Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Beijing Baidu Netcom Science and Technology Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Search Engine Spider

Comments:
Type Details Datetime
attackspam
Mar 17 17:12:18 ks10 sshd[2736751]: Failed password for root from 106.13.72.83 port 39532 ssh2
...
2020-03-18 00:37:52
attackbots
Feb 13 07:20:51 silence02 sshd[25405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.83
Feb 13 07:20:53 silence02 sshd[25405]: Failed password for invalid user csgo from 106.13.72.83 port 46936 ssh2
Feb 13 07:25:28 silence02 sshd[25793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.83
2020-02-13 14:50:44
attackspam
Unauthorized connection attempt detected from IP address 106.13.72.83 to port 2220 [J]
2020-01-23 20:17:00
attack
Dec 23 19:23:20 plusreed sshd[15194]: Invalid user password124 from 106.13.72.83
...
2019-12-24 08:37:42
attack
Dec  6 16:59:33 eventyay sshd[19374]: Failed password for backup from 106.13.72.83 port 37258 ssh2
Dec  6 17:07:56 eventyay sshd[19651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.83
Dec  6 17:07:58 eventyay sshd[19651]: Failed password for invalid user bokukks from 106.13.72.83 port 36400 ssh2
...
2019-12-07 00:12:59
attackbots
Dec  4 09:01:21 vps647732 sshd[13367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.83
Dec  4 09:01:23 vps647732 sshd[13367]: Failed password for invalid user carolina from 106.13.72.83 port 42776 ssh2
...
2019-12-04 16:15:50
attackbotsspam
Lines containing failures of 106.13.72.83 (max 1000)
Dec  2 08:27:51 localhost sshd[30535]: Invalid user operateur from 106.13.72.83 port 54682
Dec  2 08:27:51 localhost sshd[30535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.83 
Dec  2 08:27:53 localhost sshd[30535]: Failed password for invalid user operateur from 106.13.72.83 port 54682 ssh2
Dec  2 08:27:54 localhost sshd[30535]: Received disconnect from 106.13.72.83 port 54682:11: Bye Bye [preauth]
Dec  2 08:27:54 localhost sshd[30535]: Disconnected from invalid user operateur 106.13.72.83 port 54682 [preauth]
Dec  2 08:45:27 localhost sshd[10049]: User r.r from 106.13.72.83 not allowed because listed in DenyUsers
Dec  2 08:45:27 localhost sshd[10049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.83  user=r.r
Dec  2 08:45:29 localhost sshd[10049]: Failed password for invalid user r.r from 106.13.72.83 port 43308........
------------------------------
2019-12-02 23:24:15
attack
Dec  2 13:38:46 sauna sshd[187651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.83
Dec  2 13:38:48 sauna sshd[187651]: Failed password for invalid user anchia from 106.13.72.83 port 42130 ssh2
...
2019-12-02 19:52:31
Comments on same subnet:
IP Type Details Datetime
106.13.72.112 attackspam
Aug 26 12:33:27 ns3033917 sshd[25725]: Failed password for root from 106.13.72.112 port 57104 ssh2
Aug 26 12:35:46 ns3033917 sshd[25746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.112  user=root
Aug 26 12:35:48 ns3033917 sshd[25746]: Failed password for root from 106.13.72.112 port 54038 ssh2
...
2020-08-26 23:03:34
106.13.72.112 attack
fail2ban
2020-08-08 18:19:18
106.13.72.190 attackspambots
Scanned 3 times in the last 24 hours on port 22
2020-07-08 08:10:59
106.13.72.190 attackspam
Failed password for invalid user openlava from 106.13.72.190 port 39160 ssh2
2020-07-06 18:48:04
106.13.72.190 attack
(sshd) Failed SSH login from 106.13.72.190 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 26 13:56:20 srv sshd[24719]: Invalid user gitlab from 106.13.72.190 port 34108
Jun 26 13:56:22 srv sshd[24719]: Failed password for invalid user gitlab from 106.13.72.190 port 34108 ssh2
Jun 26 14:20:09 srv sshd[25186]: Invalid user hyperic from 106.13.72.190 port 51832
Jun 26 14:20:12 srv sshd[25186]: Failed password for invalid user hyperic from 106.13.72.190 port 51832 ssh2
Jun 26 14:23:54 srv sshd[25236]: Invalid user julio from 106.13.72.190 port 40778
2020-06-27 02:12:22
106.13.72.190 attackbots
Fail2Ban
2020-06-12 08:10:31
106.13.72.190 attackspambots
(sshd) Failed SSH login from 106.13.72.190 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  7 00:02:55 s1 sshd[25328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190  user=root
Jun  7 00:02:57 s1 sshd[25328]: Failed password for root from 106.13.72.190 port 51924 ssh2
Jun  7 00:06:56 s1 sshd[25563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190  user=root
Jun  7 00:06:59 s1 sshd[25563]: Failed password for root from 106.13.72.190 port 48462 ssh2
Jun  7 00:10:49 s1 sshd[25854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190  user=root
2020-06-07 07:29:16
106.13.72.190 attackspambots
[ssh] SSH attack
2020-04-26 21:00:01
106.13.72.190 attackbots
Apr 17 19:19:17 vlre-nyc-1 sshd\[29385\]: Invalid user mi from 106.13.72.190
Apr 17 19:19:17 vlre-nyc-1 sshd\[29385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190
Apr 17 19:19:19 vlre-nyc-1 sshd\[29385\]: Failed password for invalid user mi from 106.13.72.190 port 38704 ssh2
Apr 17 19:23:29 vlre-nyc-1 sshd\[29504\]: Invalid user dspace from 106.13.72.190
Apr 17 19:23:29 vlre-nyc-1 sshd\[29504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190
...
2020-04-18 04:15:15
106.13.72.190 attackbotsspam
2020-04-16T03:50:25.674099homeassistant sshd[9357]: Invalid user weblogic from 106.13.72.190 port 53722
2020-04-16T03:50:25.685120homeassistant sshd[9357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190
...
2020-04-16 16:46:25
106.13.72.190 attack
Apr 14 10:26:54 ns3164893 sshd[6764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190  user=root
Apr 14 10:26:56 ns3164893 sshd[6764]: Failed password for root from 106.13.72.190 port 38050 ssh2
...
2020-04-14 16:43:45
106.13.72.190 attackbots
ssh intrusion attempt
2020-04-11 18:30:48
106.13.72.95 attack
IP blocked
2020-04-10 16:38:56
106.13.72.190 attackspam
Apr  5 14:35:52 vserver sshd\[14991\]: Failed password for root from 106.13.72.190 port 32888 ssh2Apr  5 14:38:56 vserver sshd\[15039\]: Failed password for root from 106.13.72.190 port 44002 ssh2Apr  5 14:41:58 vserver sshd\[15121\]: Failed password for root from 106.13.72.190 port 55138 ssh2Apr  5 14:45:00 vserver sshd\[15163\]: Failed password for root from 106.13.72.190 port 38016 ssh2
...
2020-04-05 21:47:21
106.13.72.95 attackbots
Apr  2 16:12:18 ift sshd\[47499\]: Invalid user shiyu from 106.13.72.95Apr  2 16:12:20 ift sshd\[47499\]: Failed password for invalid user shiyu from 106.13.72.95 port 34592 ssh2Apr  2 16:15:36 ift sshd\[48230\]: Invalid user lijianling from 106.13.72.95Apr  2 16:15:38 ift sshd\[48230\]: Failed password for invalid user lijianling from 106.13.72.95 port 45020 ssh2Apr  2 16:18:52 ift sshd\[48564\]: Failed password for root from 106.13.72.95 port 55430 ssh2
...
2020-04-02 23:57:47
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.72.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.72.83.			IN	A

;; AUTHORITY SECTION:
.			562	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120200 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 02 19:52:27 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 83.72.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 83.72.13.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.97.20.29 attackbots
Request Missing a Host Header
2020-09-25 00:29:30
51.116.112.29 attackspambots
Automatic report - Banned IP Access
2020-09-25 00:24:29
178.62.6.215 attackbots
Invalid user development from 178.62.6.215 port 40914
2020-09-24 23:59:36
93.193.132.29 attack
Unauthorized connection attempt from IP address 93.193.132.29 on Port 445(SMB)
2020-09-25 00:04:43
52.255.192.248 attackbotsspam
2020-09-24 10:30:22.202502-0500  localhost sshd[10602]: Failed password for root from 52.255.192.248 port 29420 ssh2
2020-09-24 23:49:33
113.22.236.73 attack
Unauthorized connection attempt from IP address 113.22.236.73 on Port 445(SMB)
2020-09-24 23:44:32
40.76.192.252 attackbots
Sep 24 16:42:24 cdc sshd[32695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.76.192.252  user=root
Sep 24 16:42:26 cdc sshd[32695]: Failed password for invalid user root from 40.76.192.252 port 23043 ssh2
2020-09-24 23:53:24
204.61.221.126 attack
Unauthorized connection attempt from IP address 204.61.221.126 on Port 445(SMB)
2020-09-24 23:47:48
118.123.173.18 attack
Unauthorized connection attempt from IP address 118.123.173.18 on Port 445(SMB)
2020-09-25 00:12:58
82.213.32.201 attack
Unauthorized connection attempt from IP address 82.213.32.201 on Port 445(SMB)
2020-09-25 00:13:47
192.71.3.26 attackspam
Automatic report - Banned IP Access
2020-09-25 00:22:29
197.245.95.2 attackbotsspam
Unauthorized connection attempt from IP address 197.245.95.2 on Port 445(SMB)
2020-09-25 00:11:41
106.13.110.36 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-25 00:09:08
190.200.228.69 attack
Unauthorised access (Sep 23) SRC=190.200.228.69 LEN=52 TTL=113 ID=8078 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-25 00:15:15
125.46.162.96 attackbots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=64527  .  dstport=23  .     (2880)
2020-09-25 00:12:11

Recently Reported IPs

193.200.83.247 182.64.227.74 58.182.45.219 54.38.184.208
47.9.248.161 178.32.203.128 185.136.195.215 172.222.63.140
23.38.73.219 179.156.181.156 42.35.6.183 221.126.127.30
122.132.64.222 101.98.2.70 92.36.252.53 219.205.159.206
60.50.16.150 148.72.196.67 54.64.202.160 14.21.123.133