Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.13.34.131 attackbots
Oct 12 20:57:55 rotator sshd\[28581\]: Invalid user vandusen from 106.13.34.131Oct 12 20:57:58 rotator sshd\[28581\]: Failed password for invalid user vandusen from 106.13.34.131 port 48250 ssh2Oct 12 21:01:17 rotator sshd\[29358\]: Failed password for root from 106.13.34.131 port 46053 ssh2Oct 12 21:04:26 rotator sshd\[29392\]: Invalid user ruben from 106.13.34.131Oct 12 21:04:28 rotator sshd\[29392\]: Failed password for invalid user ruben from 106.13.34.131 port 43838 ssh2Oct 12 21:07:38 rotator sshd\[30154\]: Invalid user leonel from 106.13.34.131
...
2020-10-13 04:24:39
106.13.34.131 attack
2020-10-11T17:52:37.6312981495-001 sshd[27285]: Failed password for invalid user asterisk from 106.13.34.131 port 48463 ssh2
2020-10-11T17:56:00.4540001495-001 sshd[27439]: Invalid user rivera from 106.13.34.131 port 48468
2020-10-11T17:56:00.4601891495-001 sshd[27439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131
2020-10-11T17:56:00.4540001495-001 sshd[27439]: Invalid user rivera from 106.13.34.131 port 48468
2020-10-11T17:56:02.0510661495-001 sshd[27439]: Failed password for invalid user rivera from 106.13.34.131 port 48468 ssh2
2020-10-11T17:59:21.3332791495-001 sshd[27650]: Invalid user baerbel from 106.13.34.131 port 48481
...
2020-10-12 20:03:30
106.13.34.131 attack
Oct 10 20:15:12 ns382633 sshd\[4581\]: Invalid user web74 from 106.13.34.131 port 17944
Oct 10 20:15:12 ns382633 sshd\[4581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131
Oct 10 20:15:14 ns382633 sshd\[4581\]: Failed password for invalid user web74 from 106.13.34.131 port 17944 ssh2
Oct 10 20:30:44 ns382633 sshd\[8618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
Oct 10 20:30:47 ns382633 sshd\[8618\]: Failed password for root from 106.13.34.131 port 55812 ssh2
2020-10-11 03:50:44
106.13.34.131 attackbots
3x Failed Password
2020-10-10 19:44:57
106.13.34.173 attackspambots
SSH login attempts.
2020-10-10 14:34:16
106.13.34.173 attackbots
Oct  9 04:56:40 Tower sshd[15139]: Connection from 106.13.34.173 port 45186 on 192.168.10.220 port 22 rdomain ""
Oct  9 04:56:43 Tower sshd[15139]: Invalid user cron from 106.13.34.173 port 45186
Oct  9 04:56:43 Tower sshd[15139]: error: Could not get shadow information for NOUSER
Oct  9 04:56:43 Tower sshd[15139]: Failed password for invalid user cron from 106.13.34.173 port 45186 ssh2
Oct  9 04:56:43 Tower sshd[15139]: Received disconnect from 106.13.34.173 port 45186:11: Bye Bye [preauth]
Oct  9 04:56:43 Tower sshd[15139]: Disconnected from invalid user cron 106.13.34.173 port 45186 [preauth]
2020-10-10 02:04:48
106.13.34.173 attack
Oct  9 04:56:40 Tower sshd[15139]: Connection from 106.13.34.173 port 45186 on 192.168.10.220 port 22 rdomain ""
Oct  9 04:56:43 Tower sshd[15139]: Invalid user cron from 106.13.34.173 port 45186
Oct  9 04:56:43 Tower sshd[15139]: error: Could not get shadow information for NOUSER
Oct  9 04:56:43 Tower sshd[15139]: Failed password for invalid user cron from 106.13.34.173 port 45186 ssh2
Oct  9 04:56:43 Tower sshd[15139]: Received disconnect from 106.13.34.173 port 45186:11: Bye Bye [preauth]
Oct  9 04:56:43 Tower sshd[15139]: Disconnected from invalid user cron 106.13.34.173 port 45186 [preauth]
2020-10-09 17:49:29
106.13.34.131 attack
2020-10-07T20:23:58.357847abusebot-4.cloudsearch.cf sshd[30782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
2020-10-07T20:24:00.347950abusebot-4.cloudsearch.cf sshd[30782]: Failed password for root from 106.13.34.131 port 62319 ssh2
2020-10-07T20:27:00.332360abusebot-4.cloudsearch.cf sshd[30809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
2020-10-07T20:27:01.971592abusebot-4.cloudsearch.cf sshd[30809]: Failed password for root from 106.13.34.131 port 54788 ssh2
2020-10-07T20:29:48.407884abusebot-4.cloudsearch.cf sshd[30835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
2020-10-07T20:29:50.112170abusebot-4.cloudsearch.cf sshd[30835]: Failed password for root from 106.13.34.131 port 47229 ssh2
2020-10-07T20:32:43.941852abusebot-4.cloudsearch.cf sshd[30900]: pam_unix(sshd:auth): authe
...
2020-10-08 04:59:59
106.13.34.131 attackbots
repeated SSH login attempts
2020-10-07 21:22:50
106.13.34.131 attackbots
Oct  7 02:43:43 santamaria sshd\[24826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
Oct  7 02:43:45 santamaria sshd\[24826\]: Failed password for root from 106.13.34.131 port 36518 ssh2
Oct  7 02:47:37 santamaria sshd\[24874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
...
2020-10-07 13:09:54
106.13.34.131 attack
(sshd) Failed SSH login from 106.13.34.131 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 02:33:49 optimus sshd[17333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
Oct  1 02:33:51 optimus sshd[17333]: Failed password for root from 106.13.34.131 port 65357 ssh2
Oct  1 02:40:06 optimus sshd[19422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
Oct  1 02:40:08 optimus sshd[19422]: Failed password for root from 106.13.34.131 port 13541 ssh2
Oct  1 02:43:28 optimus sshd[20656]: Invalid user 1 from 106.13.34.131
2020-10-01 18:14:40
106.13.34.131 attackbotsspam
$f2bV_matches
2020-09-26 06:46:54
106.13.34.131 attackspambots
2020-09-25T14:46:11.684573server.espacesoutien.com sshd[9097]: Invalid user liuhao from 106.13.34.131 port 51051
2020-09-25T14:46:11.697808server.espacesoutien.com sshd[9097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131
2020-09-25T14:46:11.684573server.espacesoutien.com sshd[9097]: Invalid user liuhao from 106.13.34.131 port 51051
2020-09-25T14:46:13.466145server.espacesoutien.com sshd[9097]: Failed password for invalid user liuhao from 106.13.34.131 port 51051 ssh2
...
2020-09-25 23:51:43
106.13.34.131 attackspam
Sep 25 09:02:15 rancher-0 sshd[282693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
Sep 25 09:02:17 rancher-0 sshd[282693]: Failed password for root from 106.13.34.131 port 55863 ssh2
...
2020-09-25 15:28:09
106.13.34.173 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-09-07 15:02:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.34.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.13.34.70.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:39:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 70.34.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.34.13.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
69.119.140.197 attackspambots
Honeypot attack, port: 81, PTR: ool-45778cc5.dyn.optonline.net.
2020-03-03 16:00:31
170.254.145.66 attack
SpamScore above: 10.0
2020-03-03 16:03:13
181.22.185.105 attackbots
Mar  3 05:56:23 grey postfix/smtpd\[3576\]: NOQUEUE: reject: RCPT from unknown\[181.22.185.105\]: 554 5.7.1 Service unavailable\; Client host \[181.22.185.105\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?181.22.185.105\; from=\ to=\ proto=ESMTP helo=\<181-22-185-105.speedy.com.ar\>
...
2020-03-03 15:32:04
101.36.150.59 attackspam
Mar  3 06:59:34 server sshd[727330]: Failed password for invalid user ubuntu from 101.36.150.59 port 33886 ssh2
Mar  3 07:08:23 server sshd[729464]: Failed password for invalid user dani from 101.36.150.59 port 56098 ssh2
Mar  3 07:17:50 server sshd[732242]: Failed password for invalid user test from 101.36.150.59 port 50094 ssh2
2020-03-03 15:26:31
115.79.141.40 attackbotsspam
Port probing on unauthorized port 23
2020-03-03 15:32:25
120.25.223.0 attack
firewall-block, port(s): 1433/tcp
2020-03-03 15:48:05
78.189.104.219 attackbotsspam
Automatic report - Port Scan Attack
2020-03-03 15:39:28
118.70.133.226 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 16:02:05
222.186.190.92 attackbots
2020-03-03T08:44:27.869125scmdmz1 sshd[9260]: Failed password for root from 222.186.190.92 port 47316 ssh2
2020-03-03T08:44:30.679254scmdmz1 sshd[9260]: Failed password for root from 222.186.190.92 port 47316 ssh2
2020-03-03T08:44:34.096724scmdmz1 sshd[9260]: Failed password for root from 222.186.190.92 port 47316 ssh2
...
2020-03-03 15:45:55
103.232.242.158 attack
Honeypot attack, port: 445, PTR: ip-arana.net.id.as63497.
2020-03-03 15:35:26
114.118.97.195 attackspambots
leo_www
2020-03-03 15:49:19
49.48.223.174 attackbots
Honeypot attack, port: 445, PTR: mx-ll-49.48.223-174.dynamic.3bb.in.th.
2020-03-03 15:53:39
103.120.188.114 attackspambots
Honeypot attack, port: 445, PTR: node-103-120-188-114.netstra.net.
2020-03-03 15:32:46
222.186.173.183 attack
Mar  3 08:27:18 dedicated sshd[13347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Mar  3 08:27:20 dedicated sshd[13347]: Failed password for root from 222.186.173.183 port 65504 ssh2
2020-03-03 15:38:59
223.16.203.201 attack
Honeypot attack, port: 5555, PTR: 201-203-16-223-on-nets.com.
2020-03-03 16:04:41

Recently Reported IPs

95.170.118.9 114.108.3.63 61.72.173.135 185.20.90.50
213.212.217.27 201.130.106.108 183.215.90.28 61.242.213.138
60.162.17.112 50.47.136.144 177.106.149.14 181.225.99.101
31.19.208.79 115.53.132.173 197.49.197.219 90.107.222.29
159.223.53.244 59.96.241.100 112.94.252.170 184.83.240.73