Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Beijing Baidu Netcom Science and Technology Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Search Engine Spider

Comments:
Type Details Datetime
attack
Jun 25 19:55:34 dedicated sshd[30401]: Invalid user admin from 106.13.54.212 port 43270
2019-06-26 08:18:45
Comments on same subnet:
IP Type Details Datetime
106.13.54.106 attack
2020-08-18T12:45:29.015263shield sshd\[5368\]: Invalid user follow from 106.13.54.106 port 14074
2020-08-18T12:45:29.023511shield sshd\[5368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106
2020-08-18T12:45:31.747295shield sshd\[5368\]: Failed password for invalid user follow from 106.13.54.106 port 14074 ssh2
2020-08-18T12:50:24.403993shield sshd\[5682\]: Invalid user liulei from 106.13.54.106 port 4219
2020-08-18T12:50:24.412473shield sshd\[5682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106
2020-08-18 21:26:09
106.13.54.106 attackspam
Fail2Ban
2020-08-06 12:06:30
106.13.54.106 attackbots
2020-07-27T09:54:38.5412001495-001 sshd[13380]: Invalid user laura from 106.13.54.106 port 33909
2020-07-27T09:54:41.1277461495-001 sshd[13380]: Failed password for invalid user laura from 106.13.54.106 port 33909 ssh2
2020-07-27T09:59:34.2743471495-001 sshd[13590]: Invalid user jupyter from 106.13.54.106 port 21318
2020-07-27T09:59:34.2776321495-001 sshd[13590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106
2020-07-27T09:59:34.2743471495-001 sshd[13590]: Invalid user jupyter from 106.13.54.106 port 21318
2020-07-27T09:59:36.8219611495-001 sshd[13590]: Failed password for invalid user jupyter from 106.13.54.106 port 21318 ssh2
...
2020-07-27 23:03:30
106.13.54.106 attack
Invalid user linus from 106.13.54.106 port 56470
2020-07-18 20:51:32
106.13.54.106 attack
Jul  3 22:02:58 vmd17057 sshd[25933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106 
Jul  3 22:03:00 vmd17057 sshd[25933]: Failed password for invalid user ftpuser from 106.13.54.106 port 24611 ssh2
...
2020-07-04 04:55:44
106.13.54.106 attackbots
Jun 30 23:54:57 mail sshd[3997]: Failed password for invalid user phoebe from 106.13.54.106 port 37375 ssh2
...
2020-07-02 06:14:58
106.13.54.106 attackspambots
Invalid user dinesh from 106.13.54.106 port 2614
2020-06-25 13:34:17
106.13.54.106 attackspambots
Jun 11 15:27:56 lnxmysql61 sshd[11154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106
2020-06-12 00:43:34
106.13.54.106 attack
Invalid user rms from 106.13.54.106 port 51312
2020-05-14 18:36:45
106.13.54.106 attackspambots
May  4 20:23:12 host sshd[15965]: Invalid user yoshi from 106.13.54.106 port 35635
...
2020-05-05 03:26:44
106.13.54.106 attack
May  3 08:00:56 PorscheCustomer sshd[32528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106
May  3 08:00:59 PorscheCustomer sshd[32528]: Failed password for invalid user gpr from 106.13.54.106 port 1456 ssh2
May  3 08:10:15 PorscheCustomer sshd[426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106
...
2020-05-03 15:39:03
106.13.54.106 attack
Port probing on unauthorized port 20761
2020-04-20 12:32:57
106.13.54.106 attackspam
$f2bV_matches
2020-04-12 17:13:11
106.13.54.106 attackspambots
Apr  3 22:53:01 host01 sshd[10493]: Failed password for root from 106.13.54.106 port 24213 ssh2
Apr  3 22:55:18 host01 sshd[10922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106 
Apr  3 22:55:20 host01 sshd[10922]: Failed password for invalid user user from 106.13.54.106 port 63033 ssh2
...
2020-04-04 04:56:25
106.13.54.106 attackbotsspam
Mar 28 13:37:50 minden010 sshd[17455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106
Mar 28 13:37:52 minden010 sshd[17455]: Failed password for invalid user egf from 106.13.54.106 port 62171 ssh2
Mar 28 13:41:31 minden010 sshd[19927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106
...
2020-03-29 01:09:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.54.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57568
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.54.212.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062502 1800 900 604800 86400

;; Query time: 147 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 26 08:18:39 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 212.54.13.106.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 212.54.13.106.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.147 attackbots
2019-12-29T23:44:40.289351+00:00 suse sshd[24433]: User root from 222.186.180.147 not allowed because not listed in AllowUsers
2019-12-29T23:44:43.016144+00:00 suse sshd[24433]: error: PAM: Authentication failure for illegal user root from 222.186.180.147
2019-12-29T23:44:40.289351+00:00 suse sshd[24433]: User root from 222.186.180.147 not allowed because not listed in AllowUsers
2019-12-29T23:44:43.016144+00:00 suse sshd[24433]: error: PAM: Authentication failure for illegal user root from 222.186.180.147
2019-12-29T23:44:40.289351+00:00 suse sshd[24433]: User root from 222.186.180.147 not allowed because not listed in AllowUsers
2019-12-29T23:44:43.016144+00:00 suse sshd[24433]: error: PAM: Authentication failure for illegal user root from 222.186.180.147
2019-12-29T23:44:43.018380+00:00 suse sshd[24433]: Failed keyboard-interactive/pam for invalid user root from 222.186.180.147 port 65186 ssh2
...
2019-12-30 07:48:08
185.176.27.190 attack
12/29/2019-18:03:06.912143 185.176.27.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-30 08:17:57
113.193.201.178 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-12-30 08:05:51
221.8.52.21 attack
Port scan: Attack repeated for 24 hours
2019-12-30 07:50:41
200.105.183.118 attack
Repeated brute force against a port
2019-12-30 08:07:23
125.105.145.132 attackbotsspam
Unauthorized connection attempt detected from IP address 125.105.145.132 to port 23
2019-12-30 08:19:28
88.214.26.19 attackbots
191229 17:51:35 [Warning] Access denied for user 'admin'@'88.214.26.19' (using password: YES)
191229 17:51:38 [Warning] Access denied for user 'admin'@'88.214.26.19' (using password: YES)
191229 17:51:42 [Warning] Access denied for user 'admin'@'88.214.26.19' (using password: YES)
...
2019-12-30 08:00:23
80.211.29.172 attackspambots
Dec 30 00:30:13 debian-2gb-nbg1-2 kernel: \[1314922.708754\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.211.29.172 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x00 TTL=240 ID=54321 PROTO=TCP SPT=46777 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0
2019-12-30 08:13:23
222.186.180.41 attackbots
2019-12-30T00:48:08.346363  sshd[19326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2019-12-30T00:48:10.481340  sshd[19326]: Failed password for root from 222.186.180.41 port 16202 ssh2
2019-12-30T00:48:14.755823  sshd[19326]: Failed password for root from 222.186.180.41 port 16202 ssh2
2019-12-30T00:48:08.346363  sshd[19326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2019-12-30T00:48:10.481340  sshd[19326]: Failed password for root from 222.186.180.41 port 16202 ssh2
2019-12-30T00:48:14.755823  sshd[19326]: Failed password for root from 222.186.180.41 port 16202 ssh2
2019-12-30T00:48:25.819282  sshd[19336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2019-12-30T00:48:27.954383  sshd[19336]: Failed password for root from 222.186.180.41 port 22722 ssh2
...
2019-12-30 07:56:46
185.220.101.0 attackspambots
Automatic report - Banned IP Access
2019-12-30 08:07:39
106.13.134.161 attackspam
Dec 30 00:37:35 mout sshd[29529]: Invalid user dohse from 106.13.134.161 port 57672
2019-12-30 07:55:49
210.245.51.23 attackspambots
Unauthorized access detected from banned ip
2019-12-30 07:46:56
191.101.251.113 attackbots
Dec 30 00:00:00 zeus sshd[5774]: Failed password for root from 191.101.251.113 port 37586 ssh2
Dec 30 00:02:41 zeus sshd[5885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.101.251.113 
Dec 30 00:02:43 zeus sshd[5885]: Failed password for invalid user server from 191.101.251.113 port 38868 ssh2
2019-12-30 08:19:05
88.214.26.39 attackbots
191229 17:51:36 [Warning] Access denied for user 'admin'@'88.214.26.39' (using password: YES)
191229 17:51:40 [Warning] Access denied for user 'admin'@'88.214.26.39' (using password: YES)
191229 17:51:43 [Warning] Access denied for user 'admin'@'88.214.26.39' (using password: YES)
...
2019-12-30 07:58:24
34.76.110.50 attackbots
Wordpress login scanning
2019-12-30 07:59:56

Recently Reported IPs

36.78.200.124 117.190.77.25 20.52.134.52 122.176.70.149
1.47.103.223 181.174.49.130 201.161.2.66 85.214.46.142
46.177.6.150 85.132.4.134 82.77.150.208 5.202.177.13
115.74.216.117 182.112.208.203 78.132.224.225 119.236.86.149
2403:6200:8871:e91:fcaa:9dc3:159b:b2fb 46.39.53.178 191.53.57.211 178.139.86.157