Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Beijing Baidu Netcom Science and Technology Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Search Engine Spider

Comments:
Type Details Datetime
attackbotsspam
Bruteforce detected by fail2ban
2020-06-05 13:38:32
attack
Jun  1 16:27:37 ns381471 sshd[9203]: Failed password for root from 106.13.140.107 port 36220 ssh2
2020-06-02 01:22:24
attackbotsspam
May 29 22:40:16 mail sshd\[26119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.107  user=root
May 29 22:40:18 mail sshd\[26119\]: Failed password for root from 106.13.140.107 port 45734 ssh2
May 29 22:48:14 mail sshd\[26249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.107  user=root
...
2020-05-30 07:23:02
attackspam
Apr 20 09:09:02 mockhub sshd[2991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.107
Apr 20 09:09:04 mockhub sshd[2991]: Failed password for invalid user jz from 106.13.140.107 port 60328 ssh2
...
2020-04-21 00:31:48
Comments on same subnet:
IP Type Details Datetime
106.13.140.33 attackspam
Aug 26 11:16:22 abendstille sshd\[8819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.33  user=root
Aug 26 11:16:25 abendstille sshd\[8819\]: Failed password for root from 106.13.140.33 port 33908 ssh2
Aug 26 11:19:57 abendstille sshd\[12929\]: Invalid user trs from 106.13.140.33
Aug 26 11:19:57 abendstille sshd\[12929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.33
Aug 26 11:19:58 abendstille sshd\[12929\]: Failed password for invalid user trs from 106.13.140.33 port 46722 ssh2
...
2020-08-26 17:24:41
106.13.140.138 attack
Aug 13 13:20:31 gospond sshd[28698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.138 
Aug 13 13:20:31 gospond sshd[28698]: Invalid user guest111 from 106.13.140.138 port 35214
Aug 13 13:20:33 gospond sshd[28698]: Failed password for invalid user guest111 from 106.13.140.138 port 35214 ssh2
...
2020-08-13 20:49:54
106.13.140.33 attackspam
Aug 12 14:38:42 vmd36147 sshd[24804]: Failed password for root from 106.13.140.33 port 39560 ssh2
Aug 12 14:43:37 vmd36147 sshd[3305]: Failed password for root from 106.13.140.33 port 33568 ssh2
...
2020-08-12 21:14:52
106.13.140.33 attackbotsspam
Aug 10 13:29:02 game-panel sshd[20582]: Failed password for root from 106.13.140.33 port 43066 ssh2
Aug 10 13:32:41 game-panel sshd[20718]: Failed password for root from 106.13.140.33 port 49052 ssh2
2020-08-10 23:06:53
106.13.140.200 attack
firewall-block, port(s): 1425/tcp
2020-07-31 04:06:32
106.13.140.33 attack
Jul 23 20:01:48 web1 sshd\[2060\]: Invalid user test from 106.13.140.33
Jul 23 20:01:48 web1 sshd\[2060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.33
Jul 23 20:01:50 web1 sshd\[2060\]: Failed password for invalid user test from 106.13.140.33 port 38844 ssh2
Jul 23 20:05:57 web1 sshd\[2430\]: Invalid user ts3server from 106.13.140.33
Jul 23 20:05:57 web1 sshd\[2430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.33
2020-07-24 16:23:54
106.13.140.33 attack
$f2bV_matches
2020-07-15 09:08:43
106.13.140.33 attack
Jul 12 00:11:14 server1 sshd\[7062\]: Invalid user policy from 106.13.140.33
Jul 12 00:11:14 server1 sshd\[7062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.33 
Jul 12 00:11:16 server1 sshd\[7062\]: Failed password for invalid user policy from 106.13.140.33 port 45038 ssh2
Jul 12 00:14:32 server1 sshd\[8009\]: Invalid user dan from 106.13.140.33
Jul 12 00:14:32 server1 sshd\[8009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.33 
...
2020-07-12 14:25:38
106.13.140.200 attackspam
Unauthorized connection attempt detected from IP address 106.13.140.200 to port 3996
2020-07-09 05:01:15
106.13.140.200 attackbots
Jul  8 00:27:22 onepixel sshd[97234]: Invalid user mike from 106.13.140.200 port 49924
Jul  8 00:27:22 onepixel sshd[97234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.200 
Jul  8 00:27:22 onepixel sshd[97234]: Invalid user mike from 106.13.140.200 port 49924
Jul  8 00:27:24 onepixel sshd[97234]: Failed password for invalid user mike from 106.13.140.200 port 49924 ssh2
Jul  8 00:33:13 onepixel sshd[100018]: Invalid user lcd from 106.13.140.200 port 56016
2020-07-08 11:28:50
106.13.140.83 attack
Failed password for invalid user montse from 106.13.140.83 port 53072 ssh2
2020-07-06 01:14:33
106.13.140.83 attackspam
Invalid user baum from 106.13.140.83 port 43214
2020-06-28 14:50:08
106.13.140.33 attack
Jun 13 22:42:26 askasleikir sshd[29906]: Failed password for invalid user Administrator from 106.13.140.33 port 40856 ssh2
Jun 13 22:26:27 askasleikir sshd[29873]: Failed password for invalid user oscar from 106.13.140.33 port 43878 ssh2
Jun 13 22:36:49 askasleikir sshd[29895]: Failed password for invalid user golf from 106.13.140.33 port 51232 ssh2
2020-06-14 20:52:13
106.13.140.200 attackspambots
Invalid user Administrator from 106.13.140.200 port 35714
2020-06-13 20:07:24
106.13.140.200 attackbots
Jun  9 20:15:52 django-0 sshd\[6369\]: Invalid user yjj from 106.13.140.200Jun  9 20:15:53 django-0 sshd\[6369\]: Failed password for invalid user yjj from 106.13.140.200 port 46486 ssh2Jun  9 20:25:11 django-0 sshd\[6572\]: Invalid user kshitiz from 106.13.140.200
...
2020-06-10 06:37:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.140.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43181
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.140.107.			IN	A

;; AUTHORITY SECTION:
.			565	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042000 1800 900 604800 86400

;; Query time: 304 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 00:31:44 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 107.140.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.140.13.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
174.215.149.196 attack
This phone is stolen
2022-01-28 11:27:51
95.114.161.197 spambotsattackproxynormal
95.114.161.197
2022-02-06 03:28:15
40.92.91.88 normal
Email sending without name
2022-02-17 15:53:17
95.153.32.83 attack
hack
2022-01-26 01:25:41
110.42.4.217 proxy
110.42.4.217
2022-02-14 22:52:19
94.232.47.180 attack
Kaspersky is giving me notice of brute force attack from this IP
2022-02-07 14:58:37
78.139.99.188 attack
Attack on my server
2022-01-14 06:29:43
2001:0002:14:5:1:2:bf35:2610 spamnormal
2001:0002:14:5:1:2:bf35:2610
2022-02-04 22:33:04
96.6.66.66 attack
Constant attacks on my servers!
2022-01-22 00:25:28
95.223.150.146 attack
Constant attacks on my servers
2022-01-25 07:32:51
36.66.218.205 spambotsattackproxynormal
36.66.218.205
2022-02-14 08:22:52
31.204.150.150 attack
Constant attacks on my servers
2022-01-24 03:46:02
45.253.65.73 attack
Get impossible
2022-01-11 18:26:34
185.253.53.253 spambotsattackproxynormal
ALOIND860I
2022-01-21 04:58:19
185.63.253.200 proxy
Bokep
2022-02-05 23:30:33

Recently Reported IPs

34.67.254.99 27.254.206.114 14.163.91.89 218.90.155.130
202.137.154.77 197.248.18.203 197.221.249.20 192.144.219.201
188.81.40.115 186.213.14.185 182.56.99.116 180.87.165.6
180.76.190.91 180.46.157.225 178.44.185.37 171.236.38.224
167.172.131.96 167.71.224.129 159.65.137.122 159.65.86.239