城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): Beijing Baidu Netcom Science and Technology Co. Ltd.
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Search Engine Spider
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attackbots | Dec 25 23:49:20 vpn01 sshd[20541]: Failed password for root from 106.12.137.55 port 40710 ssh2 ... |
2019-12-26 08:38:38 |
| attackbotsspam | Dec 14 07:58:33 [host] sshd[7069]: Invalid user viriya from 106.12.137.55 Dec 14 07:58:33 [host] sshd[7069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 Dec 14 07:58:36 [host] sshd[7069]: Failed password for invalid user viriya from 106.12.137.55 port 37250 ssh2 |
2019-12-14 20:54:00 |
| attack | Dec 13 13:25:14 nextcloud sshd\[4910\]: Invalid user cmpir from 106.12.137.55 Dec 13 13:25:14 nextcloud sshd\[4910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 Dec 13 13:25:17 nextcloud sshd\[4910\]: Failed password for invalid user cmpir from 106.12.137.55 port 55380 ssh2 ... |
2019-12-13 20:30:55 |
| attackspam | Dec 5 13:26:10 v22018086721571380 sshd[19932]: Failed password for invalid user oudermeulen from 106.12.137.55 port 54476 ssh2 Dec 5 14:30:59 v22018086721571380 sshd[24523]: Failed password for invalid user zxzczvg from 106.12.137.55 port 38472 ssh2 |
2019-12-05 21:50:01 |
| attackspambots | Dec 4 04:49:24 venus sshd\[29203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 user=news Dec 4 04:49:25 venus sshd\[29203\]: Failed password for news from 106.12.137.55 port 54308 ssh2 Dec 4 04:58:06 venus sshd\[29471\]: Invalid user home from 106.12.137.55 port 33980 ... |
2019-12-04 13:00:29 |
| attack | Nov 30 09:22:35 sso sshd[12235]: Failed password for root from 106.12.137.55 port 50230 ssh2 ... |
2019-11-30 16:51:17 |
| attack | Automatic report - Banned IP Access |
2019-11-29 06:48:55 |
| attack | Nov 25 10:15:47 sd-53420 sshd\[14889\]: Invalid user admin from 106.12.137.55 Nov 25 10:15:47 sd-53420 sshd\[14889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 Nov 25 10:15:49 sd-53420 sshd\[14889\]: Failed password for invalid user admin from 106.12.137.55 port 34102 ssh2 Nov 25 10:20:14 sd-53420 sshd\[15617\]: Invalid user gilemette from 106.12.137.55 Nov 25 10:20:14 sd-53420 sshd\[15617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 ... |
2019-11-25 20:46:52 |
| attackspambots | Nov 17 16:44:31 nextcloud sshd\[15986\]: Invalid user hambone from 106.12.137.55 Nov 17 16:44:31 nextcloud sshd\[15986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 Nov 17 16:44:33 nextcloud sshd\[15986\]: Failed password for invalid user hambone from 106.12.137.55 port 48344 ssh2 ... |
2019-11-18 00:33:54 |
| attackspambots | Nov 11 06:23:32 srv01 sshd[17523]: Invalid user hendriks from 106.12.137.55 Nov 11 06:23:32 srv01 sshd[17523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 Nov 11 06:23:32 srv01 sshd[17523]: Invalid user hendriks from 106.12.137.55 Nov 11 06:23:34 srv01 sshd[17523]: Failed password for invalid user hendriks from 106.12.137.55 port 38794 ssh2 Nov 11 06:28:36 srv01 sshd[18412]: Invalid user nakatsuka from 106.12.137.55 ... |
2019-11-11 13:33:56 |
| attack | Nov 5 23:52:48 TORMINT sshd\[32025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 user=root Nov 5 23:52:50 TORMINT sshd\[32025\]: Failed password for root from 106.12.137.55 port 40980 ssh2 Nov 5 23:58:01 TORMINT sshd\[32243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 user=root ... |
2019-11-06 13:07:43 |
| attackspam | Oct 30 13:33:08 localhost sshd\[18590\]: Invalid user minna from 106.12.137.55 Oct 30 13:33:08 localhost sshd\[18590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 Oct 30 13:33:10 localhost sshd\[18590\]: Failed password for invalid user minna from 106.12.137.55 port 45004 ssh2 Oct 30 13:39:05 localhost sshd\[18949\]: Invalid user admin from 106.12.137.55 Oct 30 13:39:05 localhost sshd\[18949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 ... |
2019-10-31 04:26:50 |
| attackspam | Lines containing failures of 106.12.137.55 Oct 18 01:51:54 smtp-out sshd[7785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 user=r.r Oct 18 01:51:55 smtp-out sshd[7785]: Failed password for r.r from 106.12.137.55 port 36194 ssh2 Oct 18 01:51:56 smtp-out sshd[7785]: Received disconnect from 106.12.137.55 port 36194:11: Bye Bye [preauth] Oct 18 01:51:56 smtp-out sshd[7785]: Disconnected from authenticating user r.r 106.12.137.55 port 36194 [preauth] Oct 18 02:10:18 smtp-out sshd[8466]: Invalid user nfvip from 106.12.137.55 port 56826 Oct 18 02:10:18 smtp-out sshd[8466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55 Oct 18 02:10:19 smtp-out sshd[8466]: Failed password for invalid user nfvip from 106.12.137.55 port 56826 ssh2 Oct 18 02:10:19 smtp-out sshd[8466]: Received disconnect from 106.12.137.55 port 56826:11: Bye Bye [preauth] Oct 18 02:10:19 smtp-out ssh........ ------------------------------ |
2019-10-18 15:19:50 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.12.137.46 | attackbots | Invalid user iww from 106.12.137.46 port 47568 |
2020-05-23 12:24:41 |
| 106.12.137.46 | attack | May 21 23:29:57 santamaria sshd\[21696\]: Invalid user fin from 106.12.137.46 May 21 23:29:57 santamaria sshd\[21696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.46 May 21 23:29:59 santamaria sshd\[21696\]: Failed password for invalid user fin from 106.12.137.46 port 50278 ssh2 ... |
2020-05-22 06:17:12 |
| 106.12.137.1 | attackspam | May 20 20:20:09 web1 sshd\[2468\]: Invalid user wgo from 106.12.137.1 May 20 20:20:09 web1 sshd\[2468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1 May 20 20:20:11 web1 sshd\[2468\]: Failed password for invalid user wgo from 106.12.137.1 port 35692 ssh2 May 20 20:24:43 web1 sshd\[2844\]: Invalid user oba from 106.12.137.1 May 20 20:24:43 web1 sshd\[2844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1 |
2020-05-21 14:27:21 |
| 106.12.137.46 | attackspambots | 2020-04-29T04:38:35.221791abusebot-5.cloudsearch.cf sshd[13642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.46 user=root 2020-04-29T04:38:36.816331abusebot-5.cloudsearch.cf sshd[13642]: Failed password for root from 106.12.137.46 port 44302 ssh2 2020-04-29T04:42:08.647851abusebot-5.cloudsearch.cf sshd[13691]: Invalid user Justin from 106.12.137.46 port 58962 2020-04-29T04:42:08.654313abusebot-5.cloudsearch.cf sshd[13691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.46 2020-04-29T04:42:08.647851abusebot-5.cloudsearch.cf sshd[13691]: Invalid user Justin from 106.12.137.46 port 58962 2020-04-29T04:42:10.158161abusebot-5.cloudsearch.cf sshd[13691]: Failed password for invalid user Justin from 106.12.137.46 port 58962 ssh2 2020-04-29T04:45:49.859745abusebot-5.cloudsearch.cf sshd[13695]: Invalid user kwinfo from 106.12.137.46 port 45390 ... |
2020-04-29 13:19:22 |
| 106.12.137.226 | attack | Apr 21 20:43:27 server4-pi sshd[28636]: Failed password for root from 106.12.137.226 port 37650 ssh2 Apr 21 20:47:14 server4-pi sshd[29826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.226 |
2020-04-22 07:27:03 |
| 106.12.137.1 | attack | invalid login attempt (it) |
2020-04-22 06:36:07 |
| 106.12.137.1 | attackbots | Apr 20 21:56:13 ncomp sshd[31110]: Invalid user v from 106.12.137.1 Apr 20 21:56:13 ncomp sshd[31110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1 Apr 20 21:56:13 ncomp sshd[31110]: Invalid user v from 106.12.137.1 Apr 20 21:56:14 ncomp sshd[31110]: Failed password for invalid user v from 106.12.137.1 port 38980 ssh2 |
2020-04-21 05:33:32 |
| 106.12.137.226 | attackbots | distributed sshd attacks |
2020-04-17 14:45:26 |
| 106.12.137.46 | attackspambots | Apr 15 01:04:13 ns381471 sshd[1816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.46 Apr 15 01:04:16 ns381471 sshd[1816]: Failed password for invalid user astr from 106.12.137.46 port 48418 ssh2 |
2020-04-15 07:45:21 |
| 106.12.137.1 | attack | 2020-04-06T04:18:19.496754shield sshd\[21493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1 user=root 2020-04-06T04:18:21.539837shield sshd\[21493\]: Failed password for root from 106.12.137.1 port 43448 ssh2 2020-04-06T04:20:30.338104shield sshd\[21927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1 user=root 2020-04-06T04:20:32.366529shield sshd\[21927\]: Failed password for root from 106.12.137.1 port 44942 ssh2 2020-04-06T04:22:40.834119shield sshd\[22445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1 user=root |
2020-04-06 16:52:54 |
| 106.12.137.1 | attack | 2020-04-02T15:51:59.429356linuxbox-skyline sshd[7052]: Invalid user jayheo from 106.12.137.1 port 52188 ... |
2020-04-03 06:51:59 |
| 106.12.137.46 | attackbots | 2020-03-20T22:30:52.230451shield sshd\[30053\]: Invalid user zo from 106.12.137.46 port 50884 2020-03-20T22:30:52.237766shield sshd\[30053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.46 2020-03-20T22:30:54.909915shield sshd\[30053\]: Failed password for invalid user zo from 106.12.137.46 port 50884 ssh2 2020-03-20T22:32:20.973568shield sshd\[30462\]: Invalid user 01 from 106.12.137.46 port 45592 2020-03-20T22:32:20.982035shield sshd\[30462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.46 |
2020-03-21 08:53:01 |
| 106.12.137.1 | attackspambots | [MK-VM2] Blocked by UFW |
2020-03-17 02:47:24 |
| 106.12.137.1 | attackspambots | Mar 13 07:08:21 santamaria sshd\[32291\]: Invalid user plexuser from 106.12.137.1 Mar 13 07:08:21 santamaria sshd\[32291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1 Mar 13 07:08:22 santamaria sshd\[32291\]: Failed password for invalid user plexuser from 106.12.137.1 port 50482 ssh2 ... |
2020-03-13 15:00:43 |
| 106.12.137.226 | attackspambots | Unauthorized connection attempt detected from IP address 106.12.137.226 to port 2220 [J] |
2020-01-29 05:17:20 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.12.137.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.12.137.55. IN A
;; AUTHORITY SECTION:
. 592 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019101800 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 18 15:19:47 CST 2019
;; MSG SIZE rcvd: 117
Host 55.137.12.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 55.137.12.106.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.91.248.56 | attackbotsspam | 2019-08-24T23:28:16.736843enmeeting.mahidol.ac.th sshd\[5701\]: Invalid user chad from 51.91.248.56 port 47814 2019-08-24T23:28:16.755478enmeeting.mahidol.ac.th sshd\[5701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=56.ip-51-91-248.eu 2019-08-24T23:28:18.640412enmeeting.mahidol.ac.th sshd\[5701\]: Failed password for invalid user chad from 51.91.248.56 port 47814 ssh2 ... |
2019-08-25 04:20:41 |
| 58.91.235.17 | attackspam | Unauthorised access (Aug 24) SRC=58.91.235.17 LEN=52 TOS=0x10 PREC=0x40 TTL=114 ID=28808 DF TCP DPT=445 WINDOW=8192 SYN |
2019-08-25 04:08:09 |
| 79.36.22.63 | attackbotsspam | scan z |
2019-08-25 04:31:06 |
| 218.92.0.199 | attack | Aug 24 13:20:13 eventyay sshd[795]: Failed password for root from 218.92.0.199 port 19437 ssh2 Aug 24 13:20:15 eventyay sshd[795]: Failed password for root from 218.92.0.199 port 19437 ssh2 Aug 24 13:20:18 eventyay sshd[795]: Failed password for root from 218.92.0.199 port 19437 ssh2 ... |
2019-08-25 04:00:16 |
| 51.79.71.142 | attackspambots | Aug 24 20:26:10 ncomp sshd[17946]: Invalid user hara from 51.79.71.142 Aug 24 20:26:10 ncomp sshd[17946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.71.142 Aug 24 20:26:10 ncomp sshd[17946]: Invalid user hara from 51.79.71.142 Aug 24 20:26:11 ncomp sshd[17946]: Failed password for invalid user hara from 51.79.71.142 port 44662 ssh2 |
2019-08-25 04:12:30 |
| 212.200.237.122 | attackbots | NAME : TELEKOM-NET + e-mail abuse : abuse@telekom.rs CIDR : 212.200.236.0/23 | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack RS - block certain countries :) IP: 212.200.237.122 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-08-25 04:16:01 |
| 193.187.80.48 | attackbots | [portscan] Port scan |
2019-08-25 04:09:52 |
| 103.252.250.194 | attackspam | Port 1433 Scan |
2019-08-25 04:23:34 |
| 84.17.47.136 | attack | 0,47-01/01 [bc01/m05] concatform PostRequest-Spammer scoring: berlin |
2019-08-25 04:29:13 |
| 162.247.72.199 | attackspambots | Aug 23 04:59:00 *** sshd[21393]: Failed password for invalid user carapp from 162.247.72.199 port 35504 ssh2 Aug 23 04:59:03 *** sshd[21393]: Failed password for invalid user carapp from 162.247.72.199 port 35504 ssh2 Aug 23 04:59:06 *** sshd[21393]: Failed password for invalid user carapp from 162.247.72.199 port 35504 ssh2 Aug 23 05:03:41 *** sshd[21610]: Failed password for invalid user ftp from 162.247.72.199 port 37996 ssh2 Aug 23 05:03:48 *** sshd[21612]: Failed password for invalid user ftp1 from 162.247.72.199 port 42142 ssh2 Aug 23 05:03:54 *** sshd[21614]: Failed password for invalid user ftpadmin from 162.247.72.199 port 46680 ssh2 Aug 23 05:04:01 *** sshd[21623]: Failed password for invalid user ftp from 162.247.72.199 port 51240 ssh2 Aug 23 05:08:38 *** sshd[21855]: Failed password for invalid user lars from 162.247.72.199 port 40342 ssh2 Aug 24 21:24:46 *** sshd[414]: Failed password for invalid user vikas from 162.247.72.199 port 57492 ssh2 Aug 24 21:24:52 *** sshd[417]: Failed password for inv |
2019-08-25 04:05:54 |
| 60.191.206.110 | attackspam | Aug 24 15:06:23 xeon cyrus/imap[45584]: badlogin: [60.191.206.110] plain [SASL(-13): authentication failure: Password verification failed] |
2019-08-25 04:34:16 |
| 184.105.247.222 | attack | firewall-block, port(s): 3389/tcp |
2019-08-25 04:33:18 |
| 218.92.0.192 | attackbots | 2019-08-24T11:21:30.812549abusebot-4.cloudsearch.cf sshd\[3894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.192 user=root |
2019-08-25 03:58:29 |
| 82.221.128.73 | attackspambots | 18622/tcp 18522/tcp 18322/tcp... [2019-06-23/08-24]227pkt,60pt.(tcp) |
2019-08-25 04:30:36 |
| 51.255.46.83 | attackspambots | Aug 24 09:20:47 lcdev sshd\[11246\]: Invalid user support@1234 from 51.255.46.83 Aug 24 09:20:47 lcdev sshd\[11246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.ip-51-255-46.eu Aug 24 09:20:49 lcdev sshd\[11246\]: Failed password for invalid user support@1234 from 51.255.46.83 port 56007 ssh2 Aug 24 09:24:55 lcdev sshd\[11616\]: Invalid user deng123 from 51.255.46.83 Aug 24 09:24:55 lcdev sshd\[11616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.ip-51-255-46.eu |
2019-08-25 04:10:20 |