Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Tencent Cloud Computing (Beijing) Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
2020-10-12T02:37:35.264876hostname sshd[41683]: Failed password for root from 106.55.37.132 port 59574 ssh2
...
2020-10-14 03:22:28
attackbots
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-10-13 18:40:26
attackspam
Aug 29 14:35:13 vps639187 sshd\[3239\]: Invalid user pandora from 106.55.37.132 port 40052
Aug 29 14:35:13 vps639187 sshd\[3239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132
Aug 29 14:35:16 vps639187 sshd\[3239\]: Failed password for invalid user pandora from 106.55.37.132 port 40052 ssh2
...
2020-08-30 04:00:15
attack
2020-08-23T13:12:34.1326061495-001 sshd[799]: Invalid user ubuntu from 106.55.37.132 port 33688
2020-08-23T13:12:36.2222051495-001 sshd[799]: Failed password for invalid user ubuntu from 106.55.37.132 port 33688 ssh2
2020-08-23T13:15:46.9679321495-001 sshd[1053]: Invalid user kawamoto from 106.55.37.132 port 41202
2020-08-23T13:15:46.9709861495-001 sshd[1053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132
2020-08-23T13:15:46.9679321495-001 sshd[1053]: Invalid user kawamoto from 106.55.37.132 port 41202
2020-08-23T13:15:48.7466671495-001 sshd[1053]: Failed password for invalid user kawamoto from 106.55.37.132 port 41202 ssh2
...
2020-08-24 02:49:50
attackbots
2020-08-17T17:01:14.787585xentho-1 sshd[30116]: Invalid user 111 from 106.55.37.132 port 43976
2020-08-17T17:01:14.794726xentho-1 sshd[30116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132
2020-08-17T17:01:14.787585xentho-1 sshd[30116]: Invalid user 111 from 106.55.37.132 port 43976
2020-08-17T17:01:16.441859xentho-1 sshd[30116]: Failed password for invalid user 111 from 106.55.37.132 port 43976 ssh2
2020-08-17T17:02:18.216847xentho-1 sshd[30137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132  user=root
2020-08-17T17:02:20.983777xentho-1 sshd[30137]: Failed password for root from 106.55.37.132 port 54704 ssh2
2020-08-17T17:03:11.130775xentho-1 sshd[30154]: Invalid user btc from 106.55.37.132 port 37200
2020-08-17T17:03:11.137516xentho-1 sshd[30154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132
2020-08-17T17:03:11.130775
...
2020-08-18 05:04:06
attackbots
IP blocked
2020-08-08 08:31:27
attack
Aug  5 10:50:43 webhost01 sshd[14601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132
Aug  5 10:50:45 webhost01 sshd[14601]: Failed password for invalid user hldmserver from 106.55.37.132 port 36030 ssh2
...
2020-08-05 17:12:17
attack
Aug  4 00:14:38 journals sshd\[94088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132  user=root
Aug  4 00:14:41 journals sshd\[94088\]: Failed password for root from 106.55.37.132 port 38318 ssh2
Aug  4 00:16:31 journals sshd\[94240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132  user=root
Aug  4 00:16:34 journals sshd\[94240\]: Failed password for root from 106.55.37.132 port 59664 ssh2
Aug  4 00:18:23 journals sshd\[94334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132  user=root
...
2020-08-04 08:00:26
attackspam
(sshd) Failed SSH login from 106.55.37.132 (CN/China/-): 5 in the last 3600 secs
2020-08-02 19:41:17
attack
Invalid user deploy from 106.55.37.132 port 59750
2020-08-02 06:09:07
attackbots
Jul 29 16:06:26 PorscheCustomer sshd[29449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132
Jul 29 16:06:28 PorscheCustomer sshd[29449]: Failed password for invalid user chenpq from 106.55.37.132 port 46924 ssh2
Jul 29 16:09:32 PorscheCustomer sshd[29493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.37.132
...
2020-07-30 02:09:17
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.55.37.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.55.37.132.			IN	A

;; AUTHORITY SECTION:
.			407	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 30 02:09:12 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 132.37.55.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.37.55.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
31.173.240.35 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 03-04-2020 22:40:16.
2020-04-04 07:33:06
188.166.172.189 attackspam
Invalid user gdb from 188.166.172.189 port 56746
2020-04-04 07:17:46
49.230.111.98 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 03-04-2020 22:40:18.
2020-04-04 07:29:29
45.125.65.35 attackbots
Apr  4 01:13:08 srv01 postfix/smtpd\[15524\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  4 01:13:24 srv01 postfix/smtpd\[19037\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  4 01:13:28 srv01 postfix/smtpd\[15524\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  4 01:22:20 srv01 postfix/smtpd\[19037\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  4 01:22:41 srv01 postfix/smtpd\[8188\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-04 07:25:54
198.38.84.190 attackspambots
Apr  3 23:22:26 nxxxxxxx sshd[15348]: refused connect from 198.38.84.190 (19=
8.38.84.190)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=198.38.84.190
2020-04-04 07:52:57
201.49.110.210 attackspam
Invalid user cgadmin from 201.49.110.210 port 43614
2020-04-04 07:27:22
58.221.7.174 attackbots
Invalid user tkl from 58.221.7.174 port 36026
2020-04-04 07:12:18
218.245.1.53 attackspam
Apr  4 01:17:17 debian-2gb-nbg1-2 kernel: \[8214874.649040\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=218.245.1.53 DST=195.201.40.59 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40924 DF PROTO=TCP SPT=42406 DPT=6379 WINDOW=14600 RES=0x00 SYN URGP=0
2020-04-04 07:21:30
162.243.130.35 attackbots
firewall-block, port(s): 5060/udp
2020-04-04 07:37:12
185.175.93.23 attack
Multiport scan : 15 ports scanned 5920 5921 5922 5925 5927 5932 5933 5937 5938 5939 5941 5946 5950 5952 5953
2020-04-04 07:15:06
77.247.108.77 attackbotsspam
04/03/2020-19:23:11.161618 77.247.108.77 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-04 07:52:32
49.235.58.46 attack
Apr  3 21:24:53 localhost sshd\[27058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.58.46  user=root
Apr  3 21:24:55 localhost sshd\[27058\]: Failed password for root from 49.235.58.46 port 52024 ssh2
Apr  3 21:40:20 localhost sshd\[27350\]: Invalid user c from 49.235.58.46 port 40918
...
2020-04-04 07:25:10
91.133.139.70 attack
1585950021 - 04/03/2020 23:40:21 Host: 91.133.139.70/91.133.139.70 Port: 445 TCP Blocked
2020-04-04 07:24:06
106.13.128.234 attack
2020-04-04T00:45:20.378674vps773228.ovh.net sshd[2519]: Failed password for root from 106.13.128.234 port 44830 ssh2
2020-04-04T00:48:42.765360vps773228.ovh.net sshd[3759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.128.234  user=root
2020-04-04T00:48:44.341142vps773228.ovh.net sshd[3759]: Failed password for root from 106.13.128.234 port 36626 ssh2
2020-04-04T00:52:05.013752vps773228.ovh.net sshd[5008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.128.234  user=root
2020-04-04T00:52:07.457885vps773228.ovh.net sshd[5008]: Failed password for root from 106.13.128.234 port 56656 ssh2
...
2020-04-04 07:47:09
172.81.226.147 attack
Apr  4 00:50:35 ns381471 sshd[32245]: Failed password for root from 172.81.226.147 port 33086 ssh2
2020-04-04 07:19:35

Recently Reported IPs

24.84.33.2 151.248.63.24 105.231.51.237 174.72.121.152
51.89.204.75 222.139.22.215 98.199.173.187 105.178.144.33
14.205.181.124 126.105.185.151 15.39.253.33 85.199.115.212
40.69.67.254 84.228.102.246 116.24.64.115 42.188.23.229
180.241.229.178 43.247.19.82 186.210.95.159 176.65.254.182