City: unknown
Region: Beijing
Country: China
Internet Service Provider: Beijing Baidu Netcom Science and Technology Co. Ltd.
Hostname: unknown
Organization: Beijing Baidu Netcom Science and Technology Co., Ltd.
Usage Type: Search Engine Spider
Type | Details | Datetime |
---|---|---|
attack | Nov 23 00:56:21 ncomp sshd[2602]: Invalid user admin from 106.13.131.142 Nov 23 00:56:21 ncomp sshd[2602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.142 Nov 23 00:56:21 ncomp sshd[2602]: Invalid user admin from 106.13.131.142 Nov 23 00:56:23 ncomp sshd[2602]: Failed password for invalid user admin from 106.13.131.142 port 38000 ssh2 |
2019-11-23 07:07:44 |
attack | Automatic report - Banned IP Access |
2019-08-22 01:03:48 |
attackbotsspam | Aug 13 22:03:47 server01 sshd\[1314\]: Invalid user sshuser from 106.13.131.142 Aug 13 22:03:47 server01 sshd\[1314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.142 Aug 13 22:03:49 server01 sshd\[1314\]: Failed password for invalid user sshuser from 106.13.131.142 port 37678 ssh2 ... |
2019-08-14 03:05:24 |
attackbotsspam | Aug 13 12:56:22 tux-35-217 sshd\[15432\]: Invalid user developer from 106.13.131.142 port 53818 Aug 13 12:56:22 tux-35-217 sshd\[15432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.142 Aug 13 12:56:23 tux-35-217 sshd\[15432\]: Failed password for invalid user developer from 106.13.131.142 port 53818 ssh2 Aug 13 13:03:08 tux-35-217 sshd\[15478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.142 user=www-data ... |
2019-08-13 19:09:18 |
attackspam | Jun 28 15:48:11 ncomp sshd[5855]: Invalid user applmgr from 106.13.131.142 Jun 28 15:48:11 ncomp sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.142 Jun 28 15:48:11 ncomp sshd[5855]: Invalid user applmgr from 106.13.131.142 Jun 28 15:48:13 ncomp sshd[5855]: Failed password for invalid user applmgr from 106.13.131.142 port 42960 ssh2 |
2019-06-29 00:20:57 |
IP | Type | Details | Datetime |
---|---|---|---|
106.13.131.132 | attackbots | Aug 24 07:58:52 prod4 sshd\[9180\]: Invalid user tecmint from 106.13.131.132 Aug 24 07:58:55 prod4 sshd\[9180\]: Failed password for invalid user tecmint from 106.13.131.132 port 33278 ssh2 Aug 24 08:07:32 prod4 sshd\[13463\]: Invalid user felix from 106.13.131.132 ... |
2020-08-24 15:15:06 |
106.13.131.80 | attackbots | (sshd) Failed SSH login from 106.13.131.80 (CN/China/-): 5 in the last 3600 secs |
2020-05-29 19:52:52 |
106.13.131.80 | attackbots | May 21 23:17:09 srv-ubuntu-dev3 sshd[35226]: Invalid user panigrahi from 106.13.131.80 May 21 23:17:09 srv-ubuntu-dev3 sshd[35226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 May 21 23:17:09 srv-ubuntu-dev3 sshd[35226]: Invalid user panigrahi from 106.13.131.80 May 21 23:17:11 srv-ubuntu-dev3 sshd[35226]: Failed password for invalid user panigrahi from 106.13.131.80 port 35924 ssh2 May 21 23:21:12 srv-ubuntu-dev3 sshd[35851]: Invalid user ry from 106.13.131.80 May 21 23:21:12 srv-ubuntu-dev3 sshd[35851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 May 21 23:21:12 srv-ubuntu-dev3 sshd[35851]: Invalid user ry from 106.13.131.80 May 21 23:21:14 srv-ubuntu-dev3 sshd[35851]: Failed password for invalid user ry from 106.13.131.80 port 34936 ssh2 May 21 23:25:15 srv-ubuntu-dev3 sshd[36578]: Invalid user frh from 106.13.131.80 ... |
2020-05-22 07:13:31 |
106.13.131.80 | attackbotsspam | May 19 11:42:36 lnxded64 sshd[25478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 |
2020-05-20 02:36:35 |
106.13.131.80 | attack | May 8 22:35:08 web1 sshd\[445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 user=root May 8 22:35:10 web1 sshd\[445\]: Failed password for root from 106.13.131.80 port 55912 ssh2 May 8 22:42:28 web1 sshd\[1093\]: Invalid user mcj from 106.13.131.80 May 8 22:42:28 web1 sshd\[1093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 May 8 22:42:30 web1 sshd\[1093\]: Failed password for invalid user mcj from 106.13.131.80 port 50784 ssh2 |
2020-05-10 02:45:48 |
106.13.131.80 | attackspambots | $f2bV_matches |
2020-05-03 17:03:17 |
106.13.131.80 | attackbots | Invalid user eg from 106.13.131.80 port 38876 |
2020-04-21 23:50:11 |
106.13.131.80 | attackbots | DATE:2020-04-14 05:53:09,IP:106.13.131.80,MATCHES:10,PORT:ssh |
2020-04-14 13:56:32 |
106.13.131.80 | attackbots | Apr 8 13:44:58 rotator sshd\[23088\]: Invalid user cumulus from 106.13.131.80Apr 8 13:45:00 rotator sshd\[23088\]: Failed password for invalid user cumulus from 106.13.131.80 port 54630 ssh2Apr 8 13:48:18 rotator sshd\[23866\]: Invalid user test from 106.13.131.80Apr 8 13:48:19 rotator sshd\[23866\]: Failed password for invalid user test from 106.13.131.80 port 60072 ssh2Apr 8 13:49:41 rotator sshd\[23873\]: Failed password for backup from 106.13.131.80 port 47374 ssh2Apr 8 13:51:03 rotator sshd\[24625\]: Invalid user admin from 106.13.131.80 ... |
2020-04-08 20:14:33 |
106.13.131.80 | attackspambots | ssh brute force |
2020-04-07 13:17:25 |
106.13.131.80 | attackspambots | Apr 2 14:58:54 meumeu sshd[29271]: Failed password for root from 106.13.131.80 port 52304 ssh2 Apr 2 15:03:56 meumeu sshd[29939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 Apr 2 15:03:59 meumeu sshd[29939]: Failed password for invalid user ky from 106.13.131.80 port 53454 ssh2 ... |
2020-04-02 23:36:24 |
106.13.131.80 | attackbotsspam | Mar 30 03:28:43 srv-ubuntu-dev3 sshd[59757]: Invalid user vqf from 106.13.131.80 Mar 30 03:28:43 srv-ubuntu-dev3 sshd[59757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 Mar 30 03:28:43 srv-ubuntu-dev3 sshd[59757]: Invalid user vqf from 106.13.131.80 Mar 30 03:28:45 srv-ubuntu-dev3 sshd[59757]: Failed password for invalid user vqf from 106.13.131.80 port 53314 ssh2 Mar 30 03:31:26 srv-ubuntu-dev3 sshd[60275]: Invalid user valeska from 106.13.131.80 Mar 30 03:31:26 srv-ubuntu-dev3 sshd[60275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 Mar 30 03:31:26 srv-ubuntu-dev3 sshd[60275]: Invalid user valeska from 106.13.131.80 Mar 30 03:31:28 srv-ubuntu-dev3 sshd[60275]: Failed password for invalid user valeska from 106.13.131.80 port 35430 ssh2 Mar 30 03:34:14 srv-ubuntu-dev3 sshd[60716]: Invalid user yno from 106.13.131.80 ... |
2020-03-30 09:41:57 |
106.13.131.80 | attack | Mar 25 19:41:34 xxxxxxx0 sshd[24209]: Invalid user lexus from 106.13.131.80 port 42528 Mar 25 19:41:34 xxxxxxx0 sshd[24209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 Mar 25 19:41:36 xxxxxxx0 sshd[24209]: Failed password for invalid user lexus from 106.13.131.80 port 42528 ssh2 Mar 25 19:55:38 xxxxxxx0 sshd[27516]: Invalid user ghostname from 106.13.131.80 port 53882 Mar 25 19:55:38 xxxxxxx0 sshd[27516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=106.13.131.80 |
2020-03-28 08:20:13 |
106.13.131.153 | attack | CMS (WordPress or Joomla) login attempt. |
2020-03-11 12:41:50 |
106.13.131.4 | attackbotsspam | Jan 1 18:51:37 lnxweb61 sshd[24235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.4 |
2020-01-02 03:14:05 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.131.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49192
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.131.142. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019062800 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 29 00:20:44 CST 2019
;; MSG SIZE rcvd: 118
Host 142.131.13.106.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 142.131.13.106.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
164.132.100.13 | attack | Automatic report - XMLRPC Attack |
2019-12-15 06:07:15 |
51.38.57.78 | attackspambots | k+ssh-bruteforce |
2019-12-15 05:49:55 |
129.211.16.236 | attack | Dec 14 03:13:26 *** sshd[19500]: Failed password for invalid user mysql from 129.211.16.236 port 59058 ssh2 Dec 14 03:33:20 *** sshd[19858]: Failed password for invalid user sbarbie2 from 129.211.16.236 port 43607 ssh2 Dec 14 03:42:33 *** sshd[20102]: Failed password for invalid user blanco from 129.211.16.236 port 44807 ssh2 Dec 14 03:51:36 *** sshd[20272]: Failed password for invalid user Tuire from 129.211.16.236 port 46040 ssh2 Dec 14 04:18:25 *** sshd[20806]: Failed password for invalid user w from 129.211.16.236 port 49619 ssh2 Dec 14 04:36:38 *** sshd[21126]: Failed password for invalid user andric from 129.211.16.236 port 51953 ssh2 Dec 14 04:45:41 *** sshd[21387]: Failed password for invalid user barber from 129.211.16.236 port 53103 ssh2 Dec 14 04:54:58 *** sshd[21512]: Failed password for invalid user pcap from 129.211.16.236 port 54193 ssh2 Dec 14 05:04:20 *** sshd[21680]: Failed password for invalid user globit from 129.211.16.236 port 55494 ssh2 Dec 14 05:13:33 *** sshd[21889]: Failed password f |
2019-12-15 05:36:22 |
109.70.100.29 | attackbotsspam | Looking for resource vulnerabilities |
2019-12-15 06:02:11 |
45.253.64.83 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 32 - port: 3390 proto: TCP cat: Misc Attack |
2019-12-15 05:46:43 |
91.215.244.12 | attackbotsspam | Dec 14 16:24:23 [host] sshd[26826]: Invalid user 123456 from 91.215.244.12 Dec 14 16:24:23 [host] sshd[26826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.244.12 Dec 14 16:24:26 [host] sshd[26826]: Failed password for invalid user 123456 from 91.215.244.12 port 56369 ssh2 |
2019-12-15 05:31:56 |
80.210.19.98 | attackspambots | port 23 |
2019-12-15 05:40:13 |
184.22.144.63 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 14-12-2019 14:40:09. |
2019-12-15 05:39:44 |
113.181.5.73 | attack | 1576334409 - 12/14/2019 15:40:09 Host: 113.181.5.73/113.181.5.73 Port: 445 TCP Blocked |
2019-12-15 05:40:43 |
5.196.226.217 | attackbots | Dec 14 22:30:41 lnxweb61 sshd[31217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.226.217 |
2019-12-15 06:06:31 |
51.38.175.197 | attackbotsspam | Dec 14 18:43:39 web8 sshd\[26188\]: Invalid user 123 from 51.38.175.197 Dec 14 18:43:39 web8 sshd\[26188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.175.197 Dec 14 18:43:40 web8 sshd\[26188\]: Failed password for invalid user 123 from 51.38.175.197 port 59116 ssh2 Dec 14 18:48:40 web8 sshd\[28511\]: Invalid user nystrom from 51.38.175.197 Dec 14 18:48:40 web8 sshd\[28511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.175.197 |
2019-12-15 05:45:08 |
66.146.193.33 | attackspam | Automatic report - Banned IP Access |
2019-12-15 05:48:22 |
112.134.160.106 | attackbots | Port 1433 Scan |
2019-12-15 05:38:30 |
122.51.207.46 | attackspam | Dec 14 19:45:39 MK-Soft-Root2 sshd[20942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.207.46 Dec 14 19:45:42 MK-Soft-Root2 sshd[20942]: Failed password for invalid user saintflower from 122.51.207.46 port 35212 ssh2 ... |
2019-12-15 06:01:01 |
51.75.195.25 | attack | SSH Brute Force |
2019-12-15 05:54:27 |