Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.13.126.15 attack
(sshd) Failed SSH login from 106.13.126.15 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 12:06:40 server sshd[4482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15  user=root
Sep 28 12:06:41 server sshd[4482]: Failed password for root from 106.13.126.15 port 41050 ssh2
Sep 28 12:20:44 server sshd[8216]: Invalid user vlc from 106.13.126.15 port 46318
Sep 28 12:20:46 server sshd[8216]: Failed password for invalid user vlc from 106.13.126.15 port 46318 ssh2
Sep 28 12:24:48 server sshd[9210]: Invalid user cloud_user from 106.13.126.15 port 59846
2020-09-29 02:32:18
106.13.126.15 attackspam
Sep 27 20:06:13 eddieflores sshd\[21117\]: Invalid user caixa from 106.13.126.15
Sep 27 20:06:13 eddieflores sshd\[21117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15
Sep 27 20:06:15 eddieflores sshd\[21117\]: Failed password for invalid user caixa from 106.13.126.15 port 51486 ssh2
Sep 27 20:10:38 eddieflores sshd\[21570\]: Invalid user manager from 106.13.126.15
Sep 27 20:10:38 eddieflores sshd\[21570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15
2020-09-28 18:39:44
106.13.126.15 attackbots
2020-09-17T09:03:38.048129abusebot-5.cloudsearch.cf sshd[22865]: Invalid user deploy from 106.13.126.15 port 59936
2020-09-17T09:03:38.056471abusebot-5.cloudsearch.cf sshd[22865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15
2020-09-17T09:03:38.048129abusebot-5.cloudsearch.cf sshd[22865]: Invalid user deploy from 106.13.126.15 port 59936
2020-09-17T09:03:40.534284abusebot-5.cloudsearch.cf sshd[22865]: Failed password for invalid user deploy from 106.13.126.15 port 59936 ssh2
2020-09-17T09:08:30.998131abusebot-5.cloudsearch.cf sshd[22933]: Invalid user asterisk from 106.13.126.15 port 60770
2020-09-17T09:08:31.005942abusebot-5.cloudsearch.cf sshd[22933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15
2020-09-17T09:08:30.998131abusebot-5.cloudsearch.cf sshd[22933]: Invalid user asterisk from 106.13.126.15 port 60770
2020-09-17T09:08:33.041946abusebot-5.cloudsearch.cf sshd[22933
...
2020-09-17 20:15:09
106.13.126.15 attack
Sep 17 03:45:37 vps647732 sshd[16333]: Failed password for root from 106.13.126.15 port 60510 ssh2
...
2020-09-17 12:25:54
106.13.126.15 attackspam
Invalid user test from 106.13.126.15 port 52314
2020-09-05 20:57:55
106.13.126.15 attack
Time:     Fri Sep  4 22:27:19 2020 +0000
IP:       106.13.126.15 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  4 22:19:35 ca-16-ede1 sshd[7022]: Invalid user mns from 106.13.126.15 port 54058
Sep  4 22:19:37 ca-16-ede1 sshd[7022]: Failed password for invalid user mns from 106.13.126.15 port 54058 ssh2
Sep  4 22:24:34 ca-16-ede1 sshd[7660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15  user=root
Sep  4 22:24:36 ca-16-ede1 sshd[7660]: Failed password for root from 106.13.126.15 port 59896 ssh2
Sep  4 22:27:17 ca-16-ede1 sshd[8054]: Invalid user maruyama from 106.13.126.15 port 46818
2020-09-05 12:35:17
106.13.126.15 attackbotsspam
Sep  4 18:53:04 haigwepa sshd[14908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15 
Sep  4 18:53:06 haigwepa sshd[14908]: Failed password for invalid user pep from 106.13.126.15 port 35674 ssh2
...
2020-09-05 05:21:16
106.13.126.15 attackspambots
Invalid user mis from 106.13.126.15 port 50854
2020-08-26 02:17:22
106.13.126.15 attackbotsspam
Aug 15 06:49:38 lukav-desktop sshd\[17105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15  user=root
Aug 15 06:49:40 lukav-desktop sshd\[17105\]: Failed password for root from 106.13.126.15 port 37404 ssh2
Aug 15 06:53:45 lukav-desktop sshd\[19963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15  user=root
Aug 15 06:53:48 lukav-desktop sshd\[19963\]: Failed password for root from 106.13.126.15 port 60734 ssh2
Aug 15 06:58:05 lukav-desktop sshd\[22837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15  user=root
2020-08-15 12:02:23
106.13.126.15 attackspambots
Aug 14 16:37:17 vps639187 sshd\[23883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15  user=root
Aug 14 16:37:19 vps639187 sshd\[23883\]: Failed password for root from 106.13.126.15 port 41766 ssh2
Aug 14 16:40:13 vps639187 sshd\[23942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15  user=root
...
2020-08-15 01:16:50
106.13.126.15 attackbotsspam
Aug  3 05:52:48 * sshd[24052]: Failed password for root from 106.13.126.15 port 51682 ssh2
2020-08-03 12:36:52
106.13.126.15 attackspam
Invalid user Test from 106.13.126.15 port 36220
2020-07-23 19:04:52
106.13.126.15 attackspambots
Invalid user Test from 106.13.126.15 port 37064
2020-07-21 13:41:34
106.13.126.141 attackbots
BF attempts
2020-07-14 16:53:42
106.13.126.141 attackbots
SSH BruteForce Attack
2020-07-14 04:39:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.126.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.13.126.194.			IN	A

;; AUTHORITY SECTION:
.			141	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 06:34:10 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 194.126.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.126.13.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.9.24.40 attackbotsspam
Nov 29 18:42:21 plusreed sshd[13073]: Invalid user wwwadmin from 196.9.24.40
...
2019-11-30 07:48:22
198.245.49.37 attack
Nov 29 13:18:03 sachi sshd\[24836\]: Invalid user eni from 198.245.49.37
Nov 29 13:18:03 sachi sshd\[24836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns514527.ip-198-245-49.net
Nov 29 13:18:06 sachi sshd\[24836\]: Failed password for invalid user eni from 198.245.49.37 port 46264 ssh2
Nov 29 13:20:58 sachi sshd\[25121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns514527.ip-198-245-49.net  user=root
Nov 29 13:21:01 sachi sshd\[25121\]: Failed password for root from 198.245.49.37 port 53700 ssh2
2019-11-30 07:26:55
104.236.226.93 attackspambots
Nov 30 00:18:08 OPSO sshd\[7659\]: Invalid user neurootology.info from 104.236.226.93 port 37748
Nov 30 00:18:08 OPSO sshd\[7659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.226.93
Nov 30 00:18:11 OPSO sshd\[7659\]: Failed password for invalid user neurootology.info from 104.236.226.93 port 37748 ssh2
Nov 30 00:21:01 OPSO sshd\[8449\]: Invalid user info from 104.236.226.93 port 45210
Nov 30 00:21:01 OPSO sshd\[8449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.226.93
2019-11-30 07:23:17
68.48.240.245 attack
Nov 29 13:32:32 auw2 sshd\[11444\]: Invalid user skulstad from 68.48.240.245
Nov 29 13:32:32 auw2 sshd\[11444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-68-48-240-245.hsd1.mi.comcast.net
Nov 29 13:32:35 auw2 sshd\[11444\]: Failed password for invalid user skulstad from 68.48.240.245 port 52536 ssh2
Nov 29 13:35:38 auw2 sshd\[11681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-68-48-240-245.hsd1.mi.comcast.net  user=root
Nov 29 13:35:40 auw2 sshd\[11681\]: Failed password for root from 68.48.240.245 port 59916 ssh2
2019-11-30 07:44:44
36.110.199.9 attack
The IP has triggered Cloudflare WAF. CF-Ray: 53d0dc35eacdd35e | WAF_Rule_ID: asn | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-11-30 07:15:03
80.82.65.60 attack
11/29/2019-18:20:46.404359 80.82.65.60 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-30 07:37:35
163.172.204.185 attackspambots
Nov 29 17:16:32 dallas01 sshd[32070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185
Nov 29 17:16:33 dallas01 sshd[32070]: Failed password for invalid user eliane from 163.172.204.185 port 42125 ssh2
Nov 29 17:20:29 dallas01 sshd[406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185
2019-11-30 07:43:01
27.71.232.142 attack
445/tcp 1433/tcp
[2019-10-16/11-29]2pkt
2019-11-30 07:19:36
222.186.175.202 attackspam
Nov 29 23:20:46 zeus sshd[30356]: Failed password for root from 222.186.175.202 port 27736 ssh2
Nov 29 23:20:51 zeus sshd[30356]: Failed password for root from 222.186.175.202 port 27736 ssh2
Nov 29 23:20:55 zeus sshd[30356]: Failed password for root from 222.186.175.202 port 27736 ssh2
Nov 29 23:21:00 zeus sshd[30356]: Failed password for root from 222.186.175.202 port 27736 ssh2
Nov 29 23:21:05 zeus sshd[30356]: Failed password for root from 222.186.175.202 port 27736 ssh2
2019-11-30 07:21:46
188.131.190.3 attackspam
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: Invalid user tanya from 188.131.190.3
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.190.3
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: Invalid user tanya from 188.131.190.3
Nov 30 00:56:50 itv-usvr-01 sshd[17244]: Failed password for invalid user tanya from 188.131.190.3 port 35496 ssh2
Nov 30 00:59:53 itv-usvr-01 sshd[17342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.190.3  user=root
Nov 30 00:59:55 itv-usvr-01 sshd[17342]: Failed password for root from 188.131.190.3 port 36242 ssh2
2019-11-30 07:16:39
36.65.75.121 attackbotsspam
Unauthorised access (Nov 30) SRC=36.65.75.121 LEN=52 TTL=116 ID=17417 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 07:29:20
185.176.27.170 attackbotsspam
Nov 29 23:07:28 mail kernel: [6445356.576441] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=62041 PROTO=TCP SPT=45121 DPT=25492 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 23:08:02 mail kernel: [6445390.384792] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=932 PROTO=TCP SPT=45121 DPT=54094 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 23:08:17 mail kernel: [6445405.223221] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=19212 PROTO=TCP SPT=45121 DPT=54474 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 23:08:21 mail kernel: [6445409.520606] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=32441 PROTO=TCP SPT=45121 DPT=15328 WINDOW=1024 RES=0x0
2019-11-30 07:31:58
116.252.0.72 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 53d0385cbbf4983f | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/4.047745454 Mozilla/4.0 (compatible; MSIE 5.00; Windows 98) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-11-30 07:12:22
116.196.81.5 attack
SSH invalid-user multiple login try
2019-11-30 07:35:12
49.234.48.86 attackbotsspam
2019-11-29T23:20:45.798813abusebot-5.cloudsearch.cf sshd\[3611\]: Invalid user ruta from 49.234.48.86 port 54624
2019-11-30 07:38:06

Recently Reported IPs

106.13.104.73 106.13.14.132 106.13.144.25 106.13.229.115
106.13.234.160 106.13.26.10 106.13.26.65 106.13.3.140
106.13.63.17 106.13.88.17 106.14.113.179 231.165.20.210
106.14.116.164 106.14.134.46 106.14.139.71 106.14.151.183
106.14.153.121 96.247.31.149 118.235.209.175 106.225.146.236