Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Beijing

Country: China

Internet Service Provider: Beijing Baidu Netcom Science and Technology Co. Ltd.

Hostname: unknown

Organization: Beijing Baidu Netcom Science and Technology Co., Ltd.

Usage Type: Search Engine Spider

Comments:
Type Details Datetime
attackbotsspam
Feb  8 10:42:37 legacy sshd[29383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
Feb  8 10:42:40 legacy sshd[29383]: Failed password for invalid user ndu from 106.12.16.140 port 34198 ssh2
Feb  8 10:48:46 legacy sshd[29801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
...
2020-02-08 17:53:02
attack
Jan 27 01:45:24 tdfoods sshd\[7604\]: Invalid user amd from 106.12.16.140
Jan 27 01:45:24 tdfoods sshd\[7604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
Jan 27 01:45:26 tdfoods sshd\[7604\]: Failed password for invalid user amd from 106.12.16.140 port 58306 ssh2
Jan 27 01:48:45 tdfoods sshd\[7840\]: Invalid user ss from 106.12.16.140
Jan 27 01:48:45 tdfoods sshd\[7840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
2020-01-27 19:53:13
attackbotsspam
Jan 14 22:16:52 lnxmysql61 sshd[26251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
2020-01-15 06:00:35
attackbots
Jan  3 22:36:50 markkoudstaal sshd[27964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
Jan  3 22:36:52 markkoudstaal sshd[27964]: Failed password for invalid user kwonms from 106.12.16.140 port 35754 ssh2
Jan  3 22:41:04 markkoudstaal sshd[28266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
2020-01-04 05:53:29
attackbots
Jan  3 21:28:30 markkoudstaal sshd[22593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
Jan  3 21:28:32 markkoudstaal sshd[22593]: Failed password for invalid user test from 106.12.16.140 port 51878 ssh2
Jan  3 21:32:58 markkoudstaal sshd[22938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
2020-01-04 04:42:11
attackspambots
2019-11-15T16:43:18.981919  sshd[10961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140  user=root
2019-11-15T16:43:21.094986  sshd[10961]: Failed password for root from 106.12.16.140 port 59156 ssh2
2019-11-15T16:53:00.140862  sshd[11121]: Invalid user shunichiro from 106.12.16.140 port 39942
2019-11-15T16:53:00.198947  sshd[11121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
2019-11-15T16:53:00.140862  sshd[11121]: Invalid user shunichiro from 106.12.16.140 port 39942
2019-11-15T16:53:01.879927  sshd[11121]: Failed password for invalid user shunichiro from 106.12.16.140 port 39942 ssh2
...
2019-11-16 03:29:53
attackspambots
2019-11-11T19:15:16.640977  sshd[9331]: Invalid user vcsa from 106.12.16.140 port 51942
2019-11-11T19:15:16.654759  sshd[9331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
2019-11-11T19:15:16.640977  sshd[9331]: Invalid user vcsa from 106.12.16.140 port 51942
2019-11-11T19:15:18.984668  sshd[9331]: Failed password for invalid user vcsa from 106.12.16.140 port 51942 ssh2
2019-11-11T19:24:15.331524  sshd[9448]: Invalid user engine from 106.12.16.140 port 58758
...
2019-11-12 02:49:07
attack
detected by Fail2Ban
2019-11-06 18:00:46
attackbotsspam
2019-11-05T15:20:20.498688abusebot-6.cloudsearch.cf sshd\[22838\]: Invalid user vps from 106.12.16.140 port 48062
2019-11-05 23:50:42
attackspambots
Oct 15 06:36:16 vps647732 sshd[30441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
Oct 15 06:36:19 vps647732 sshd[30441]: Failed password for invalid user ah from 106.12.16.140 port 53470 ssh2
...
2019-10-15 13:15:21
attackspambots
2019-10-06T05:03:11.007036abusebot-5.cloudsearch.cf sshd\[6923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140  user=root
2019-10-06 13:26:56
attack
Sep  4 15:04:33 rpi sshd[3153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140 
Sep  4 15:04:35 rpi sshd[3153]: Failed password for invalid user neeraj from 106.12.16.140 port 54596 ssh2
2019-09-05 05:10:04
attack
2019-08-29T20:26:27.020502abusebot-4.cloudsearch.cf sshd\[24859\]: Invalid user jonathan from 106.12.16.140 port 59886
2019-08-30 07:08:07
attack
2019-08-12T22:11:46.672384abusebot-8.cloudsearch.cf sshd\[30723\]: Invalid user mqm from 106.12.16.140 port 48774
2019-08-13 06:28:02
attackbotsspam
Jul 28 23:35:49 mout sshd[31326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140  user=root
Jul 28 23:35:50 mout sshd[31326]: Failed password for root from 106.12.16.140 port 42046 ssh2
2019-07-29 05:38:48
attackbots
Automated report - ssh fail2ban:
Jul 13 07:30:17 authentication failure 
Jul 13 07:30:18 wrong password, user=emil, port=57190, ssh2
Jul 13 07:46:14 authentication failure
2019-07-13 13:47:42
attackbotsspam
Jul  2 06:54:09 MK-Soft-Root1 sshd\[31615\]: Invalid user bp from 106.12.16.140 port 40000
Jul  2 06:54:09 MK-Soft-Root1 sshd\[31615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
Jul  2 06:54:11 MK-Soft-Root1 sshd\[31615\]: Failed password for invalid user bp from 106.12.16.140 port 40000 ssh2
...
2019-07-02 13:23:59
Comments on same subnet:
IP Type Details Datetime
106.12.165.253 attackbotsspam
SSH login attempts.
2020-10-12 03:34:48
106.12.165.253 attackbots
SSH login attempts.
2020-10-11 19:30:10
106.12.167.216 attackbotsspam
vps:sshd-InvalidUser
2020-10-11 04:14:47
106.12.165.253 attackspambots
SSH Honeypot -> SSH Bruteforce / Login
2020-10-11 02:48:22
106.12.167.216 attackbotsspam
ssh intrusion attempt
2020-10-10 20:10:26
106.12.165.253 attack
Oct 10 12:10:09 eventyay sshd[8945]: Failed password for root from 106.12.165.253 port 39170 ssh2
Oct 10 12:12:50 eventyay sshd[9032]: Failed password for root from 106.12.165.253 port 46698 ssh2
...
2020-10-10 18:35:39
106.12.162.234 attackbotsspam
Oct  9 19:05:43 ws22vmsma01 sshd[45460]: Failed password for root from 106.12.162.234 port 35574 ssh2
Oct  9 19:15:45 ws22vmsma01 sshd[54407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234
Oct  9 19:15:47 ws22vmsma01 sshd[54407]: Failed password for invalid user tester from 106.12.162.234 port 52462 ssh2
Oct  9 19:18:34 ws22vmsma01 sshd[56806]: Failed password for root from 106.12.162.234 port 60766 ssh2
Oct  9 19:21:05 ws22vmsma01 sshd[58973]: Failed password for root from 106.12.162.234 port 40822 ssh2
Oct  9 19:23:33 ws22vmsma01 sshd[61103]: Failed password for root from 106.12.162.234 port 49104 ssh2
Oct  9 19:26:01 ws22vmsma01 sshd[63271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234
Oct  9 19:28:33 ws22vmsma01 sshd[65432]: Failed password for root from 106.12.162.234 port 37432 ssh2
Oct  9 19:31:11 ws22vmsma01 sshd[67739]: pam_unix(sshd:auth): authentication failure;
...
2020-10-10 06:37:07
106.12.162.234 attackspambots
$f2bV_matches
2020-10-09 14:40:15
106.12.162.234 attack
Oct  9 00:35:20 journals sshd\[54653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234  user=root
Oct  9 00:35:22 journals sshd\[54653\]: Failed password for root from 106.12.162.234 port 41638 ssh2
Oct  9 00:36:19 journals sshd\[54741\]: Invalid user admin from 106.12.162.234
Oct  9 00:36:19 journals sshd\[54741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234
Oct  9 00:36:21 journals sshd\[54741\]: Failed password for invalid user admin from 106.12.162.234 port 55018 ssh2
...
2020-10-09 05:46:49
106.12.162.234 attackspambots
2020-10-08T05:42:01.722253abusebot-3.cloudsearch.cf sshd[27681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234  user=root
2020-10-08T05:42:03.678253abusebot-3.cloudsearch.cf sshd[27681]: Failed password for root from 106.12.162.234 port 49538 ssh2
2020-10-08T05:45:23.929654abusebot-3.cloudsearch.cf sshd[27721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234  user=root
2020-10-08T05:45:25.614876abusebot-3.cloudsearch.cf sshd[27721]: Failed password for root from 106.12.162.234 port 60674 ssh2
2020-10-08T05:48:35.760514abusebot-3.cloudsearch.cf sshd[27756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234  user=root
2020-10-08T05:48:37.806725abusebot-3.cloudsearch.cf sshd[27756]: Failed password for root from 106.12.162.234 port 43576 ssh2
2020-10-08T05:51:51.252038abusebot-3.cloudsearch.cf sshd[27888]: pam_unix(sshd:auth):
...
2020-10-08 22:02:42
106.12.162.234 attack
2020-10-08T05:42:01.722253abusebot-3.cloudsearch.cf sshd[27681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234  user=root
2020-10-08T05:42:03.678253abusebot-3.cloudsearch.cf sshd[27681]: Failed password for root from 106.12.162.234 port 49538 ssh2
2020-10-08T05:45:23.929654abusebot-3.cloudsearch.cf sshd[27721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234  user=root
2020-10-08T05:45:25.614876abusebot-3.cloudsearch.cf sshd[27721]: Failed password for root from 106.12.162.234 port 60674 ssh2
2020-10-08T05:48:35.760514abusebot-3.cloudsearch.cf sshd[27756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.234  user=root
2020-10-08T05:48:37.806725abusebot-3.cloudsearch.cf sshd[27756]: Failed password for root from 106.12.162.234 port 43576 ssh2
2020-10-08T05:51:51.252038abusebot-3.cloudsearch.cf sshd[27888]: pam_unix(sshd:auth):
...
2020-10-08 13:57:13
106.12.163.84 attackspambots
 TCP (SYN) 106.12.163.84:50752 -> port 5555, len 44
2020-10-05 01:23:32
106.12.163.84 attackspam
 TCP (SYN) 106.12.163.84:50752 -> port 5555, len 44
2020-10-04 17:07:45
106.12.160.6 attack
2020-09-30T10:45:43+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-10-01 02:34:58
106.12.160.6 attack
2020-09-30T10:45:43+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-30 18:44:44
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.12.16.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19910
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.12.16.140.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040402 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 05 06:04:37 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 140.16.12.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 140.16.12.106.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
91.242.161.167 attackspam
auto-add
2019-12-19 05:54:33
88.199.164.141 attackspambots
Automatic report - XMLRPC Attack
2019-12-19 06:02:12
80.82.77.139 attack
srv.marc-hoffrichter.de:443 80.82.77.139 - - [18/Dec/2019:22:29:47 +0100] "GET /favicon.ico HTTP/1.1" 403 4520 "-" "python-requests/2.13.0"
2019-12-19 05:58:00
54.39.145.59 attackbotsspam
Dec 18 22:33:56 [host] sshd[22746]: Invalid user host from 54.39.145.59
Dec 18 22:33:56 [host] sshd[22746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.59
Dec 18 22:33:59 [host] sshd[22746]: Failed password for invalid user host from 54.39.145.59 port 47788 ssh2
2019-12-19 05:46:34
150.107.213.95 attackbotsspam
Dec 16 21:15:50 linuxrulz sshd[18705]: Invalid user herington from 150.107.213.95 port 55803
Dec 16 21:15:50 linuxrulz sshd[18705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.107.213.95
Dec 16 21:15:52 linuxrulz sshd[18705]: Failed password for invalid user herington from 150.107.213.95 port 55803 ssh2
Dec 16 21:15:52 linuxrulz sshd[18705]: Received disconnect from 150.107.213.95 port 55803:11: Bye Bye [preauth]
Dec 16 21:15:52 linuxrulz sshd[18705]: Disconnected from 150.107.213.95 port 55803 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=150.107.213.95
2019-12-19 05:36:14
40.92.73.95 attackspambots
Dec 18 17:30:47 debian-2gb-vpn-nbg1-1 kernel: [1057811.362695] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.73.95 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=111 ID=4057 DF PROTO=TCP SPT=53348 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-19 05:48:49
98.4.160.39 attackbotsspam
Dec 18 21:49:54 server sshd\[3769\]: Invalid user use from 98.4.160.39
Dec 18 21:49:54 server sshd\[3769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.4.160.39 
Dec 18 21:49:56 server sshd\[3769\]: Failed password for invalid user use from 98.4.160.39 port 45172 ssh2
Dec 18 22:01:59 server sshd\[7613\]: Invalid user temp from 98.4.160.39
Dec 18 22:01:59 server sshd\[7613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.4.160.39 
...
2019-12-19 05:37:46
23.247.22.104 attackbotsspam
Dec 18 16:33:22 grey postfix/smtpd\[12395\]: NOQUEUE: reject: RCPT from unknown\[23.247.22.104\]: 554 5.7.1 Service unavailable\; Client host \[23.247.22.104\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?23.247.22.104\; from=\<3037-1134-56717-947-principal=learning-steps.com@mail.burgines.info\> to=\ proto=ESMTP helo=\
...
2019-12-19 05:27:53
221.125.165.59 attack
Invalid user nikolaou from 221.125.165.59 port 33782
2019-12-19 06:05:05
190.78.221.132 attack
Unauthorized connection attempt from IP address 190.78.221.132 on Port 445(SMB)
2019-12-19 06:05:31
84.22.40.25 attackspam
Unauthorized connection attempt from IP address 84.22.40.25 on Port 445(SMB)
2019-12-19 05:29:08
109.173.40.60 attackbots
Dec 18 19:38:39 sip sshd[2420]: Failed password for www-data from 109.173.40.60 port 49402 ssh2
Dec 18 19:52:13 sip sshd[2587]: Failed password for backup from 109.173.40.60 port 52554 ssh2
2019-12-19 05:43:05
95.172.61.50 attackspambots
Unauthorized connection attempt from IP address 95.172.61.50 on Port 445(SMB)
2019-12-19 05:32:28
180.87.202.113 attackspam
Unauthorized connection attempt from IP address 180.87.202.113 on Port 445(SMB)
2019-12-19 05:53:06
213.162.215.184 attackbotsspam
port scan and connect, tcp 80 (http)
2019-12-19 05:33:46

Recently Reported IPs

80.82.65.82 189.125.2.234 113.160.215.163 80.51.70.10
14.47.233.167 134.209.60.175 181.211.10.27 194.243.6.150
222.186.43.80 210.16.75.217 218.39.92.3 199.127.132.110
119.28.130.153 88.198.40.126 76.27.163.60 78.13.207.70
194.108.171.117 181.188.189.226 1.53.176.30 118.137.24.247