Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: Beijing Baidu Netcom Science and Technology Co., Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.13.103.1 attackspambots
leo_www
2020-08-18 07:46:54
106.13.103.1 attack
Aug 11 21:41:18 ajax sshd[6729]: Failed password for root from 106.13.103.1 port 36540 ssh2
2020-08-12 07:31:45
106.13.103.1 attackspam
Aug 11 21:12:19 haigwepa sshd[10571]: Failed password for root from 106.13.103.1 port 53562 ssh2
...
2020-08-12 03:34:19
106.13.103.1 attackbots
Brute-force attempt banned
2020-08-07 08:13:20
106.13.103.1 attackbots
Jul 26 11:27:17 myvps sshd[6965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1 
Jul 26 11:27:19 myvps sshd[6965]: Failed password for invalid user crp from 106.13.103.1 port 43490 ssh2
Jul 26 11:36:40 myvps sshd[12655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1 
...
2020-07-26 17:43:53
106.13.103.1 attackspam
Jul 25 20:44:08 dhoomketu sshd[1868820]: Failed password for invalid user postgres from 106.13.103.1 port 47876 ssh2
Jul 25 20:46:30 dhoomketu sshd[1868894]: Invalid user xp from 106.13.103.1 port 44876
Jul 25 20:46:30 dhoomketu sshd[1868894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1 
Jul 25 20:46:30 dhoomketu sshd[1868894]: Invalid user xp from 106.13.103.1 port 44876
Jul 25 20:46:32 dhoomketu sshd[1868894]: Failed password for invalid user xp from 106.13.103.1 port 44876 ssh2
...
2020-07-25 23:17:12
106.13.103.1 attackbotsspam
Jul 21 04:09:24 plex-server sshd[183163]: Invalid user ts3user from 106.13.103.1 port 48894
Jul 21 04:09:24 plex-server sshd[183163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1 
Jul 21 04:09:24 plex-server sshd[183163]: Invalid user ts3user from 106.13.103.1 port 48894
Jul 21 04:09:25 plex-server sshd[183163]: Failed password for invalid user ts3user from 106.13.103.1 port 48894 ssh2
Jul 21 04:12:49 plex-server sshd[183477]: Invalid user dg from 106.13.103.1 port 36936
...
2020-07-21 13:13:41
106.13.103.1 attackspam
SSH Attack
2020-07-12 19:49:00
106.13.103.1 attack
$f2bV_matches
2020-07-09 02:30:00
106.13.103.1 attackbots
Jul  5 05:52:04 raspberrypi sshd[17318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1  user=root
Jul  5 05:52:06 raspberrypi sshd[17318]: Failed password for invalid user root from 106.13.103.1 port 36766 ssh2
...
2020-07-05 16:28:12
106.13.103.251 attackspam
Jun 29 12:52:17 mail sshd[21112]: Failed password for root from 106.13.103.251 port 37364 ssh2
Jun 29 13:06:50 mail sshd[23098]: Failed password for root from 106.13.103.251 port 35224 ssh2
...
2020-06-29 23:50:40
106.13.103.1 attackbots
2020-06-20T06:09:01.623245shield sshd\[32655\]: Invalid user wilson from 106.13.103.1 port 58262
2020-06-20T06:09:01.627159shield sshd\[32655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1
2020-06-20T06:09:03.643321shield sshd\[32655\]: Failed password for invalid user wilson from 106.13.103.1 port 58262 ssh2
2020-06-20T06:12:46.386327shield sshd\[815\]: Invalid user chef from 106.13.103.1 port 47236
2020-06-20T06:12:46.390043shield sshd\[815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1
2020-06-20 15:07:25
106.13.103.1 attackbotsspam
Jun 18 16:37:01 vserver sshd\[25110\]: Invalid user apache from 106.13.103.1Jun 18 16:37:03 vserver sshd\[25110\]: Failed password for invalid user apache from 106.13.103.1 port 46814 ssh2Jun 18 16:43:10 vserver sshd\[25243\]: Failed password for root from 106.13.103.1 port 41304 ssh2Jun 18 16:44:16 vserver sshd\[25247\]: Invalid user tommy from 106.13.103.1
...
2020-06-19 02:46:18
106.13.103.251 attack
Port scan: Attack repeated for 24 hours
2020-06-12 08:51:56
106.13.103.1 attackbots
Jun 11 07:09:39 lnxmysql61 sshd[25254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1
2020-06-11 13:39:03
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.103.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41539
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.103.204.			IN	A

;; AUTHORITY SECTION:
.			2294	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041102 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 12 03:41:50 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 204.103.13.106.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.3, trying next server
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 204.103.13.106.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
216.218.206.95 attackbots
 TCP (SYN) 216.218.206.95:51055 -> port 5555, len 44
2020-07-25 03:25:12
193.107.160.146 attack
Jul 24 10:26:01 mail.srvfarm.net postfix/smtps/smtpd[2165683]: warning: unknown[193.107.160.146]: SASL PLAIN authentication failed: 
Jul 24 10:26:01 mail.srvfarm.net postfix/smtps/smtpd[2165683]: lost connection after AUTH from unknown[193.107.160.146]
Jul 24 10:34:23 mail.srvfarm.net postfix/smtps/smtpd[2184220]: warning: unknown[193.107.160.146]: SASL PLAIN authentication failed: 
Jul 24 10:34:23 mail.srvfarm.net postfix/smtps/smtpd[2184220]: lost connection after AUTH from unknown[193.107.160.146]
Jul 24 10:35:35 mail.srvfarm.net postfix/smtps/smtpd[2184246]: warning: unknown[193.107.160.146]: SASL PLAIN authentication failed:
2020-07-25 02:56:27
95.222.236.144 attackspam
Jul 24 14:09:07 mail.srvfarm.net dovecot: pop3-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=95.222.236.144, lip=185.118.197.126, TLS: Connection closed, session=<5jPj1i6rGo1f3uyQ>
Jul 24 14:09:33 mail.srvfarm.net dovecot: pop3-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=95.222.236.144, lip=185.118.197.126, TLS: Connection closed, session=
Jul 24 14:10:13 mail.srvfarm.net dovecot: pop3-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=95.222.236.144, lip=185.118.197.126, TLS: Connection closed, session=<3JzO2i6ryqhf3uyQ>
Jul 24 14:12:01 mail.srvfarm.net dovecot: pop3-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=95.222.236.144, lip=185.118.197.126, TLS: Connection closed, session=
Jul 24 14:12:22 mail.srvfarm.net dovecot: pop3-logi
2020-07-25 02:59:48
31.170.48.171 attackbots
Jul 24 10:53:19 mail.srvfarm.net postfix/smtpd[2185317]: warning: unknown[31.170.48.171]: SASL PLAIN authentication failed: 
Jul 24 10:53:20 mail.srvfarm.net postfix/smtpd[2185317]: lost connection after AUTH from unknown[31.170.48.171]
Jul 24 10:56:56 mail.srvfarm.net postfix/smtps/smtpd[2188738]: warning: unknown[31.170.48.171]: SASL PLAIN authentication failed: 
Jul 24 10:56:56 mail.srvfarm.net postfix/smtps/smtpd[2188738]: lost connection after AUTH from unknown[31.170.48.171]
Jul 24 10:57:04 mail.srvfarm.net postfix/smtps/smtpd[2191179]: warning: unknown[31.170.48.171]: SASL PLAIN authentication failed:
2020-07-25 02:55:06
31.170.51.201 attackspam
Jul 24 11:30:32 mail.srvfarm.net postfix/smtps/smtpd[2209330]: warning: unknown[31.170.51.201]: SASL PLAIN authentication failed: 
Jul 24 11:30:32 mail.srvfarm.net postfix/smtps/smtpd[2209330]: lost connection after AUTH from unknown[31.170.51.201]
Jul 24 11:31:11 mail.srvfarm.net postfix/smtps/smtpd[2208710]: warning: unknown[31.170.51.201]: SASL PLAIN authentication failed: 
Jul 24 11:31:11 mail.srvfarm.net postfix/smtps/smtpd[2208710]: lost connection after AUTH from unknown[31.170.51.201]
Jul 24 11:31:16 mail.srvfarm.net postfix/smtps/smtpd[2210021]: warning: unknown[31.170.51.201]: SASL PLAIN authentication failed:
2020-07-25 02:54:45
46.32.20.138 attackbotsspam
Jul 24 10:27:41 mail.srvfarm.net postfix/smtpd[2180808]: warning: unknown[46.32.20.138]: SASL PLAIN authentication failed: 
Jul 24 10:27:42 mail.srvfarm.net postfix/smtpd[2180808]: lost connection after AUTH from unknown[46.32.20.138]
Jul 24 10:29:49 mail.srvfarm.net postfix/smtps/smtpd[2184265]: warning: unknown[46.32.20.138]: SASL PLAIN authentication failed: 
Jul 24 10:29:49 mail.srvfarm.net postfix/smtps/smtpd[2184265]: lost connection after AUTH from unknown[46.32.20.138]
Jul 24 10:37:00 mail.srvfarm.net postfix/smtps/smtpd[2184239]: warning: unknown[46.32.20.138]: SASL PLAIN authentication failed:
2020-07-25 03:01:03
212.129.139.59 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-24T15:31:04Z and 2020-07-24T16:50:40Z
2020-07-25 03:10:06
113.88.112.21 attackspambots
Unauthorized connection attempt from IP address 113.88.112.21 on Port 445(SMB)
2020-07-25 03:12:19
139.199.14.128 attack
Jul 24 18:15:30 ns381471 sshd[8782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.14.128
Jul 24 18:15:32 ns381471 sshd[8782]: Failed password for invalid user dcadmin from 139.199.14.128 port 51676 ssh2
2020-07-25 03:29:41
41.222.211.52 attackspambots
Unauthorized connection attempt from IP address 41.222.211.52 on Port 445(SMB)
2020-07-25 03:01:18
117.247.188.68 attackspambots
Honeypot attack, port: 445, PTR: static.ftth.mgl.117.247.188.68.bsnl.in.
2020-07-25 03:14:30
99.17.246.167 attackbotsspam
2020-07-24T14:25:16.976706mail.thespaminator.com sshd[24111]: Invalid user jasmin from 99.17.246.167 port 33504
2020-07-24T14:25:19.535902mail.thespaminator.com sshd[24111]: Failed password for invalid user jasmin from 99.17.246.167 port 33504 ssh2
...
2020-07-25 03:04:08
178.122.47.243 attackbotsspam
Attempted connection to port 445.
2020-07-25 02:57:33
218.92.0.219 attackbotsspam
Jul 24 19:17:38 game-panel sshd[15019]: Failed password for root from 218.92.0.219 port 19776 ssh2
Jul 24 19:17:39 game-panel sshd[15019]: Failed password for root from 218.92.0.219 port 19776 ssh2
Jul 24 19:17:41 game-panel sshd[15019]: Failed password for root from 218.92.0.219 port 19776 ssh2
2020-07-25 03:23:05
42.112.211.52 attackbotsspam
Jul 22 19:46:31 our-server-hostname sshd[20260]: Invalid user tester from 42.112.211.52
Jul 22 19:46:31 our-server-hostname sshd[20260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.112.211.52 
Jul 22 19:46:34 our-server-hostname sshd[20260]: Failed password for invalid user tester from 42.112.211.52 port 40514 ssh2
Jul 22 19:58:25 our-server-hostname sshd[22003]: Invalid user testadmin from 42.112.211.52
Jul 22 19:58:25 our-server-hostname sshd[22003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.112.211.52 
Jul 22 19:58:27 our-server-hostname sshd[22003]: Failed password for invalid user testadmin from 42.112.211.52 port 44529 ssh2
Jul 22 20:00:50 our-server-hostname sshd[22307]: Invalid user postgre from 42.112.211.52
Jul 22 20:00:51 our-server-hostname sshd[22307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.112.211.52 
Jul 22 20........
-------------------------------
2020-07-25 03:15:47

Recently Reported IPs

89.187.177.136 51.158.103.109 159.69.190.90 99.84.216.24
103.123.86.121 119.29.54.83 99.84.216.88 202.188.208.209
187.38.144.8 147.135.16.34 194.25.134.82 182.76.158.114
117.21.211.139 217.150.78.251 99.84.216.9 2.35.210.96
104.238.100.183 198.27.81.223 134.73.7.197 191.241.243.168