Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Beijing Baidu Netcom Science and Technology Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Search Engine Spider

Comments:
Type Details Datetime
attackspam
Mar  5 00:36:28 pkdns2 sshd\[3108\]: Invalid user db2fenc1 from 106.13.173.141Mar  5 00:36:30 pkdns2 sshd\[3108\]: Failed password for invalid user db2fenc1 from 106.13.173.141 port 46392 ssh2Mar  5 00:42:47 pkdns2 sshd\[3364\]: Invalid user demo from 106.13.173.141Mar  5 00:42:49 pkdns2 sshd\[3364\]: Failed password for invalid user demo from 106.13.173.141 port 48072 ssh2Mar  5 00:45:54 pkdns2 sshd\[3515\]: Invalid user team3 from 106.13.173.141Mar  5 00:45:56 pkdns2 sshd\[3515\]: Failed password for invalid user team3 from 106.13.173.141 port 34810 ssh2
...
2020-03-05 07:28:16
attackbotsspam
Feb  9 17:33:02 legacy sshd[6781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
Feb  9 17:33:04 legacy sshd[6781]: Failed password for invalid user lnc from 106.13.173.141 port 49366 ssh2
Feb  9 17:36:45 legacy sshd[6890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
...
2020-02-10 04:59:18
attackbots
Jan 19 15:10:50 vtv3 sshd[30014]: Failed password for invalid user dokku from 106.13.173.141 port 40814 ssh2
Jan 19 15:13:51 vtv3 sshd[31185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141 
Jan 19 15:25:31 vtv3 sshd[4829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141 
Jan 19 15:25:33 vtv3 sshd[4829]: Failed password for invalid user bamboo from 106.13.173.141 port 54240 ssh2
Jan 19 15:28:39 vtv3 sshd[6054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141 
Jan 19 15:39:54 vtv3 sshd[11681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141 
Jan 19 15:39:56 vtv3 sshd[11681]: Failed password for invalid user admin from 106.13.173.141 port 39440 ssh2
Jan 19 15:42:37 vtv3 sshd[13200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141 
Jan 19 15
2020-01-20 00:23:38
attackbots
SSH bruteforce (Triggered fail2ban)
2019-12-24 19:54:29
attack
Oct 25 07:05:58 vtv3 sshd[22582]: Failed password for invalid user USA@2018 from 106.13.173.141 port 46688 ssh2
Oct 25 07:11:09 vtv3 sshd[25189]: Invalid user ntdx654321 from 106.13.173.141 port 55280
Oct 25 07:11:09 vtv3 sshd[25189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
Oct 25 07:21:36 vtv3 sshd[30283]: Invalid user 123456 from 106.13.173.141 port 44238
Oct 25 07:21:36 vtv3 sshd[30283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
Oct 25 07:21:38 vtv3 sshd[30283]: Failed password for invalid user 123456 from 106.13.173.141 port 44238 ssh2
Oct 25 07:26:49 vtv3 sshd[336]: Invalid user 123123 from 106.13.173.141 port 52868
Oct 25 07:26:49 vtv3 sshd[336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
Dec 23 14:15:25 vtv3 sshd[28356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
2019-12-24 01:14:51
attackspambots
Dec 19 15:25:57 sd-53420 sshd\[2229\]: Invalid user grouchy from 106.13.173.141
Dec 19 15:25:57 sd-53420 sshd\[2229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
Dec 19 15:25:58 sd-53420 sshd\[2229\]: Failed password for invalid user grouchy from 106.13.173.141 port 40420 ssh2
Dec 19 15:34:07 sd-53420 sshd\[5345\]: Invalid user hewer from 106.13.173.141
Dec 19 15:34:07 sd-53420 sshd\[5345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
...
2019-12-20 03:37:54
attackspambots
Dec 15 17:53:19 pornomens sshd\[9635\]: Invalid user nexus from 106.13.173.141 port 33894
Dec 15 17:53:19 pornomens sshd\[9635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
Dec 15 17:53:21 pornomens sshd\[9635\]: Failed password for invalid user nexus from 106.13.173.141 port 33894 ssh2
...
2019-12-16 02:08:19
attackbots
2019-12-11T08:13:50.112328abusebot-6.cloudsearch.cf sshd\[3525\]: Invalid user guest000 from 106.13.173.141 port 43196
2019-12-11 16:22:40
attack
Unauthorized SSH login attempts
2019-12-05 05:31:58
attack
Dec  2 21:28:37 MK-Soft-VM7 sshd[3344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141 
Dec  2 21:28:39 MK-Soft-VM7 sshd[3344]: Failed password for invalid user ftpuser from 106.13.173.141 port 59080 ssh2
...
2019-12-03 05:34:25
attackspambots
Nov 29 16:11:09 srv206 sshd[20841]: Invalid user server from 106.13.173.141
...
2019-11-30 01:58:53
attack
2019-11-12T15:15:40.987657abusebot-8.cloudsearch.cf sshd\[31681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141  user=daemon
2019-11-12 23:40:13
attack
Nov 11 07:17:23 vps666546 sshd\[2303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141  user=root
Nov 11 07:17:25 vps666546 sshd\[2303\]: Failed password for root from 106.13.173.141 port 48080 ssh2
Nov 11 07:22:21 vps666546 sshd\[2432\]: Invalid user lotte from 106.13.173.141 port 56166
Nov 11 07:22:21 vps666546 sshd\[2432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141
Nov 11 07:22:23 vps666546 sshd\[2432\]: Failed password for invalid user lotte from 106.13.173.141 port 56166 ssh2
...
2019-11-11 19:54:29
attackspam
Oct 21 01:26:28 svapp01 sshd[3897]: User r.r from 106.13.173.141 not allowed because not listed in AllowUsers
Oct 21 01:26:28 svapp01 sshd[3897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141  user=r.r
Oct 21 01:26:30 svapp01 sshd[3897]: Failed password for invalid user r.r from 106.13.173.141 port 45598 ssh2
Oct 21 01:26:31 svapp01 sshd[3897]: Received disconnect from 106.13.173.141: 11: Bye Bye [preauth]
Oct 21 01:37:29 svapp01 sshd[8464]: User r.r from 106.13.173.141 not allowed because not listed in AllowUsers
Oct 21 01:37:29 svapp01 sshd[8464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13.173.141
2019-10-25 16:43:06
attackspambots
Invalid user gil from 106.13.173.141 port 55410
2019-10-24 23:53:49
attackspam
5x Failed Password
2019-10-24 02:54:53
Comments on same subnet:
IP Type Details Datetime
106.13.173.137 attack
$f2bV_matches
2020-09-26 02:18:43
106.13.173.137 attack
2020-09-25T00:11:30.506764yoshi.linuxbox.ninja sshd[3422970]: Invalid user irene from 106.13.173.137 port 50112
2020-09-25T00:11:32.973136yoshi.linuxbox.ninja sshd[3422970]: Failed password for invalid user irene from 106.13.173.137 port 50112 ssh2
2020-09-25T00:15:43.000665yoshi.linuxbox.ninja sshd[3425871]: Invalid user upload from 106.13.173.137 port 44166
...
2020-09-25 18:01:53
106.13.173.137 attack
Sep 23 13:40:13 XXX sshd[38096]: Invalid user drcomadmin from 106.13.173.137 port 36570
2020-09-23 23:49:05
106.13.173.137 attack
Invalid user daniel from 106.13.173.137 port 54250
2020-09-23 15:59:32
106.13.173.137 attackspambots
Invalid user boss from 106.13.173.137 port 40320
2020-09-23 07:55:15
106.13.173.137 attackbotsspam
invalid login attempt (pramod)
2020-09-22 04:02:20
106.13.173.73 attackbots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-15 03:04:04
106.13.173.73 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-14 18:56:12
106.13.173.187 attack
Sep  8 07:14:14 root sshd[3855]: Failed password for root from 106.13.173.187 port 41222 ssh2
...
2020-09-09 02:15:54
106.13.173.187 attackbotsspam
Sep  8 07:14:14 root sshd[3855]: Failed password for root from 106.13.173.187 port 41222 ssh2
...
2020-09-08 17:45:26
106.13.173.137 attackbotsspam
Invalid user deploy from 106.13.173.137 port 50056
2020-08-30 12:25:01
106.13.173.73 attack
Repeated brute force against a port
2020-08-25 21:03:52
106.13.173.187 attackspam
Aug 24 15:16:32 buvik sshd[25680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.187
Aug 24 15:16:35 buvik sshd[25680]: Failed password for invalid user felipe from 106.13.173.187 port 49852 ssh2
Aug 24 15:23:53 buvik sshd[26563]: Invalid user tmp from 106.13.173.187
...
2020-08-25 03:46:45
106.13.173.137 attackspam
Aug 21 13:52:21 localhost sshd[2286567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.137  user=root
Aug 21 13:52:23 localhost sshd[2286567]: Failed password for root from 106.13.173.137 port 39694 ssh2
...
2020-08-21 17:45:28
106.13.173.137 attackspam
Aug 19 18:38:20 vps46666688 sshd[23212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.137
Aug 19 18:38:21 vps46666688 sshd[23212]: Failed password for invalid user xun from 106.13.173.137 port 48886 ssh2
...
2020-08-20 05:42:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.173.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50047
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.173.141.			IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102100 1800 900 604800 86400

;; Query time: 127 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 22 01:01:46 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 141.173.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.173.13.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.35.169.18 attackbots
1194/udp 11211/tcp 5683/tcp...
[2020-06-08/08-04]256pkt,63pt.(tcp),5pt.(udp)
2020-08-05 03:05:21
36.89.248.125 attackspambots
SSH auth scanning - multiple failed logins
2020-08-05 03:38:12
109.167.231.99 attack
2020-08-04T12:00:24.464997linuxbox-skyline sshd[72809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.231.99  user=root
2020-08-04T12:00:26.798456linuxbox-skyline sshd[72809]: Failed password for root from 109.167.231.99 port 27185 ssh2
...
2020-08-05 02:59:35
45.129.33.14 attackbots
Aug  4 20:58:11 debian-2gb-nbg1-2 kernel: \[18825956.066393\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.129.33.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=54081 PROTO=TCP SPT=59963 DPT=2701 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-05 03:04:53
167.114.98.229 attackspambots
Aug  4 19:23:29 Ubuntu-1404-trusty-64-minimal sshd\[24968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229  user=root
Aug  4 19:23:31 Ubuntu-1404-trusty-64-minimal sshd\[24968\]: Failed password for root from 167.114.98.229 port 39636 ssh2
Aug  4 19:57:15 Ubuntu-1404-trusty-64-minimal sshd\[14880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229  user=root
Aug  4 19:57:17 Ubuntu-1404-trusty-64-minimal sshd\[14880\]: Failed password for root from 167.114.98.229 port 41494 ssh2
Aug  4 20:00:14 Ubuntu-1404-trusty-64-minimal sshd\[18442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229  user=root
2020-08-05 03:18:22
117.33.128.218 attackbotsspam
Aug  4 20:46:40 h2779839 sshd[28277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.128.218  user=root
Aug  4 20:46:42 h2779839 sshd[28277]: Failed password for root from 117.33.128.218 port 36130 ssh2
Aug  4 20:48:20 h2779839 sshd[28329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.128.218  user=root
Aug  4 20:48:23 h2779839 sshd[28329]: Failed password for root from 117.33.128.218 port 57648 ssh2
Aug  4 20:49:59 h2779839 sshd[28360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.128.218  user=root
Aug  4 20:50:01 h2779839 sshd[28360]: Failed password for root from 117.33.128.218 port 50936 ssh2
Aug  4 20:51:37 h2779839 sshd[28378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.128.218  user=root
Aug  4 20:51:39 h2779839 sshd[28378]: Failed password for root from 117.33.128.218 port 44222 s
...
2020-08-05 03:14:12
222.219.183.190 attackspam
Auto Detect Rule!
proto TCP (SYN), 222.219.183.190:43057->gjan.info:1433, len 40
2020-08-05 03:08:13
202.149.85.226 attack
Failed password for root from 202.149.85.226 port 36428 ssh2
2020-08-05 03:22:38
112.85.42.200 attack
prod6
...
2020-08-05 03:04:10
92.118.189.181 attack
Port probing on unauthorized port 7001
2020-08-05 03:16:14
52.188.174.102 attack
Aug  4 20:47:10 ip40 sshd[31722]: Failed password for root from 52.188.174.102 port 53794 ssh2
...
2020-08-05 03:00:11
218.92.0.171 attack
Aug  4 20:13:58 vps1 sshd[29976]: Failed none for invalid user root from 218.92.0.171 port 9829 ssh2
Aug  4 20:13:58 vps1 sshd[29976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Aug  4 20:14:00 vps1 sshd[29976]: Failed password for invalid user root from 218.92.0.171 port 9829 ssh2
Aug  4 20:14:04 vps1 sshd[29976]: Failed password for invalid user root from 218.92.0.171 port 9829 ssh2
Aug  4 20:14:07 vps1 sshd[29976]: Failed password for invalid user root from 218.92.0.171 port 9829 ssh2
Aug  4 20:14:10 vps1 sshd[29976]: Failed password for invalid user root from 218.92.0.171 port 9829 ssh2
Aug  4 20:14:15 vps1 sshd[29976]: Failed password for invalid user root from 218.92.0.171 port 9829 ssh2
Aug  4 20:14:16 vps1 sshd[29976]: error: maximum authentication attempts exceeded for invalid user root from 218.92.0.171 port 9829 ssh2 [preauth]
...
2020-08-05 03:03:37
222.208.119.107 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 222.208.119.107:43716->gjan.info:1433, len 44
2020-08-05 03:13:20
60.167.176.217 attackbots
Aug  4 20:00:08 db sshd[22765]: User root from 60.167.176.217 not allowed because none of user's groups are listed in AllowGroups
...
2020-08-05 03:25:58
37.120.192.30 attackbotsspam
Aug  4 21:22:29 ns3042688 courier-imapd: LOGIN FAILED, user=info@tienda-sikla.es, ip=\[::ffff:37.120.192.30\]
...
2020-08-05 03:37:52

Recently Reported IPs

40.247.237.233 37.49.225.166 34.77.252.169 23.254.228.138
185.184.24.80 42.113.74.39 178.176.175.28 138.99.22.179
110.88.25.180 175.31.15.150 160.176.120.221 150.129.239.18
164.163.44.187 185.206.225.180 124.65.186.38 18.140.5.27
172.81.240.97 71.92.165.88 183.162.244.96 213.174.147.83