必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): Beijing Baidu Netcom Science and Technology Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Search Engine Spider

用户上报:
类型 评论内容 时间
attackbots
Dec 20 08:31:13 localhost sshd\[14807\]: Invalid user guest from 106.13.139.163
Dec 20 08:31:13 localhost sshd\[14807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
Dec 20 08:31:16 localhost sshd\[14807\]: Failed password for invalid user guest from 106.13.139.163 port 34148 ssh2
Dec 20 08:37:02 localhost sshd\[15218\]: Invalid user dunleavy from 106.13.139.163
Dec 20 08:37:02 localhost sshd\[15218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
...
2019-12-20 18:26:48
attackspambots
Dec 19 07:17:47 hcbbdb sshd\[22939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163  user=root
Dec 19 07:17:49 hcbbdb sshd\[22939\]: Failed password for root from 106.13.139.163 port 43758 ssh2
Dec 19 07:24:37 hcbbdb sshd\[23770\]: Invalid user padiangan from 106.13.139.163
Dec 19 07:24:37 hcbbdb sshd\[23770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
Dec 19 07:24:39 hcbbdb sshd\[23770\]: Failed password for invalid user padiangan from 106.13.139.163 port 38334 ssh2
2019-12-19 15:30:18
attack
Dec 16 00:30:11 ns3042688 sshd\[15817\]: Invalid user user from 106.13.139.163
Dec 16 00:30:11 ns3042688 sshd\[15817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163 
Dec 16 00:30:13 ns3042688 sshd\[15817\]: Failed password for invalid user user from 106.13.139.163 port 44352 ssh2
Dec 16 00:36:49 ns3042688 sshd\[18843\]: Invalid user apache from 106.13.139.163
Dec 16 00:36:49 ns3042688 sshd\[18843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163 
...
2019-12-16 07:52:24
attack
Dec 15 00:45:05 localhost sshd\[1556\]: Invalid user wwwadmin from 106.13.139.163 port 40538
Dec 15 00:45:05 localhost sshd\[1556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
Dec 15 00:45:07 localhost sshd\[1556\]: Failed password for invalid user wwwadmin from 106.13.139.163 port 40538 ssh2
2019-12-15 08:55:59
attackspambots
Dec  6 07:22:48 legacy sshd[27246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
Dec  6 07:22:51 legacy sshd[27246]: Failed password for invalid user yamashita from 106.13.139.163 port 53600 ssh2
Dec  6 07:30:14 legacy sshd[27541]: Failed password for root from 106.13.139.163 port 52070 ssh2
...
2019-12-06 14:58:35
attackbotsspam
$f2bV_matches
2019-11-19 13:41:34
attack
Nov 17 07:43:31 web9 sshd\[17598\]: Invalid user apache from 106.13.139.163
Nov 17 07:43:31 web9 sshd\[17598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
Nov 17 07:43:32 web9 sshd\[17598\]: Failed password for invalid user apache from 106.13.139.163 port 46512 ssh2
Nov 17 07:47:49 web9 sshd\[18147\]: Invalid user wozniak from 106.13.139.163
Nov 17 07:47:49 web9 sshd\[18147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
2019-11-18 01:58:28
attack
Nov 12 07:40:16 MK-Soft-VM7 sshd[8241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163 
Nov 12 07:40:18 MK-Soft-VM7 sshd[8241]: Failed password for invalid user magic from 106.13.139.163 port 34306 ssh2
...
2019-11-12 14:43:41
attackspam
Sep 24 05:58:12 lnxmysql61 sshd[26880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
Sep 24 05:58:12 lnxmysql61 sshd[26880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
2019-09-24 12:39:43
attackbotsspam
Automatic report - Banned IP Access
2019-09-20 02:48:38
attackspambots
Aug  3 21:45:22 v22018076622670303 sshd\[16708\]: Invalid user tech from 106.13.139.163 port 51480
Aug  3 21:45:22 v22018076622670303 sshd\[16708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163
Aug  3 21:45:23 v22018076622670303 sshd\[16708\]: Failed password for invalid user tech from 106.13.139.163 port 51480 ssh2
...
2019-08-04 05:07:15
相同子网IP讨论:
IP 类型 评论内容 时间
106.13.139.79 attackbotsspam
Port Scan
...
2020-09-12 22:37:44
106.13.139.79 attackbotsspam
Port Scan
...
2020-09-12 14:41:45
106.13.139.79 attackbots
" "
2020-09-12 06:29:51
106.13.139.79 attackbots
Aug 26 00:06:14 meumeu sshd[304551]: Invalid user elias from 106.13.139.79 port 40412
Aug 26 00:06:14 meumeu sshd[304551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79 
Aug 26 00:06:14 meumeu sshd[304551]: Invalid user elias from 106.13.139.79 port 40412
Aug 26 00:06:16 meumeu sshd[304551]: Failed password for invalid user elias from 106.13.139.79 port 40412 ssh2
Aug 26 00:09:18 meumeu sshd[304702]: Invalid user prueba from 106.13.139.79 port 56794
Aug 26 00:09:18 meumeu sshd[304702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79 
Aug 26 00:09:18 meumeu sshd[304702]: Invalid user prueba from 106.13.139.79 port 56794
Aug 26 00:09:20 meumeu sshd[304702]: Failed password for invalid user prueba from 106.13.139.79 port 56794 ssh2
Aug 26 00:12:27 meumeu sshd[304815]: Invalid user im from 106.13.139.79 port 44956
...
2020-08-26 06:41:21
106.13.139.79 attack
SSH BruteForce Attack
2020-08-19 19:35:28
106.13.139.79 attackspambots
Aug  6 01:14:09 ws19vmsma01 sshd[206344]: Failed password for root from 106.13.139.79 port 58482 ssh2
Aug  6 02:19:09 ws19vmsma01 sshd[148540]: Failed password for root from 106.13.139.79 port 39362 ssh2
...
2020-08-06 19:14:58
106.13.139.79 attackbots
Aug  5 17:52:05 ny01 sshd[19144]: Failed password for root from 106.13.139.79 port 41474 ssh2
Aug  5 17:56:35 ny01 sshd[20089]: Failed password for root from 106.13.139.79 port 49478 ssh2
2020-08-06 06:23:35
106.13.139.79 attackspambots
2020-07-27T21:05:12.710011shield sshd\[15491\]: Invalid user ibpzxz from 106.13.139.79 port 59044
2020-07-27T21:05:12.720073shield sshd\[15491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79
2020-07-27T21:05:15.186363shield sshd\[15491\]: Failed password for invalid user ibpzxz from 106.13.139.79 port 59044 ssh2
2020-07-27T21:14:19.688965shield sshd\[18742\]: Invalid user yangliping from 106.13.139.79 port 45884
2020-07-27T21:14:19.697794shield sshd\[18742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79
2020-07-28 05:31:07
106.13.139.111 attack
Apr 16 08:34:22 pkdns2 sshd\[18548\]: Invalid user clamav from 106.13.139.111Apr 16 08:34:23 pkdns2 sshd\[18548\]: Failed password for invalid user clamav from 106.13.139.111 port 59810 ssh2Apr 16 08:38:24 pkdns2 sshd\[18739\]: Invalid user vagrant3 from 106.13.139.111Apr 16 08:38:27 pkdns2 sshd\[18739\]: Failed password for invalid user vagrant3 from 106.13.139.111 port 55838 ssh2Apr 16 08:42:23 pkdns2 sshd\[18958\]: Invalid user craft from 106.13.139.111Apr 16 08:42:25 pkdns2 sshd\[18958\]: Failed password for invalid user craft from 106.13.139.111 port 51870 ssh2
...
2020-04-16 14:06:39
106.13.139.26 attack
$f2bV_matches
2020-04-15 23:10:39
106.13.139.111 attack
Apr 13 06:21:16 plex sshd[6882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111  user=root
Apr 13 06:21:18 plex sshd[6882]: Failed password for root from 106.13.139.111 port 43860 ssh2
2020-04-13 13:00:29
106.13.139.26 attack
Apr 12 19:40:16 webhost01 sshd[13124]: Failed password for root from 106.13.139.26 port 54720 ssh2
...
2020-04-12 21:10:38
106.13.139.111 attackspam
Apr  8 09:29:06 lukav-desktop sshd\[15010\]: Invalid user test from 106.13.139.111
Apr  8 09:29:06 lukav-desktop sshd\[15010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111
Apr  8 09:29:08 lukav-desktop sshd\[15010\]: Failed password for invalid user test from 106.13.139.111 port 44100 ssh2
Apr  8 09:32:48 lukav-desktop sshd\[15193\]: Invalid user developer from 106.13.139.111
Apr  8 09:32:48 lukav-desktop sshd\[15193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111
2020-04-08 15:32:18
106.13.139.26 attack
2020-04-04T15:13:50.067663shield sshd\[7912\]: Invalid user sk from 106.13.139.26 port 46940
2020-04-04T15:13:50.071054shield sshd\[7912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.26
2020-04-04T15:13:51.478671shield sshd\[7912\]: Failed password for invalid user sk from 106.13.139.26 port 46940 ssh2
2020-04-04T15:19:14.801088shield sshd\[8702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.26  user=root
2020-04-04T15:19:16.690187shield sshd\[8702\]: Failed password for root from 106.13.139.26 port 40514 ssh2
2020-04-05 02:26:47
106.13.139.26 attack
k+ssh-bruteforce
2020-04-03 14:23:51
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.139.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10112
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.139.163.			IN	A

;; AUTHORITY SECTION:
.			1431	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080301 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 04 05:07:10 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 163.139.13.106.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 163.139.13.106.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.70.111.22 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-06-27 04:02:21
83.239.29.235 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-06-27 03:58:25
185.111.183.184 attack
Jun 26 17:31:07 mxgate1 postfix/postscreen[13858]: CONNECT from [185.111.183.184]:51476 to [176.31.12.44]:25
Jun 26 17:31:07 mxgate1 postfix/dnsblog[14027]: addr 185.111.183.184 listed by domain zen.spamhaus.org as 127.0.0.2
Jun 26 17:31:07 mxgate1 postfix/dnsblog[14027]: addr 185.111.183.184 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 26 17:31:07 mxgate1 postfix/dnsblog[14025]: addr 185.111.183.184 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 26 17:31:08 mxgate1 postfix/dnsblog[14026]: addr 185.111.183.184 listed by domain bl.spamcop.net as 127.0.0.2
Jun 26 17:31:13 mxgate1 postfix/postscreen[13858]: DNSBL rank 4 for [185.111.183.184]:51476
Jun x@x
Jun 26 17:31:13 mxgate1 postfix/postscreen[13858]: DISCONNECT [185.111.183.184]:51476


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.111.183.184
2019-06-27 03:52:28
121.179.46.82 attackspambots
WEB Linksys Unauthenticated Remote Code Execution -2 (OSVDB-103321)
7 x WEB Apache mod_ssl HTTP Request DoS (CVE-2004-0113)
2019-06-27 03:30:28
39.44.173.167 attackspam
Unauthorized connection attempt from IP address 39.44.173.167 on Port 445(SMB)
2019-06-27 04:12:12
95.105.15.74 attackbotsspam
Jun 26 19:43:43 nextcloud sshd\[8407\]: Invalid user platnosci from 95.105.15.74
Jun 26 19:43:43 nextcloud sshd\[8407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.105.15.74
Jun 26 19:43:45 nextcloud sshd\[8407\]: Failed password for invalid user platnosci from 95.105.15.74 port 48436 ssh2
...
2019-06-27 04:11:01
46.175.70.69 attack
Autoban   46.175.70.69 AUTH/CONNECT
2019-06-27 03:55:38
14.161.44.43 attack
Unauthorized connection attempt from IP address 14.161.44.43 on Port 445(SMB)
2019-06-27 03:33:45
112.87.195.252 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2019-06-27 03:53:34
188.162.132.127 attackspambots
Unauthorized connection attempt from IP address 188.162.132.127 on Port 445(SMB)
2019-06-27 03:39:40
24.155.91.80 attackspambots
Honeypot attack, port: 23, PTR: 24-155-91-80.static.grandenetworks.net.
2019-06-27 04:11:45
122.3.139.131 attack
$f2bV_matches
2019-06-27 04:04:32
27.12.62.112 attack
Jun 26 14:44:42 iago sshd[11827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.12.62.112  user=r.r
Jun 26 14:44:44 iago sshd[11827]: Failed password for r.r from 27.12.62.112 port 56260 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.12.62.112
2019-06-27 03:47:56
177.69.245.104 attackbotsspam
Jun 26 08:06:33 mailman postfix/smtpd[27993]: warning: unknown[177.69.245.104]: SASL PLAIN authentication failed: authentication failure
2019-06-27 04:01:35
193.112.48.179 attackspambots
Jun 26 11:46:16 *** sshd[4805]: Failed password for invalid user pul from 193.112.48.179 port 39840 ssh2
Jun 26 11:57:55 *** sshd[4846]: Failed password for invalid user openfire from 193.112.48.179 port 59380 ssh2
Jun 26 11:59:12 *** sshd[4854]: Failed password for invalid user ghislain from 193.112.48.179 port 40286 ssh2
Jun 26 12:00:25 *** sshd[4867]: Failed password for invalid user vf from 193.112.48.179 port 49426 ssh2
Jun 26 12:01:40 *** sshd[4897]: Failed password for invalid user ambroise from 193.112.48.179 port 58566 ssh2
Jun 26 12:02:49 *** sshd[4928]: Failed password for invalid user dupond from 193.112.48.179 port 39472 ssh2
Jun 26 12:03:52 *** sshd[4948]: Failed password for invalid user webguest from 193.112.48.179 port 48610 ssh2
Jun 26 12:04:56 *** sshd[4970]: Failed password for invalid user matthias from 193.112.48.179 port 57748 ssh2
Jun 26 12:05:59 *** sshd[4981]: Failed password for invalid user deployer from 193.112.48.179 port 38658 ssh2
Jun 26 12:07:01 *** sshd[4985]: Failed password
2019-06-27 04:09:23

最近上报的IP列表

134.175.102.205 134.73.161.95 87.101.153.22 27.199.169.183
45.227.255.202 1.58.161.122 61.48.30.92 111.73.46.206
2408:8240:7c01:3932:4cd9:3bb5:9a96:5ca5 122.149.241.210 209.212.208.123 94.74.141.109
42.116.220.225 189.112.217.225 77.77.50.222 216.158.238.158
35.239.97.44 18.136.119.98 114.237.109.224 114.218.241.154