城市(city): unknown
省份(region): Beijing
国家(country): China
运营商(isp): Beijing Baidu Netcom Science and Technology Co. Ltd.
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Search Engine Spider
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attack | Invalid user motion from 106.13.139.252 port 55422 |
2020-01-15 04:44:54 |
| attack | Jan 1 14:25:08 server sshd\[17968\]: Invalid user quevedo from 106.13.139.252 Jan 1 14:25:08 server sshd\[17968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 Jan 1 14:25:11 server sshd\[17968\]: Failed password for invalid user quevedo from 106.13.139.252 port 49224 ssh2 Jan 1 17:46:37 server sshd\[25935\]: Invalid user guest from 106.13.139.252 Jan 1 17:46:37 server sshd\[25935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 ... |
2020-01-02 03:21:59 |
| attackbots | Dec 20 01:16:55 server sshd\[31905\]: Invalid user system from 106.13.139.252 Dec 20 01:16:55 server sshd\[31905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 Dec 20 01:16:57 server sshd\[31905\]: Failed password for invalid user system from 106.13.139.252 port 57604 ssh2 Dec 20 01:35:15 server sshd\[4515\]: Invalid user marstraner from 106.13.139.252 Dec 20 01:35:15 server sshd\[4515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 ... |
2019-12-20 07:20:28 |
| attack | Dec 19 08:28:44 vpn01 sshd[5270]: Failed password for root from 106.13.139.252 port 45124 ssh2 ... |
2019-12-19 15:52:05 |
| attackspambots | 158 failed attempt(s) in the last 24h |
2019-12-12 09:53:58 |
| attack | Dec 5 01:46:41 areeb-Workstation sshd[18984]: Failed password for root from 106.13.139.252 port 33316 ssh2 Dec 5 01:52:01 areeb-Workstation sshd[19494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 ... |
2019-12-05 05:08:20 |
| attack | Dec 3 14:24:02 web9 sshd\[15299\]: Invalid user emiliojose from 106.13.139.252 Dec 3 14:24:02 web9 sshd\[15299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 Dec 3 14:24:04 web9 sshd\[15299\]: Failed password for invalid user emiliojose from 106.13.139.252 port 46664 ssh2 Dec 3 14:30:37 web9 sshd\[16184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 user=root Dec 3 14:30:39 web9 sshd\[16184\]: Failed password for root from 106.13.139.252 port 49790 ssh2 |
2019-12-04 08:36:55 |
| attack | Dec 2 00:32:57 linuxvps sshd\[40822\]: Invalid user glor from 106.13.139.252 Dec 2 00:32:57 linuxvps sshd\[40822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 Dec 2 00:32:59 linuxvps sshd\[40822\]: Failed password for invalid user glor from 106.13.139.252 port 43208 ssh2 Dec 2 00:39:00 linuxvps sshd\[44687\]: Invalid user named from 106.13.139.252 Dec 2 00:39:00 linuxvps sshd\[44687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 |
2019-12-02 13:54:13 |
| attackbots | Nov 29 20:20:25 ldap01vmsma01 sshd[54072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 Nov 29 20:20:26 ldap01vmsma01 sshd[54072]: Failed password for invalid user bringaker from 106.13.139.252 port 50236 ssh2 ... |
2019-11-30 07:54:50 |
| attackspambots | Nov 29 16:13:02 mout sshd[23256]: Invalid user 123440 from 106.13.139.252 port 49978 |
2019-11-30 00:19:30 |
| attackspambots | Nov 8 18:10:26 firewall sshd[9497]: Invalid user 123456e from 106.13.139.252 Nov 8 18:10:28 firewall sshd[9497]: Failed password for invalid user 123456e from 106.13.139.252 port 52734 ssh2 Nov 8 18:14:52 firewall sshd[9587]: Invalid user poker from 106.13.139.252 ... |
2019-11-09 05:29:35 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.139.79 | attackbotsspam | Port Scan ... |
2020-09-12 22:37:44 |
| 106.13.139.79 | attackbotsspam | Port Scan ... |
2020-09-12 14:41:45 |
| 106.13.139.79 | attackbots | " " |
2020-09-12 06:29:51 |
| 106.13.139.79 | attackbots | Aug 26 00:06:14 meumeu sshd[304551]: Invalid user elias from 106.13.139.79 port 40412 Aug 26 00:06:14 meumeu sshd[304551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79 Aug 26 00:06:14 meumeu sshd[304551]: Invalid user elias from 106.13.139.79 port 40412 Aug 26 00:06:16 meumeu sshd[304551]: Failed password for invalid user elias from 106.13.139.79 port 40412 ssh2 Aug 26 00:09:18 meumeu sshd[304702]: Invalid user prueba from 106.13.139.79 port 56794 Aug 26 00:09:18 meumeu sshd[304702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79 Aug 26 00:09:18 meumeu sshd[304702]: Invalid user prueba from 106.13.139.79 port 56794 Aug 26 00:09:20 meumeu sshd[304702]: Failed password for invalid user prueba from 106.13.139.79 port 56794 ssh2 Aug 26 00:12:27 meumeu sshd[304815]: Invalid user im from 106.13.139.79 port 44956 ... |
2020-08-26 06:41:21 |
| 106.13.139.79 | attack | SSH BruteForce Attack |
2020-08-19 19:35:28 |
| 106.13.139.79 | attackspambots | Aug 6 01:14:09 ws19vmsma01 sshd[206344]: Failed password for root from 106.13.139.79 port 58482 ssh2 Aug 6 02:19:09 ws19vmsma01 sshd[148540]: Failed password for root from 106.13.139.79 port 39362 ssh2 ... |
2020-08-06 19:14:58 |
| 106.13.139.79 | attackbots | Aug 5 17:52:05 ny01 sshd[19144]: Failed password for root from 106.13.139.79 port 41474 ssh2 Aug 5 17:56:35 ny01 sshd[20089]: Failed password for root from 106.13.139.79 port 49478 ssh2 |
2020-08-06 06:23:35 |
| 106.13.139.79 | attackspambots | 2020-07-27T21:05:12.710011shield sshd\[15491\]: Invalid user ibpzxz from 106.13.139.79 port 59044 2020-07-27T21:05:12.720073shield sshd\[15491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79 2020-07-27T21:05:15.186363shield sshd\[15491\]: Failed password for invalid user ibpzxz from 106.13.139.79 port 59044 ssh2 2020-07-27T21:14:19.688965shield sshd\[18742\]: Invalid user yangliping from 106.13.139.79 port 45884 2020-07-27T21:14:19.697794shield sshd\[18742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79 |
2020-07-28 05:31:07 |
| 106.13.139.111 | attack | Apr 16 08:34:22 pkdns2 sshd\[18548\]: Invalid user clamav from 106.13.139.111Apr 16 08:34:23 pkdns2 sshd\[18548\]: Failed password for invalid user clamav from 106.13.139.111 port 59810 ssh2Apr 16 08:38:24 pkdns2 sshd\[18739\]: Invalid user vagrant3 from 106.13.139.111Apr 16 08:38:27 pkdns2 sshd\[18739\]: Failed password for invalid user vagrant3 from 106.13.139.111 port 55838 ssh2Apr 16 08:42:23 pkdns2 sshd\[18958\]: Invalid user craft from 106.13.139.111Apr 16 08:42:25 pkdns2 sshd\[18958\]: Failed password for invalid user craft from 106.13.139.111 port 51870 ssh2 ... |
2020-04-16 14:06:39 |
| 106.13.139.26 | attack | $f2bV_matches |
2020-04-15 23:10:39 |
| 106.13.139.111 | attack | Apr 13 06:21:16 plex sshd[6882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111 user=root Apr 13 06:21:18 plex sshd[6882]: Failed password for root from 106.13.139.111 port 43860 ssh2 |
2020-04-13 13:00:29 |
| 106.13.139.26 | attack | Apr 12 19:40:16 webhost01 sshd[13124]: Failed password for root from 106.13.139.26 port 54720 ssh2 ... |
2020-04-12 21:10:38 |
| 106.13.139.111 | attackspam | Apr 8 09:29:06 lukav-desktop sshd\[15010\]: Invalid user test from 106.13.139.111 Apr 8 09:29:06 lukav-desktop sshd\[15010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111 Apr 8 09:29:08 lukav-desktop sshd\[15010\]: Failed password for invalid user test from 106.13.139.111 port 44100 ssh2 Apr 8 09:32:48 lukav-desktop sshd\[15193\]: Invalid user developer from 106.13.139.111 Apr 8 09:32:48 lukav-desktop sshd\[15193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111 |
2020-04-08 15:32:18 |
| 106.13.139.26 | attack | 2020-04-04T15:13:50.067663shield sshd\[7912\]: Invalid user sk from 106.13.139.26 port 46940 2020-04-04T15:13:50.071054shield sshd\[7912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.26 2020-04-04T15:13:51.478671shield sshd\[7912\]: Failed password for invalid user sk from 106.13.139.26 port 46940 ssh2 2020-04-04T15:19:14.801088shield sshd\[8702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.26 user=root 2020-04-04T15:19:16.690187shield sshd\[8702\]: Failed password for root from 106.13.139.26 port 40514 ssh2 |
2020-04-05 02:26:47 |
| 106.13.139.26 | attack | k+ssh-bruteforce |
2020-04-03 14:23:51 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.139.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.139.252. IN A
;; AUTHORITY SECTION:
. 555 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110801 1800 900 604800 86400
;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 09 05:29:31 CST 2019
;; MSG SIZE rcvd: 118
Host 252.139.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 252.139.13.106.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 68.183.193.148 | attackbotsspam | Logon failure marry |
2020-03-13 08:39:32 |
| 186.96.112.77 | attack | 1584047280 - 03/12/2020 22:08:00 Host: 186.96.112.77/186.96.112.77 Port: 445 TCP Blocked |
2020-03-13 08:23:30 |
| 128.199.219.181 | attackspam | Mar 12 22:40:11 srv-ubuntu-dev3 sshd[65836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.219.181 user=root Mar 12 22:40:12 srv-ubuntu-dev3 sshd[65836]: Failed password for root from 128.199.219.181 port 52495 ssh2 Mar 12 22:43:12 srv-ubuntu-dev3 sshd[66253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.219.181 user=root Mar 12 22:43:14 srv-ubuntu-dev3 sshd[66253]: Failed password for root from 128.199.219.181 port 39240 ssh2 Mar 12 22:46:10 srv-ubuntu-dev3 sshd[66754]: Invalid user deploy from 128.199.219.181 Mar 12 22:46:10 srv-ubuntu-dev3 sshd[66754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.219.181 Mar 12 22:46:10 srv-ubuntu-dev3 sshd[66754]: Invalid user deploy from 128.199.219.181 Mar 12 22:46:12 srv-ubuntu-dev3 sshd[66754]: Failed password for invalid user deploy from 128.199.219.181 port 54224 ssh2 Mar 12 22:49:13 srv-ubu ... |
2020-03-13 08:49:36 |
| 165.227.144.125 | attack | Mar 13 01:13:13 markkoudstaal sshd[1778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.144.125 Mar 13 01:13:15 markkoudstaal sshd[1778]: Failed password for invalid user test from 165.227.144.125 port 34452 ssh2 Mar 13 01:16:48 markkoudstaal sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.144.125 |
2020-03-13 08:32:52 |
| 5.189.204.53 | attackspam | B: Magento admin pass test (wrong country) |
2020-03-13 08:47:06 |
| 165.231.84.60 | attackspambots | Registration form abuse |
2020-03-13 08:40:24 |
| 202.81.242.173 | attackbotsspam | Automatic report BANNED IP |
2020-03-13 08:34:53 |
| 61.218.32.119 | attackbots | Mar 12 18:10:09 askasleikir sshd[76900]: Failed password for root from 61.218.32.119 port 57744 ssh2 Mar 12 18:06:57 askasleikir sshd[76739]: Failed password for invalid user applmgr from 61.218.32.119 port 57824 ssh2 Mar 12 17:55:34 askasleikir sshd[76147]: Failed password for invalid user zju from 61.218.32.119 port 56742 ssh2 |
2020-03-13 08:32:06 |
| 14.136.204.41 | attack | Invalid user hiberfile from 14.136.204.41 port 58298 |
2020-03-13 08:14:59 |
| 37.49.226.104 | attackspam | trying to access non-authorized port |
2020-03-13 08:09:56 |
| 51.68.65.174 | attack | Mar 13 00:23:58 mail sshd\[742\]: Invalid user diego from 51.68.65.174 Mar 13 00:23:58 mail sshd\[742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.65.174 Mar 13 00:24:00 mail sshd\[742\]: Failed password for invalid user diego from 51.68.65.174 port 60136 ssh2 ... |
2020-03-13 08:38:04 |
| 62.234.152.218 | attack | Mar 12 23:10:11 ArkNodeAT sshd\[14224\]: Invalid user lrmagento from 62.234.152.218 Mar 12 23:10:11 ArkNodeAT sshd\[14224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218 Mar 12 23:10:13 ArkNodeAT sshd\[14224\]: Failed password for invalid user lrmagento from 62.234.152.218 port 54599 ssh2 |
2020-03-13 08:27:45 |
| 89.216.49.25 | attackspam | Mar 12 22:07:20 |
2020-03-13 08:20:54 |
| 95.181.131.153 | attackbotsspam | Mar 13 01:05:11 vmd26974 sshd[1802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153 Mar 13 01:05:12 vmd26974 sshd[1802]: Failed password for invalid user ts3 from 95.181.131.153 port 33868 ssh2 ... |
2020-03-13 08:18:04 |
| 51.91.110.249 | attack | 2020-03-12T22:06:06.865818 sshd[28306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.110.249 user=root 2020-03-12T22:06:08.263581 sshd[28306]: Failed password for root from 51.91.110.249 port 59416 ssh2 2020-03-12T22:08:15.460594 sshd[28328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.110.249 user=root 2020-03-12T22:08:17.902021 sshd[28328]: Failed password for root from 51.91.110.249 port 53830 ssh2 ... |
2020-03-13 08:08:55 |