City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
106.13.148.104 | attackbots | BF attempts |
2020-07-14 18:12:56 |
106.13.148.104 | attackbots | Jul 4 14:07:18 abendstille sshd\[8841\]: Invalid user all from 106.13.148.104 Jul 4 14:07:18 abendstille sshd\[8841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 Jul 4 14:07:20 abendstille sshd\[8841\]: Failed password for invalid user all from 106.13.148.104 port 54992 ssh2 Jul 4 14:10:31 abendstille sshd\[11777\]: Invalid user m1 from 106.13.148.104 Jul 4 14:10:31 abendstille sshd\[11777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 ... |
2020-07-05 00:45:30 |
106.13.148.104 | attackbotsspam | 2020-06-04T05:37:10.885791devel sshd[1833]: Failed password for root from 106.13.148.104 port 33708 ssh2 2020-06-04T05:38:29.418096devel sshd[1919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 user=root 2020-06-04T05:38:31.358581devel sshd[1919]: Failed password for root from 106.13.148.104 port 51124 ssh2 |
2020-06-04 18:33:49 |
106.13.148.104 | attackspambots | Jun 3 15:03:23 [host] sshd[32082]: pam_unix(sshd: Jun 3 15:03:25 [host] sshd[32082]: Failed passwor Jun 3 15:06:21 [host] sshd[32205]: pam_unix(sshd: |
2020-06-03 21:16:31 |
106.13.148.104 | attackspambots | Invalid user admin from 106.13.148.104 port 59152 |
2020-05-28 07:39:31 |
106.13.148.104 | attackbots | May 22 14:39:54 home sshd[31246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 May 22 14:39:56 home sshd[31246]: Failed password for invalid user ics from 106.13.148.104 port 51206 ssh2 May 22 14:44:25 home sshd[31918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 ... |
2020-05-22 23:58:57 |
106.13.148.104 | attack | May 9 18:39:25 ns382633 sshd\[2624\]: Invalid user juliane from 106.13.148.104 port 48350 May 9 18:39:25 ns382633 sshd\[2624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 May 9 18:39:26 ns382633 sshd\[2624\]: Failed password for invalid user juliane from 106.13.148.104 port 48350 ssh2 May 9 18:44:48 ns382633 sshd\[3517\]: Invalid user spam from 106.13.148.104 port 40024 May 9 18:44:48 ns382633 sshd\[3517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 |
2020-05-10 04:07:46 |
106.13.148.104 | attackbots | frenzy |
2020-04-26 06:31:11 |
106.13.148.104 | attackspambots | Apr 24 06:51:53 vps647732 sshd[5808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 Apr 24 06:51:54 vps647732 sshd[5808]: Failed password for invalid user testserver from 106.13.148.104 port 42790 ssh2 ... |
2020-04-24 15:38:46 |
106.13.148.104 | attack | $f2bV_matches |
2020-04-16 23:58:19 |
106.13.148.104 | attackspam | 2020-04-10T17:18:50.260104rocketchat.forhosting.nl sshd[23953]: Invalid user oracle from 106.13.148.104 port 48606 2020-04-10T17:18:51.812820rocketchat.forhosting.nl sshd[23953]: Failed password for invalid user oracle from 106.13.148.104 port 48606 ssh2 2020-04-10T17:35:39.507475rocketchat.forhosting.nl sshd[24482]: Invalid user test from 106.13.148.104 port 44798 ... |
2020-04-10 23:38:38 |
106.13.148.104 | attack | Apr 8 21:25:08 localhost sshd\[29831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 user=root Apr 8 21:25:10 localhost sshd\[29831\]: Failed password for root from 106.13.148.104 port 56122 ssh2 Apr 8 21:46:37 localhost sshd\[30225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104 user=root ... |
2020-04-09 10:20:02 |
106.13.148.104 | attack | ssh brute force |
2020-04-08 13:43:55 |
106.13.148.75 | attack | Feb 7 14:52:36 reporting1 sshd[13539]: Did not receive identification string from 106.13.148.75 Feb 7 14:55:46 reporting1 sshd[15143]: User r.r from 106.13.148.75 not allowed because not listed in AllowUsers Feb 7 14:55:46 reporting1 sshd[15143]: Failed password for invalid user r.r from 106.13.148.75 port 34612 ssh2 Feb 7 14:55:50 reporting1 sshd[15164]: User r.r from 106.13.148.75 not allowed because not listed in AllowUsers Feb 7 14:55:50 reporting1 sshd[15164]: Failed password for invalid user r.r from 106.13.148.75 port 40226 ssh2 Feb 7 14:55:55 reporting1 sshd[15221]: User r.r from 106.13.148.75 not allowed because not listed in AllowUsers Feb 7 14:55:55 reporting1 sshd[15221]: Failed password for invalid user r.r from 106.13.148.75 port 45814 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=106.13.148.75 |
2020-02-08 05:52:19 |
106.13.148.44 | attackspam | Unauthorized connection attempt detected from IP address 106.13.148.44 to port 2220 [J] |
2020-02-01 14:09:19 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.148.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.13.148.29. IN A
;; AUTHORITY SECTION:
. 274 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 00:47:33 CST 2022
;; MSG SIZE rcvd: 106
Host 29.148.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 29.148.13.106.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
218.92.0.158 | attack | Jul 28 20:38:28 nextcloud sshd\[18800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158 user=root Jul 28 20:38:29 nextcloud sshd\[18800\]: Failed password for root from 218.92.0.158 port 58723 ssh2 Jul 28 20:38:33 nextcloud sshd\[18800\]: Failed password for root from 218.92.0.158 port 58723 ssh2 |
2020-07-29 02:43:07 |
70.166.183.140 | attack | SSH/22 MH Probe, BF, Hack - |
2020-07-29 02:59:02 |
195.24.207.252 | attackbotsspam |
|
2020-07-29 02:41:57 |
195.223.211.242 | attackspambots | Jul 28 18:42:49 haigwepa sshd[27972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242 Jul 28 18:42:51 haigwepa sshd[27972]: Failed password for invalid user luowenwen from 195.223.211.242 port 42759 ssh2 ... |
2020-07-29 02:56:44 |
182.122.15.79 | attackspambots | Jul 28 19:33:13 *hidden* sshd[4857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.15.79 Jul 28 19:33:15 *hidden* sshd[4857]: Failed password for invalid user sounosuke from 182.122.15.79 port 46566 ssh2 Jul 28 19:59:24 *hidden* sshd[46931]: Invalid user haoshuting from 182.122.15.79 port 52502 |
2020-07-29 02:34:32 |
61.91.61.94 | attackspam | Unauthorized connection attempt from IP address 61.91.61.94 on Port 445(SMB) |
2020-07-29 03:10:59 |
111.229.101.155 | attack | 2020-07-28 08:12:26 server sshd[8646]: Failed password for invalid user fxz from 111.229.101.155 port 49158 ssh2 |
2020-07-29 02:36:10 |
104.138.210.96 | attackbots | Unauthorized connection attempt from IP address 104.138.210.96 on Port 445(SMB) |
2020-07-29 02:40:30 |
142.93.170.135 | attackbots | Jul 28 14:46:39 NPSTNNYC01T sshd[28102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135 Jul 28 14:46:40 NPSTNNYC01T sshd[28102]: Failed password for invalid user eddyhang from 142.93.170.135 port 50906 ssh2 Jul 28 14:51:18 NPSTNNYC01T sshd[28480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135 ... |
2020-07-29 02:51:45 |
156.96.154.12 | attackspambots | ET DROP Spamhaus DROP Listed Traffic Inbound group 12 - port: 443 proto: tcp cat: Misc Attackbytes: 60 |
2020-07-29 02:56:59 |
210.126.5.91 | attackbotsspam | Jul 28 20:36:18 pve1 sshd[8138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.126.5.91 Jul 28 20:36:20 pve1 sshd[8138]: Failed password for invalid user shangzengqiang from 210.126.5.91 port 54911 ssh2 ... |
2020-07-29 03:16:59 |
103.44.96.213 | attackspambots | Unauthorized connection attempt from IP address 103.44.96.213 on Port 445(SMB) |
2020-07-29 02:33:40 |
111.119.187.44 | attackbots | Unauthorized connection attempt from IP address 111.119.187.44 on Port 445(SMB) |
2020-07-29 02:40:48 |
220.231.127.3 | attackbotsspam | Unauthorized connection attempt from IP address 220.231.127.3 on Port 445(SMB) |
2020-07-29 02:54:17 |
137.74.132.171 | attackbots | Jul 28 20:09:59 santamaria sshd\[16733\]: Invalid user liqingxuan from 137.74.132.171 Jul 28 20:09:59 santamaria sshd\[16733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.132.171 Jul 28 20:10:02 santamaria sshd\[16733\]: Failed password for invalid user liqingxuan from 137.74.132.171 port 55838 ssh2 ... |
2020-07-29 02:59:55 |