Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.13.84.151 attackbotsspam
Sep 30 22:07:23 ns382633 sshd\[20740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
Sep 30 22:07:26 ns382633 sshd\[20740\]: Failed password for root from 106.13.84.151 port 38834 ssh2
Sep 30 22:23:02 ns382633 sshd\[24194\]: Invalid user mikael from 106.13.84.151 port 37372
Sep 30 22:23:02 ns382633 sshd\[24194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151
Sep 30 22:23:04 ns382633 sshd\[24194\]: Failed password for invalid user mikael from 106.13.84.151 port 37372 ssh2
2020-10-01 08:10:01
106.13.84.151 attack
(sshd) Failed SSH login from 106.13.84.151 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 30 12:23:13 optimus sshd[2918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
Sep 30 12:23:15 optimus sshd[2918]: Failed password for root from 106.13.84.151 port 36188 ssh2
Sep 30 12:23:35 optimus sshd[3046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
Sep 30 12:23:37 optimus sshd[3046]: Failed password for root from 106.13.84.151 port 47430 ssh2
Sep 30 12:31:50 optimus sshd[5784]: Invalid user mo from 106.13.84.151
2020-10-01 00:42:15
106.13.84.242 attackbotsspam
2020-09-28T22:39:56.083375ks3355764 sshd[19445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.242  user=root
2020-09-28T22:39:57.987202ks3355764 sshd[19445]: Failed password for root from 106.13.84.242 port 36756 ssh2
...
2020-09-30 05:08:18
106.13.84.242 attack
2020-09-28T22:39:56.083375ks3355764 sshd[19445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.242  user=root
2020-09-28T22:39:57.987202ks3355764 sshd[19445]: Failed password for root from 106.13.84.242 port 36756 ssh2
...
2020-09-29 21:17:49
106.13.84.242 attack
2020-09-28T22:39:56.083375ks3355764 sshd[19445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.242  user=root
2020-09-28T22:39:57.987202ks3355764 sshd[19445]: Failed password for root from 106.13.84.242 port 36756 ssh2
...
2020-09-29 13:31:43
106.13.84.242 attackbots
Automatic report BANNED IP
2020-09-18 17:30:24
106.13.84.242 attackspam
Sep 18 01:23:32 PorscheCustomer sshd[14549]: Failed password for root from 106.13.84.242 port 47662 ssh2
Sep 18 01:27:53 PorscheCustomer sshd[14741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.242
Sep 18 01:27:56 PorscheCustomer sshd[14741]: Failed password for invalid user st4ck from 106.13.84.242 port 55010 ssh2
...
2020-09-18 07:45:10
106.13.84.242 attack
SSH brute force attempt
2020-09-15 02:06:30
106.13.84.242 attackbots
Sep 14 11:31:04 mout sshd[24876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.242  user=root
Sep 14 11:31:06 mout sshd[24876]: Failed password for root from 106.13.84.242 port 39532 ssh2
2020-09-14 17:52:49
106.13.84.151 attack
Aug 12 19:02:00 firewall sshd[2940]: Failed password for root from 106.13.84.151 port 56602 ssh2
Aug 12 19:03:39 firewall sshd[2991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
Aug 12 19:03:41 firewall sshd[2991]: Failed password for root from 106.13.84.151 port 52992 ssh2
...
2020-08-13 08:51:35
106.13.84.151 attack
2020-08-10T13:35:15.288734shield sshd\[30257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-10T13:35:16.551252shield sshd\[30257\]: Failed password for root from 106.13.84.151 port 48410 ssh2
2020-08-10T13:39:04.415061shield sshd\[30603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-10T13:39:06.114193shield sshd\[30603\]: Failed password for root from 106.13.84.151 port 59730 ssh2
2020-08-10T13:42:41.268600shield sshd\[30920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-10 22:15:14
106.13.84.151 attackspambots
Brute force attempt
2020-08-06 17:58:10
106.13.84.151 attack
2020-08-05T03:40:29.725172abusebot-8.cloudsearch.cf sshd[9190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-05T03:40:31.175721abusebot-8.cloudsearch.cf sshd[9190]: Failed password for root from 106.13.84.151 port 54146 ssh2
2020-08-05T03:43:27.624331abusebot-8.cloudsearch.cf sshd[9227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-05T03:43:29.179794abusebot-8.cloudsearch.cf sshd[9227]: Failed password for root from 106.13.84.151 port 33306 ssh2
2020-08-05T03:46:23.906949abusebot-8.cloudsearch.cf sshd[9255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-05T03:46:25.959115abusebot-8.cloudsearch.cf sshd[9255]: Failed password for root from 106.13.84.151 port 40700 ssh2
2020-08-05T03:49:12.634006abusebot-8.cloudsearch.cf sshd[9335]: pam_unix(sshd:auth): authenticati
...
2020-08-05 18:25:45
106.13.84.151 attackbotsspam
2020-08-02 UTC: (70x) - root(70x)
2020-08-03 19:31:28
106.13.84.151 attackbotsspam
Jul 11 06:23:04 eventyay sshd[6513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151
Jul 11 06:23:05 eventyay sshd[6513]: Failed password for invalid user tito from 106.13.84.151 port 46558 ssh2
Jul 11 06:25:30 eventyay sshd[6647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151
...
2020-07-11 12:52:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.84.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.13.84.189.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:25:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 189.84.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.84.13.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.134.62.229 attack
Fail2Ban Ban Triggered
2020-02-01 01:50:19
80.249.161.42 attackspambots
Jan 31 18:32:08 grey postfix/smtpd\[3693\]: NOQUEUE: reject: RCPT from bb10.bonuszbrigad.hu\[80.249.161.42\]: 554 5.7.1 Service unavailable\; Client host \[80.249.161.42\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[80.249.161.42\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-01 01:48:08
173.185.119.243 attack
Unauthorized connection attempt from IP address 173.185.119.243 on Port 445(SMB)
2020-02-01 02:04:02
105.235.135.246 attackspam
Email rejected due to spam filtering
2020-02-01 02:02:29
104.140.188.58 attack
01/31/2020-13:06:42.526138 104.140.188.58 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-01 02:11:55
82.64.77.30 attack
Jan 31 17:31:46 web8 sshd\[9233\]: Invalid user pi from 82.64.77.30
Jan 31 17:31:46 web8 sshd\[9234\]: Invalid user pi from 82.64.77.30
Jan 31 17:31:46 web8 sshd\[9233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.77.30
Jan 31 17:31:46 web8 sshd\[9234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.77.30
Jan 31 17:31:47 web8 sshd\[9233\]: Failed password for invalid user pi from 82.64.77.30 port 57876 ssh2
2020-02-01 02:10:02
122.51.229.98 attackbotsspam
Jan 31 18:46:58 lnxded64 sshd[27168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.229.98
Jan 31 18:47:00 lnxded64 sshd[27168]: Failed password for invalid user 83 from 122.51.229.98 port 47546 ssh2
Jan 31 18:50:06 lnxded64 sshd[27925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.229.98
2020-02-01 01:55:08
50.43.6.35 attackspam
Unauthorized connection attempt detected from IP address 50.43.6.35 to port 2220 [J]
2020-02-01 02:22:41
125.212.226.54 attack
Jan 31 18:01:42 game-panel sshd[8740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.226.54
Jan 31 18:01:44 game-panel sshd[8740]: Failed password for invalid user zabbix from 125.212.226.54 port 53888 ssh2
Jan 31 18:04:58 game-panel sshd[8870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.226.54
2020-02-01 02:10:33
119.146.145.104 attackspambots
(sshd) Failed SSH login from 119.146.145.104 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 31 17:06:15 andromeda sshd[16007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104  user=admin
Jan 31 17:06:18 andromeda sshd[16007]: Failed password for admin from 119.146.145.104 port 2249 ssh2
Jan 31 17:31:58 andromeda sshd[17141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104  user=admin
2020-02-01 01:54:16
211.20.26.61 attackbotsspam
2020-01-31T12:14:46.1783481495-001 sshd[63198]: Invalid user ts3 from 211.20.26.61 port 46578
2020-01-31T12:14:46.1857721495-001 sshd[63198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-20-26-61.hinet-ip.hinet.net
2020-01-31T12:14:46.1783481495-001 sshd[63198]: Invalid user ts3 from 211.20.26.61 port 46578
2020-01-31T12:14:47.9449491495-001 sshd[63198]: Failed password for invalid user ts3 from 211.20.26.61 port 46578 ssh2
2020-01-31T12:16:45.6807741495-001 sshd[63289]: Invalid user david from 211.20.26.61 port 55349
2020-01-31T12:16:45.6846311495-001 sshd[63289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-20-26-61.hinet-ip.hinet.net
2020-01-31T12:16:45.6807741495-001 sshd[63289]: Invalid user david from 211.20.26.61 port 55349
2020-01-31T12:16:47.4467591495-001 sshd[63289]: Failed password for invalid user david from 211.20.26.61 port 55349 ssh2
2020-01-31T12:18:47.4197261495-001 sshd[6336
...
2020-02-01 02:07:12
187.19.231.238 attackbotsspam
Email rejected due to spam filtering
2020-02-01 02:27:21
111.231.144.41 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2020-02-01 02:02:51
193.112.129.199 attack
Jan 31 08:10:21 sachi sshd\[14415\]: Invalid user 123 from 193.112.129.199
Jan 31 08:10:21 sachi sshd\[14415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.129.199
Jan 31 08:10:24 sachi sshd\[14415\]: Failed password for invalid user 123 from 193.112.129.199 port 58280 ssh2
Jan 31 08:14:53 sachi sshd\[14749\]: Invalid user xxx from 193.112.129.199
Jan 31 08:14:53 sachi sshd\[14749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.129.199
2020-02-01 02:25:04
222.186.30.209 attack
Unauthorized connection attempt detected from IP address 222.186.30.209 to port 22 [J]
2020-02-01 02:32:55

Recently Reported IPs

106.13.96.237 106.13.88.180 106.13.86.117 106.133.113.181
106.138.93.10 106.135.86.16 106.14.0.169 101.236.33.162
106.14.0.65 106.14.0.196 106.14.1.134 106.14.1.159
106.14.1.178 106.14.1.182 106.14.1.14 106.14.1.167
106.14.1.184 106.14.1.152 101.236.33.172 106.14.1.148