Invalid user shutdown from 106.51.66.214 port 53861 2019-04-05T02:29:20.5052381240 sshd\[14694\]: pam_un
2019-04-04 14:06 attacks Brute-ForceSSH AbuseIPDB Apr 5 01:05:57 vmd17057 sshd\[21179\]: Invalid user redhat from 106.51.66.214 port 42682 Apr 5 01:05:57 vmd17057 sshd\[21179\]: pam_unix\(sshd:auth\):
2019-04-04 12:40 attacks Brute-ForceSSH AbuseIPDB Invalid user MayGion from 106.51.66.214 port 45668
2019-04-04 10:30 attacks Port ScanBrute-ForceSSH AbuseIPDB $f2bV_matches
2019-04-04 10:08 attacks Brute-ForceSSH AbuseIPDB Apr 4 21:08:08 bouncer sshd\[3863\]: Invalid user weblogic from 106.51.66.214 port 37503 Apr 4 21:08:08 bouncer sshd\[3863\]: pam_unix\(sshd:auth\): a
2019-04-04 09:37 attacks Brute-ForceSSH AbuseIPDB Apr 4 20:37:30 v22018076622670303 sshd\[4600\]: Invalid user batch from 106.51.66.214 port 54348 Apr 4 20:37:30 v22018076622670303 sshd\[4600\]: pam_u
2019-04-04 09:28 attacks Brute-ForceSSH AbuseIPDB Apr 4 20:28:22 amit sshd\[13704\]: Invalid user aron from 106.51.66.214 Apr 4 20:28:22 amit sshd\[13704\]: pam_unix\(sshd:auth\): authentication failu
2019-04-04 07:17 attacks Brute-ForceSSH AbuseIPDB Apr 4 18:17:23 vps65 sshd\[7482\]: Invalid user thomas from 106.51.66.214 port 48408 Apr 4 18:17:23 vps65 sshd\[7482\]: pam_unix\(sshd:auth\): authent
2019-04-04 06:53 attacks Brute-ForceSSH AbuseIPDB Apr 4 17:53:24 cvbmail sshd\[1372\]: Invalid user zabbix from 106.51.66.214 Apr 4 17:53:24 cvbmail sshd\[1372\]: pam_unix\(sshd:auth\): authentication
2019-04-04 04:45 attacks Port ScanSSH AbuseIPDB 04.04.2019 13:45:29 SSH access blocked by firewall
2019-04-04 04:01 attacks Brute-ForceSSH AbuseIPDB Apr 4 15:01:26 * sshd[24841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Apr 4 15:01:28 * s
2019-04-03 21:21 attacks Brute-ForceSSH AbuseIPDB  
2019-04-03 21:08 attacks Brute-ForceSSH AbuseIPDB Apr 4 08:07:56 v22018076622670303 sshd\[29421\]: Invalid user gpadmin from 106.51.66.214 port 56426 Apr 4 08:07:56 v22018076622670303 sshd\[29421\]: p
2019-04-03 18:53 attacks Brute-ForceSSH AbuseIPDB [Aegis] @ 2019-04-04 03:53:48 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attac
2019-04-03 18:33 attacks Brute-Force AbuseIPDB Apr 4 05:33:14 s0 sshd\[12969\]: Invalid user www from 106.51.66.214 port 48558 Apr 4 05:33:14 s0 sshd\[12969\]: pam_unix\(sshd:auth\): authentication
2019-04-03 18:22 attacks Brute-ForceSSH AbuseIPDB Apr 4 03:22:31 MK-Soft-VM4 sshd\[17535\]: Invalid user redhat from 106.51.66.214 port 38526 Apr 4 03:22:31 MK-Soft-VM4 sshd\[17535\]: pam_unix\(sshd:a
2019-04-03 15:49 attacks Brute-Force AbuseIPDB Apr 4 02:49:28 herz-der-gamer sshd[29067]: Invalid user nagios from 106.51.66.214 port 42502 Apr 4 02:49:28 herz-der-gamer sshd[29067]: pam_unix(sshd:
2019-04-03 10:52 attacks Brute-ForceSSH AbuseIPDB Apr 3 19:51:58 MK-Soft-VM3 sshd\[12413\]: Invalid user libsys from 106.51.66.214 port 39393 Apr 3 19:51:58 MK-Soft-VM3 sshd\[12413\]: pam_unix\(sshd:a
2019-04-03 09:09 attacks Port ScanSSH AbuseIPDB 03.04.2019 18:09:39 SSH access blocked by firewall
2019-04-03 08:53 attacks Brute-ForceSSH AbuseIPDB Apr 3 17:53:41 **** sshd[28903]: Invalid user km from 106.51.66.214 port 46510
2019-04-03 06:21 attacks Brute-ForceSSH AbuseIPDB Apr 3 11:17:46 xtremcommunity sshd\[12113\]: Invalid user ql from 106.51.66.214 port 60672 Apr 3 11:17:46 xtremcommunity sshd\[12113\]: pam_unix\(sshd
2019-04-03 05:09 attacks Brute-ForceSSH AbuseIPDB Apr 3 16:09:36 ArkNodeAT sshd\[26978\]: Invalid user qe from 106.51.66.214 Apr 3 16:09:36 ArkNodeAT sshd\[26978\]: pam_unix\(sshd:auth\): authenticati
2019-04-03 02:03 attacks Brute-ForceSSH AbuseIPDB Apr 3 12:56:06 dev0-dcde-rnet sshd[32463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Apr 3
2019-04-03 01:20 attacks Brute-ForceSSH AbuseIPDB Apr 3 12:14:12 ns37 sshd[21001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Apr 3 12:14:14
2019-04-03 00:38 attacks Brute-ForceSSH AbuseIPDB Apr 3 09:29:28 mail sshd\[11214\]: Invalid user admin from 106.51.66.214 port 59792 Apr 3 09:29:28 mail sshd\[11214\]: pam_unix\(sshd:auth\): authenti
2019-04-03 00:18 attacks SSH AbuseIPDB ssh-bruteforce
2019-04-03 00:15 attacks Brute-ForceSSH AbuseIPDB SSH invalid-user multiple login try
2019-04-02 19:27 attacks Brute-ForceSSH AbuseIPDB Apr 3 06:20:34 lnxded64 sshd[6085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Apr 3 06:20:
2019-04-02 15:36 attacks Brute-ForceSSH AbuseIPDB Apr 3 02:36:29 mail sshd\[31394\]: Invalid user test from 106.51.66.214 port 44773 Apr 3 02:36:29 mail sshd\[31394\]: Disconnected from 106.51.66.214
2019-04-02 11:53 attacks Brute-ForceSSH AbuseIPDB Apr 2 22:53:30 MK-Soft-Root2 sshd\[17811\]: Invalid user yo from 106.51.66.214 port 59395 Apr 2 22:53:30 MK-Soft-Root2 sshd\[17811\]: pam_unix\(sshd:a
2019-04-02 09:54 attacks Brute-ForceSSH AbuseIPDB Apr 2 20:48:50 lnxmail61 sshd[8606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Apr 2 20:48
2019-04-02 09:49 attacks Brute-ForceSSH AbuseIPDB Apr 2 18:49:06 *** sshd[15820]: Invalid user qn from 106.51.66.214
2019-04-02 05:31 attacks Brute-ForceSSH AbuseIPDB Apr 2 16:24:27 cp sshd[6819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Apr 2 16:24:29 cp
2019-04-01 22:56 attacks Brute-ForceSSH AbuseIPDB Apr 2 03:55:26 debian sshd\[29170\]: Invalid user dj from 106.51.66.214 port 42546 Apr 2 03:55:26 debian sshd\[29170\]: pam_unix\(sshd:auth\): authent
2019-04-01 21:24 attacks Brute-ForceSSH AbuseIPDB Apr 2 01:19:03 aat-srv002 sshd[1804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Apr 2 01:1
2019-04-01 20:57 attacks Brute-ForceSSH AbuseIPDB Apr 2 05:57:41 *** sshd[32343]: Invalid user tq from 106.51.66.214
2019-04-01 20:38 attacks Brute-Force AbuseIPDB Apr 2 01:33:24 bilbo sshd\[17910\]: Invalid user cu from 106.51.66.214\ Apr 2 01:33:26 bilbo sshd\[17910\]: Failed password for invalid user cu from 1
2019-04-01 18:48 attacks Brute-ForceSSH AbuseIPDB Apr 2 05:43:10 Ubuntu-1404-trusty-64-minimal sshd\[7067\]: Invalid user bruno from 106.51.66.214 Apr 2 05:43:10 Ubuntu-1404-trusty-64-minimal sshd\[70
2019-04-01 14:51 attacks Brute-ForceSSH AbuseIPDB Multiple failed SSH logins
2019-04-01 13:39 attacks Brute-ForceSSH AbuseIPDB  
2019-04-01 12:31 attacks Brute-Force AbuseIPDB Apr 1 21:31:04 localhost sshd\[31155\]: Invalid user va from 106.51.66.214 port 56410 Apr 1 21:31:04 localhost sshd\[31155\]: pam_unix\(sshd:auth\): a
2019-04-01 11:03 attacks Brute-ForceSSH AbuseIPDB Apr 1 16:01:24 *** sshd[20978]: Failed password for invalid user scotty from 106.51.66.214 port 37099 ssh2 Apr 1 16:05:22 *** sshd[21096]: Failed pass
2019-04-01 09:06 attacks Port ScanBrute-ForceSSH AbuseIPDB Apr 1 19:59:24 MainVPS sshd[15637]: Invalid user util1 from 106.51.66.214 port 38121 Apr 1 19:59:24 MainVPS sshd[15637]: pam_unix(sshd:auth): authenti
2019-04-01 08:58 attacks Brute-Force AbuseIPDB $f2bV_matches
2019-04-01 07:16 attacks Brute-ForceSSH AbuseIPDB Apr 1 16:10:05 raspberrypi sshd\[11723\]: Invalid user ovhuser from 106.51.66.214Apr 1 16:10:07 raspberrypi sshd\[11723\]: Failed password for invalid
2019-04-01 07:12 attacks Brute-Force AbuseIPDB Apr 1 16:12:57 marvibiene sshd[7069]: Invalid user ovhuser from 106.51.66.214 port 55017 Apr 1 16:12:57 marvibiene sshd[7069]: pam_unix(sshd:auth): au
2019-04-01 04:44 attacks Brute-ForceSSH AbuseIPDB (sshd) Failed SSH login from 106.51.66.214 (broadband.actcorp.in): 5 in the last 3600 secs
2017-12-22 21:02 abuse Email Spam AbuseIPDB Currently 10 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 2 different usernames and wrong password: 2017-12-23T07:49:54+01:00 Access f
2017-12-24 15:23 abuse Email Spam AbuseIPDB Currently 14 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 2 different usernames and wrong password: 2017-12-25T00:47:33+01:00 Access f
2018-11-19 23:30 attacks Brute-Force AbuseIPDB Nov 20 09:30:46 ms-srv sshd[36272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Nov 20 09:30
2018-11-19 23:32 attacks Brute-ForceSSH AbuseIPDB  
2018-11-20 01:48 attacks Brute-Force AbuseIPDB Nov 20 12:32:12 mail sshd\[27221\]: Invalid user user from 106.51.66.214 port 41142 Nov 20 12:48:49 mail sshd\[27872\]: Invalid user bolognesi from 10
2019-01-29 07:03 attacks Brute-ForceSSH AbuseIPDB 2019-01-29T18:03:45.576257centos sshd\[22375\]: Invalid user squid from 106.51.66.214 port 57381 2019-01-29T18:03:45.583522centos sshd\[22375\]: pam_u
2019-01-29 08:38 attacks Brute-ForceSSH AbuseIPDB Jan 29 19:38:18 HiS01 sshd\[17856\]: Invalid user support from 106.51.66.214 Jan 29 19:38:18 HiS01 sshd\[17856\]: pam_unix\(sshd:auth\): authenticatio
2019-01-29 10:02 attacks Brute-ForceSSH AbuseIPDB Jan 29 15:59:19 *** sshd[18081]: Failed password for invalid user master from 106.51.66.214 port 58532 ssh2 Jan 29 16:03:45 *** sshd[18174]: Failed pa
2019-01-29 13:41 attacks Brute-ForceSSH AbuseIPDB Jan 30 00:36:16 ns37 sshd[10020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 Jan 30 00:36:1
2019-01-29 14:52 attacks Brute-ForceSSH AbuseIPDB Jan 30 00:52:18 *** sshd[17819]: Invalid user tyler from 106.51.66.214
2019-03-29 18:18 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-03-29 18:21 attacks blocklist_de Blocklist.de  
2019-03-29 18:21 attacks SSH blocklist_de_ssh Blocklist.de  
2019-03-29 18:23 attacks darklist_de darklist.de  
2019-03-29 18:27 attacks firehol_level2 FireHOL  
2019-03-29 18:27 attacks firehol_level4 FireHOL  
2019-03-29 18:34 attacks SSH haley_ssh Charles Haley  
2019-03-29 18:53 attacks Fraud VoIP voipbl VoIPBL.org  
2019-05-28 23:19 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-05-28 23:20 attacks blocklist_de_strongips Blocklist.de  
2019-05-30 09:29 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-05-30 09:29 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-06-03 22:59 attacks SSH nt_ssh_7d NoThink.org  
2019-06-23 03:07 attacks Brute-Force normshield_all_bruteforce NormShield.com  
2019-06-23 03:07 attacks Brute-Force normshield_high_bruteforce NormShield.com  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 106.51.32.0 - 106.51.32.254
netname: CABLELITE
descr: Atria Convergence Technologies Pvt. Ltd.,
country: IN
admin-c: IA145-AP
tech-c: IT120-AP
status: ALLOCATED NON-PORTABLE
remarks: Clips customers bangalore - Dynamic
notify: shyjumon.ravi@acttv.in
mnt-by: MAINT-IN-SHYJU
mnt-lower: MAINT-IN-SHYJU
mnt-routes: MAINT-IN-SHYJU
mnt-irt: IRT-CABLELITE-IN
last-modified: 2014-03-04T10:22:14Z
source: APNIC

irt: IRT-CABLELITE-IN
address: Atria Convergence Technologies Pvt Ltd
address: # 1, 2nd Floor, Indian Express Building,
address: Queen's Road, Bangalore - 560 001
e-mail: apnic@acttv.in
abuse-mailbox: abuse@acttv.in
admin-c: IA145-AP
tech-c: IT120-AP
auth: # Filtered
mnt-by: MAINT-IN-ACT
last-modified: 2013-07-29T08:17:20Z
source: APNIC

person: IP Admin
address: No 1, 2nd Floor, Indian Express Building, Queen's Road, Bangalore
country: IN
phone: +91-080-4284-4284
e-mail: ip-admin@acttv.in
nic-hdl: IA145-AP
mnt-by: MAINT-IN-ACT
last-modified: 2013-07-28T05:48:04Z
source: APNIC

person: IP Tech
address: No 1, 2nd Floor, Indian Express Building, Queen's Road, Bangalore
country: IN
phone: +91-080-4284-4284
e-mail: iptech@acttv.in
nic-hdl: IT120-AP
mnt-by: MAINT-IN-ACT
last-modified: 2013-07-28T05:58:32Z
source: APNIC

route: 106.51.32.0/24
descr: Atria Convergence Technologies Pvt. Ltd.,
origin: AS24309
country: IN
mnt-lower: MAINT-IN-SHYJU
mnt-routes: MAINT-IN-SHYJU
mnt-by: MAINT-IN-SHYJU
last-modified: 2011-06-24T12:39:42Z
source: APNIC
most specific ip range is highlighted
Updated : 2019-01-28