Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Beijing Baidu Netcom Science and Technology Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Search Engine Spider

Comments:
Type Details Datetime
attack
Oct 11 20:46:26 host1 sshd[1939991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
Oct 11 20:46:28 host1 sshd[1939991]: Failed password for root from 106.13.29.92 port 38310 ssh2
Oct 11 20:48:49 host1 sshd[1940182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
Oct 11 20:48:51 host1 sshd[1940182]: Failed password for root from 106.13.29.92 port 43866 ssh2
Oct 11 20:51:08 host1 sshd[1940329]: Invalid user patna from 106.13.29.92 port 49420
...
2020-10-12 02:55:56
attackspam
Oct 11 12:41:43 sip sshd[1900837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92 
Oct 11 12:41:43 sip sshd[1900837]: Invalid user silverline from 106.13.29.92 port 37980
Oct 11 12:41:44 sip sshd[1900837]: Failed password for invalid user silverline from 106.13.29.92 port 37980 ssh2
...
2020-10-11 18:47:43
attackspambots
Oct  8 15:26:02 server sshd[5488]: Failed password for root from 106.13.29.92 port 41186 ssh2
Oct  8 15:44:12 server sshd[15449]: Failed password for root from 106.13.29.92 port 40996 ssh2
Oct  8 15:48:03 server sshd[17361]: Failed password for root from 106.13.29.92 port 55728 ssh2
2020-10-08 22:11:47
attackbots
Oct  8 06:16:10 nas sshd[24454]: Failed password for root from 106.13.29.92 port 52612 ssh2
Oct  8 06:21:15 nas sshd[24583]: Failed password for root from 106.13.29.92 port 53776 ssh2
...
2020-10-08 14:05:41
attackbots
Sep 26 17:20:18 santamaria sshd\[8452\]: Invalid user kbe from 106.13.29.92
Sep 26 17:20:18 santamaria sshd\[8452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
Sep 26 17:20:20 santamaria sshd\[8452\]: Failed password for invalid user kbe from 106.13.29.92 port 39212 ssh2
...
2020-09-26 23:48:31
attack
(sshd) Failed SSH login from 106.13.29.92 (CN/China/-): 5 in the last 3600 secs
2020-09-26 15:39:49
attackbotsspam
Aug 28 19:31:23 h2829583 sshd[31484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
2020-08-29 04:00:17
attackbotsspam
Aug 25 21:49:02 ns382633 sshd\[1956\]: Invalid user student from 106.13.29.92 port 52190
Aug 25 21:49:02 ns382633 sshd\[1956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
Aug 25 21:49:04 ns382633 sshd\[1956\]: Failed password for invalid user student from 106.13.29.92 port 52190 ssh2
Aug 25 21:59:47 ns382633 sshd\[3592\]: Invalid user ubuntu from 106.13.29.92 port 41598
Aug 25 21:59:47 ns382633 sshd\[3592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
2020-08-26 07:07:16
attackbots
Aug 25 20:41:09 itv-usvr-02 sshd[31153]: Invalid user cyn from 106.13.29.92 port 58054
Aug 25 20:41:09 itv-usvr-02 sshd[31153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
Aug 25 20:41:09 itv-usvr-02 sshd[31153]: Invalid user cyn from 106.13.29.92 port 58054
Aug 25 20:41:11 itv-usvr-02 sshd[31153]: Failed password for invalid user cyn from 106.13.29.92 port 58054 ssh2
Aug 25 20:50:09 itv-usvr-02 sshd[31519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
Aug 25 20:50:10 itv-usvr-02 sshd[31519]: Failed password for root from 106.13.29.92 port 40918 ssh2
2020-08-25 22:44:53
attack
$f2bV_matches
2020-08-20 21:07:18
attackbotsspam
Aug 15 22:42:46 abendstille sshd\[21864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
Aug 15 22:42:49 abendstille sshd\[21864\]: Failed password for root from 106.13.29.92 port 60320 ssh2
Aug 15 22:44:52 abendstille sshd\[23719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
Aug 15 22:44:54 abendstille sshd\[23719\]: Failed password for root from 106.13.29.92 port 33326 ssh2
Aug 15 22:46:54 abendstille sshd\[25727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
...
2020-08-16 04:58:16
attackspambots
Aug  1 12:20:50 mout sshd[14126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
Aug  1 12:20:52 mout sshd[14126]: Failed password for root from 106.13.29.92 port 44218 ssh2
2020-08-01 18:26:23
attackbots
Invalid user MYUSER from 106.13.29.92 port 35020
2020-07-31 14:40:37
attackbotsspam
Invalid user MYUSER from 106.13.29.92 port 35020
2020-07-29 15:28:52
attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-07-18 13:18:50
attackspam
Jul 15 05:53:59 inter-technics sshd[7304]: Invalid user jojo from 106.13.29.92 port 54488
Jul 15 05:53:59 inter-technics sshd[7304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
Jul 15 05:53:59 inter-technics sshd[7304]: Invalid user jojo from 106.13.29.92 port 54488
Jul 15 05:54:00 inter-technics sshd[7304]: Failed password for invalid user jojo from 106.13.29.92 port 54488 ssh2
Jul 15 05:56:31 inter-technics sshd[7497]: Invalid user ftp from 106.13.29.92 port 34470
...
2020-07-15 14:37:12
attack
Jul 14 16:12:29 server sshd[16317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=web1
Jul 14 16:12:31 server sshd[16317]: Failed password for invalid user web1 from 106.13.29.92 port 58270 ssh2
Jul 14 16:25:31 server sshd[16894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
Jul 14 16:25:32 server sshd[16894]: Failed password for invalid user eunho from 106.13.29.92 port 38866 ssh2
2020-07-15 00:46:57
attack
frenzy
2020-06-28 16:30:26
attack
Jun 21 13:35:06 webhost01 sshd[11281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
Jun 21 13:35:08 webhost01 sshd[11281]: Failed password for invalid user sb from 106.13.29.92 port 44692 ssh2
...
2020-06-21 18:08:42
attack
SSH Brute-Force. Ports scanning.
2020-06-09 16:04:07
attackbotsspam
Jun  8 14:02:42 vps687878 sshd\[6346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
Jun  8 14:02:43 vps687878 sshd\[6346\]: Failed password for root from 106.13.29.92 port 60358 ssh2
Jun  8 14:05:56 vps687878 sshd\[6720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
Jun  8 14:05:57 vps687878 sshd\[6720\]: Failed password for root from 106.13.29.92 port 46808 ssh2
Jun  8 14:09:14 vps687878 sshd\[7026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
...
2020-06-08 20:24:28
attackspambots
May 28 14:23:49 plex sshd[15203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
May 28 14:23:52 plex sshd[15203]: Failed password for root from 106.13.29.92 port 34170 ssh2
2020-05-29 03:01:36
attackspambots
prod11
...
2020-05-21 16:00:44
attackspambots
Invalid user physics from 106.13.29.92 port 36370
2020-05-17 06:35:48
attackbotsspam
k+ssh-bruteforce
2020-05-17 03:51:01
attackspam
May  7 13:56:39 eventyay sshd[17964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
May  7 13:56:41 eventyay sshd[17964]: Failed password for invalid user spam from 106.13.29.92 port 43510 ssh2
May  7 14:00:43 eventyay sshd[18073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
...
2020-05-07 22:29:34
attack
Invalid user workflow from 106.13.29.92 port 42956
2020-05-01 15:13:00
attackspam
Apr 18 16:10:38 sip sshd[7455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92
Apr 18 16:10:40 sip sshd[7455]: Failed password for invalid user test from 106.13.29.92 port 46768 ssh2
Apr 18 16:23:45 sip sshd[12278]: Failed password for root from 106.13.29.92 port 44146 ssh2
2020-04-19 00:45:28
Comments on same subnet:
IP Type Details Datetime
106.13.29.200 attack
Jul  6 16:12:11 server1 sshd\[19831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200  user=root
Jul  6 16:12:13 server1 sshd\[19831\]: Failed password for root from 106.13.29.200 port 38714 ssh2
Jul  6 16:15:38 server1 sshd\[20842\]: Invalid user jts3 from 106.13.29.200
Jul  6 16:15:39 server1 sshd\[20842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200 
Jul  6 16:15:41 server1 sshd\[20842\]: Failed password for invalid user jts3 from 106.13.29.200 port 53040 ssh2
...
2020-07-07 06:33:28
106.13.29.200 attackbots
2020-07-04T01:13:23.403092shield sshd\[11132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200  user=root
2020-07-04T01:13:25.313404shield sshd\[11132\]: Failed password for root from 106.13.29.200 port 52844 ssh2
2020-07-04T01:15:44.223330shield sshd\[11538\]: Invalid user sambaup from 106.13.29.200 port 57594
2020-07-04T01:15:44.227009shield sshd\[11538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200
2020-07-04T01:15:45.826369shield sshd\[11538\]: Failed password for invalid user sambaup from 106.13.29.200 port 57594 ssh2
2020-07-04 13:56:53
106.13.29.5 attack
2020-06-27T06:48:11.902079MailD postfix/smtpd[21385]: warning: unknown[106.13.29.5]: SASL LOGIN authentication failed: authentication failure
2020-06-27T06:48:14.586337MailD postfix/smtpd[21343]: warning: unknown[106.13.29.5]: SASL LOGIN authentication failed: authentication failure
2020-06-27T06:48:16.531646MailD postfix/smtpd[21385]: warning: unknown[106.13.29.5]: SASL LOGIN authentication failed: authentication failure
2020-06-27 13:36:19
106.13.29.200 attackbotsspam
2020-06-16T15:09:38.964897homeassistant sshd[5548]: Invalid user aman from 106.13.29.200 port 58472
2020-06-16T15:09:38.971789homeassistant sshd[5548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200
...
2020-06-16 23:30:23
106.13.29.200 attackspambots
(sshd) Failed SSH login from 106.13.29.200 (CN/China/-): 5 in the last 3600 secs
2020-06-03 17:16:35
106.13.29.200 attackspam
May 31 11:32:53 h2646465 sshd[660]: Invalid user wei from 106.13.29.200
May 31 11:32:53 h2646465 sshd[660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200
May 31 11:32:53 h2646465 sshd[660]: Invalid user wei from 106.13.29.200
May 31 11:32:55 h2646465 sshd[660]: Failed password for invalid user wei from 106.13.29.200 port 42856 ssh2
May 31 11:49:01 h2646465 sshd[1738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200  user=root
May 31 11:49:03 h2646465 sshd[1738]: Failed password for root from 106.13.29.200 port 35408 ssh2
May 31 11:51:59 h2646465 sshd[1984]: Invalid user admin from 106.13.29.200
May 31 11:51:59 h2646465 sshd[1984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200
May 31 11:51:59 h2646465 sshd[1984]: Invalid user admin from 106.13.29.200
May 31 11:52:01 h2646465 sshd[1984]: Failed password for invalid user admin from 106.13.29.200 por
2020-05-31 18:22:17
106.13.29.29 attack
Invalid user mohai from 106.13.29.29 port 45886
2020-05-31 06:13:52
106.13.29.29 attackbotsspam
5x Failed Password
2020-05-27 16:54:48
106.13.29.200 attackbots
May 21 22:59:29 haigwepa sshd[16688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.200 
May 21 22:59:31 haigwepa sshd[16688]: Failed password for invalid user ihg from 106.13.29.200 port 58792 ssh2
...
2020-05-22 05:14:14
106.13.29.29 attackspambots
May  7 19:42:53 legacy sshd[28882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.29
May  7 19:42:55 legacy sshd[28882]: Failed password for invalid user postgres from 106.13.29.29 port 36770 ssh2
May  7 19:46:57 legacy sshd[29120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.29
...
2020-05-08 05:32:10
106.13.29.200 attackbots
Invalid user guido from 106.13.29.200 port 42502
2020-05-01 13:49:11
106.13.29.200 attack
Invalid user nw from 106.13.29.200 port 34914
2020-04-25 16:25:44
106.13.29.29 attackbotsspam
Apr 21 08:06:46 124388 sshd[24209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.29
Apr 21 08:06:46 124388 sshd[24209]: Invalid user zs from 106.13.29.29 port 53926
Apr 21 08:06:48 124388 sshd[24209]: Failed password for invalid user zs from 106.13.29.29 port 53926 ssh2
Apr 21 08:09:37 124388 sshd[24410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.29  user=root
Apr 21 08:09:38 124388 sshd[24410]: Failed password for root from 106.13.29.29 port 58352 ssh2
2020-04-21 18:37:33
106.13.29.29 attackbots
5x Failed Password
2020-04-18 07:29:39
106.13.29.223 attack
suspicious action Wed, 11 Mar 2020 16:18:17 -0300
2020-03-12 04:24:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.29.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.29.92.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041701 1800 900 604800 86400

;; Query time: 142 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 20:29:40 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 92.29.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 92.29.13.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.38.185.121 attackbotsspam
Automatic report - Banned IP Access
2019-11-27 19:57:18
167.114.118.135 attackbots
Automatic report - XMLRPC Attack
2019-11-27 19:37:54
109.70.100.20 attack
Unauthorized access detected from banned ip
2019-11-27 19:35:53
216.155.89.36 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-27 19:56:45
178.79.148.188 attackspambots
Honeypot attack, port: 7, PTR: min-extra-scan-101-uk-prod.binaryedge.ninja.
2019-11-27 19:41:18
131.100.63.100 attackbots
$f2bV_matches
2019-11-27 20:05:52
40.73.76.102 attackbots
2019-11-27T11:46:45.928920abusebot-7.cloudsearch.cf sshd\[27755\]: Invalid user fascilla from 40.73.76.102 port 39052
2019-11-27 20:07:01
210.51.161.210 attackspambots
Invalid user server from 210.51.161.210 port 55560
2019-11-27 19:45:41
31.210.74.165 attackbotsspam
Honeypot attack, port: 445, PTR: server-31.210.74.165.as42926.net.
2019-11-27 20:01:30
222.186.180.147 attackspam
Nov 27 12:51:36 jane sshd[30890]: Failed password for root from 222.186.180.147 port 40840 ssh2
Nov 27 12:51:40 jane sshd[30890]: Failed password for root from 222.186.180.147 port 40840 ssh2
...
2019-11-27 19:52:56
110.74.147.160 attackspam
11/27/2019-08:42:08.158822 110.74.147.160 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-27 19:38:48
150.95.212.72 attack
<6 unauthorized SSH connections
2019-11-27 19:33:30
45.55.243.124 attack
2019-11-27T08:45:12.905018shield sshd\[12138\]: Invalid user tha from 45.55.243.124 port 49098
2019-11-27T08:45:12.909172shield sshd\[12138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.243.124
2019-11-27T08:45:14.732484shield sshd\[12138\]: Failed password for invalid user tha from 45.55.243.124 port 49098 ssh2
2019-11-27T08:51:27.301752shield sshd\[13354\]: Invalid user mysql from 45.55.243.124 port 58814
2019-11-27T08:51:27.305958shield sshd\[13354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.243.124
2019-11-27 20:12:08
113.62.176.98 attack
(sshd) Failed SSH login from 113.62.176.98 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 27 01:23:48 host sshd[20183]: Invalid user csssuser from 113.62.176.98 port 54339
2019-11-27 19:35:32
217.61.17.7 attack
Nov 27 12:09:20 ns381471 sshd[7826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.17.7
Nov 27 12:09:22 ns381471 sshd[7826]: Failed password for invalid user encipher from 217.61.17.7 port 57526 ssh2
2019-11-27 20:06:12

Recently Reported IPs

72.249.226.29 190.8.149.149 249.59.163.62 124.46.189.8
221.229.196.242 66.249.79.228 45.134.145.127 122.51.80.104
173.82.212.72 200.98.175.43 86.99.4.38 185.174.103.25
178.62.41.40 198.54.124.124 182.61.105.189 159.89.114.202
250.126.61.94 95.69.0.189 204.77.11.130 188.191.4.158