必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Beijing

国家(country): China

运营商(isp): Beijing Baidu Netcom Science and Technology Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Search Engine Spider

用户上报:
类型 评论内容 时间
attack
Invalid user motion from 106.13.139.252 port 55422
2020-01-15 04:44:54
attack
Jan  1 14:25:08 server sshd\[17968\]: Invalid user quevedo from 106.13.139.252
Jan  1 14:25:08 server sshd\[17968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 
Jan  1 14:25:11 server sshd\[17968\]: Failed password for invalid user quevedo from 106.13.139.252 port 49224 ssh2
Jan  1 17:46:37 server sshd\[25935\]: Invalid user guest from 106.13.139.252
Jan  1 17:46:37 server sshd\[25935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 
...
2020-01-02 03:21:59
attackbots
Dec 20 01:16:55 server sshd\[31905\]: Invalid user system from 106.13.139.252
Dec 20 01:16:55 server sshd\[31905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 
Dec 20 01:16:57 server sshd\[31905\]: Failed password for invalid user system from 106.13.139.252 port 57604 ssh2
Dec 20 01:35:15 server sshd\[4515\]: Invalid user marstraner from 106.13.139.252
Dec 20 01:35:15 server sshd\[4515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 
...
2019-12-20 07:20:28
attack
Dec 19 08:28:44 vpn01 sshd[5270]: Failed password for root from 106.13.139.252 port 45124 ssh2
...
2019-12-19 15:52:05
attackspambots
158 failed attempt(s) in the last 24h
2019-12-12 09:53:58
attack
Dec  5 01:46:41 areeb-Workstation sshd[18984]: Failed password for root from 106.13.139.252 port 33316 ssh2
Dec  5 01:52:01 areeb-Workstation sshd[19494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252 
...
2019-12-05 05:08:20
attack
Dec  3 14:24:02 web9 sshd\[15299\]: Invalid user emiliojose from 106.13.139.252
Dec  3 14:24:02 web9 sshd\[15299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252
Dec  3 14:24:04 web9 sshd\[15299\]: Failed password for invalid user emiliojose from 106.13.139.252 port 46664 ssh2
Dec  3 14:30:37 web9 sshd\[16184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252  user=root
Dec  3 14:30:39 web9 sshd\[16184\]: Failed password for root from 106.13.139.252 port 49790 ssh2
2019-12-04 08:36:55
attack
Dec  2 00:32:57 linuxvps sshd\[40822\]: Invalid user glor from 106.13.139.252
Dec  2 00:32:57 linuxvps sshd\[40822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252
Dec  2 00:32:59 linuxvps sshd\[40822\]: Failed password for invalid user glor from 106.13.139.252 port 43208 ssh2
Dec  2 00:39:00 linuxvps sshd\[44687\]: Invalid user named from 106.13.139.252
Dec  2 00:39:00 linuxvps sshd\[44687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252
2019-12-02 13:54:13
attackbots
Nov 29 20:20:25 ldap01vmsma01 sshd[54072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252
Nov 29 20:20:26 ldap01vmsma01 sshd[54072]: Failed password for invalid user bringaker from 106.13.139.252 port 50236 ssh2
...
2019-11-30 07:54:50
attackspambots
Nov 29 16:13:02 mout sshd[23256]: Invalid user 123440 from 106.13.139.252 port 49978
2019-11-30 00:19:30
attackspambots
Nov  8 18:10:26 firewall sshd[9497]: Invalid user 123456e from 106.13.139.252
Nov  8 18:10:28 firewall sshd[9497]: Failed password for invalid user 123456e from 106.13.139.252 port 52734 ssh2
Nov  8 18:14:52 firewall sshd[9587]: Invalid user poker from 106.13.139.252
...
2019-11-09 05:29:35
相同子网IP讨论:
IP 类型 评论内容 时间
106.13.139.79 attackbotsspam
Port Scan
...
2020-09-12 22:37:44
106.13.139.79 attackbotsspam
Port Scan
...
2020-09-12 14:41:45
106.13.139.79 attackbots
" "
2020-09-12 06:29:51
106.13.139.79 attackbots
Aug 26 00:06:14 meumeu sshd[304551]: Invalid user elias from 106.13.139.79 port 40412
Aug 26 00:06:14 meumeu sshd[304551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79 
Aug 26 00:06:14 meumeu sshd[304551]: Invalid user elias from 106.13.139.79 port 40412
Aug 26 00:06:16 meumeu sshd[304551]: Failed password for invalid user elias from 106.13.139.79 port 40412 ssh2
Aug 26 00:09:18 meumeu sshd[304702]: Invalid user prueba from 106.13.139.79 port 56794
Aug 26 00:09:18 meumeu sshd[304702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79 
Aug 26 00:09:18 meumeu sshd[304702]: Invalid user prueba from 106.13.139.79 port 56794
Aug 26 00:09:20 meumeu sshd[304702]: Failed password for invalid user prueba from 106.13.139.79 port 56794 ssh2
Aug 26 00:12:27 meumeu sshd[304815]: Invalid user im from 106.13.139.79 port 44956
...
2020-08-26 06:41:21
106.13.139.79 attack
SSH BruteForce Attack
2020-08-19 19:35:28
106.13.139.79 attackspambots
Aug  6 01:14:09 ws19vmsma01 sshd[206344]: Failed password for root from 106.13.139.79 port 58482 ssh2
Aug  6 02:19:09 ws19vmsma01 sshd[148540]: Failed password for root from 106.13.139.79 port 39362 ssh2
...
2020-08-06 19:14:58
106.13.139.79 attackbots
Aug  5 17:52:05 ny01 sshd[19144]: Failed password for root from 106.13.139.79 port 41474 ssh2
Aug  5 17:56:35 ny01 sshd[20089]: Failed password for root from 106.13.139.79 port 49478 ssh2
2020-08-06 06:23:35
106.13.139.79 attackspambots
2020-07-27T21:05:12.710011shield sshd\[15491\]: Invalid user ibpzxz from 106.13.139.79 port 59044
2020-07-27T21:05:12.720073shield sshd\[15491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79
2020-07-27T21:05:15.186363shield sshd\[15491\]: Failed password for invalid user ibpzxz from 106.13.139.79 port 59044 ssh2
2020-07-27T21:14:19.688965shield sshd\[18742\]: Invalid user yangliping from 106.13.139.79 port 45884
2020-07-27T21:14:19.697794shield sshd\[18742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.79
2020-07-28 05:31:07
106.13.139.111 attack
Apr 16 08:34:22 pkdns2 sshd\[18548\]: Invalid user clamav from 106.13.139.111Apr 16 08:34:23 pkdns2 sshd\[18548\]: Failed password for invalid user clamav from 106.13.139.111 port 59810 ssh2Apr 16 08:38:24 pkdns2 sshd\[18739\]: Invalid user vagrant3 from 106.13.139.111Apr 16 08:38:27 pkdns2 sshd\[18739\]: Failed password for invalid user vagrant3 from 106.13.139.111 port 55838 ssh2Apr 16 08:42:23 pkdns2 sshd\[18958\]: Invalid user craft from 106.13.139.111Apr 16 08:42:25 pkdns2 sshd\[18958\]: Failed password for invalid user craft from 106.13.139.111 port 51870 ssh2
...
2020-04-16 14:06:39
106.13.139.26 attack
$f2bV_matches
2020-04-15 23:10:39
106.13.139.111 attack
Apr 13 06:21:16 plex sshd[6882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111  user=root
Apr 13 06:21:18 plex sshd[6882]: Failed password for root from 106.13.139.111 port 43860 ssh2
2020-04-13 13:00:29
106.13.139.26 attack
Apr 12 19:40:16 webhost01 sshd[13124]: Failed password for root from 106.13.139.26 port 54720 ssh2
...
2020-04-12 21:10:38
106.13.139.111 attackspam
Apr  8 09:29:06 lukav-desktop sshd\[15010\]: Invalid user test from 106.13.139.111
Apr  8 09:29:06 lukav-desktop sshd\[15010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111
Apr  8 09:29:08 lukav-desktop sshd\[15010\]: Failed password for invalid user test from 106.13.139.111 port 44100 ssh2
Apr  8 09:32:48 lukav-desktop sshd\[15193\]: Invalid user developer from 106.13.139.111
Apr  8 09:32:48 lukav-desktop sshd\[15193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111
2020-04-08 15:32:18
106.13.139.26 attack
2020-04-04T15:13:50.067663shield sshd\[7912\]: Invalid user sk from 106.13.139.26 port 46940
2020-04-04T15:13:50.071054shield sshd\[7912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.26
2020-04-04T15:13:51.478671shield sshd\[7912\]: Failed password for invalid user sk from 106.13.139.26 port 46940 ssh2
2020-04-04T15:19:14.801088shield sshd\[8702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.26  user=root
2020-04-04T15:19:16.690187shield sshd\[8702\]: Failed password for root from 106.13.139.26 port 40514 ssh2
2020-04-05 02:26:47
106.13.139.26 attack
k+ssh-bruteforce
2020-04-03 14:23:51
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.139.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.139.252.			IN	A

;; AUTHORITY SECTION:
.			555	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110801 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 09 05:29:31 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 252.139.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.139.13.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.227.236.60 attackbotsspam
2020-06-30T13:11:08.913227mail.csmailer.org sshd[16162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-236-60.hinet-ip.hinet.net
2020-06-30T13:11:08.910635mail.csmailer.org sshd[16162]: Invalid user giuseppe from 125.227.236.60 port 59638
2020-06-30T13:11:11.039488mail.csmailer.org sshd[16162]: Failed password for invalid user giuseppe from 125.227.236.60 port 59638 ssh2
2020-06-30T13:14:44.615612mail.csmailer.org sshd[16992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-236-60.hinet-ip.hinet.net  user=root
2020-06-30T13:14:46.726711mail.csmailer.org sshd[16992]: Failed password for root from 125.227.236.60 port 59032 ssh2
...
2020-06-30 21:23:54
159.203.35.141 attackbots
$f2bV_matches
2020-06-30 21:22:24
185.110.95.13 attack
Failed password for invalid user gwh from 185.110.95.13 port 48120 ssh2
2020-06-30 21:06:59
92.222.180.221 attack
2020-06-30T08:01:05.6303991495-001 sshd[40071]: Invalid user guest from 92.222.180.221 port 45952
2020-06-30T08:01:07.7590491495-001 sshd[40071]: Failed password for invalid user guest from 92.222.180.221 port 45952 ssh2
2020-06-30T08:04:30.9266211495-001 sshd[40247]: Invalid user www from 92.222.180.221 port 46604
2020-06-30T08:04:30.9302051495-001 sshd[40247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.ip-92-222-180.eu
2020-06-30T08:04:30.9266211495-001 sshd[40247]: Invalid user www from 92.222.180.221 port 46604
2020-06-30T08:04:32.6442661495-001 sshd[40247]: Failed password for invalid user www from 92.222.180.221 port 46604 ssh2
...
2020-06-30 21:29:13
46.148.21.32 attack
2020-06-30 07:20:21.708278-0500  localhost sshd[16695]: Failed password for invalid user ubnt from 46.148.21.32 port 60476 ssh2
2020-06-30 20:51:17
90.126.241.175 attackspambots
2020-06-30T12:26:47.263594abusebot-8.cloudsearch.cf sshd[26771]: Invalid user cheryl from 90.126.241.175 port 54312
2020-06-30T12:26:47.268453abusebot-8.cloudsearch.cf sshd[26771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-str-1-544-175.w90-126.abo.wanadoo.fr
2020-06-30T12:26:47.263594abusebot-8.cloudsearch.cf sshd[26771]: Invalid user cheryl from 90.126.241.175 port 54312
2020-06-30T12:26:49.085267abusebot-8.cloudsearch.cf sshd[26771]: Failed password for invalid user cheryl from 90.126.241.175 port 54312 ssh2
2020-06-30T12:30:59.600207abusebot-8.cloudsearch.cf sshd[26786]: Invalid user jeremias from 90.126.241.175 port 54449
2020-06-30T12:30:59.606399abusebot-8.cloudsearch.cf sshd[26786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-str-1-544-175.w90-126.abo.wanadoo.fr
2020-06-30T12:30:59.600207abusebot-8.cloudsearch.cf sshd[26786]: Invalid user jeremias from 90.126.241.175 port 54449
2
...
2020-06-30 21:33:20
66.70.205.186 attackbotsspam
Jun 30 15:20:03 vps sshd[772559]: Failed password for invalid user test from 66.70.205.186 port 53148 ssh2
Jun 30 15:23:08 vps sshd[790051]: Invalid user zy from 66.70.205.186 port 52609
Jun 30 15:23:08 vps sshd[790051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=downloads.falepleno.com.br
Jun 30 15:23:10 vps sshd[790051]: Failed password for invalid user zy from 66.70.205.186 port 52609 ssh2
Jun 30 15:26:24 vps sshd[808230]: Invalid user daniel from 66.70.205.186 port 52069
...
2020-06-30 21:27:34
104.223.197.240 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-06-30T12:38:55Z and 2020-06-30T12:45:13Z
2020-06-30 21:07:19
185.156.73.42 attackspambots
" "
2020-06-30 20:56:08
174.138.16.52 attackspam
Jun 30 01:36:12 srv1 sshd[32230]: Address 174.138.16.52 maps to cmn-nexus01.prod.trakinvest.io, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 30 01:36:12 srv1 sshd[32230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.16.52  user=r.r
Jun 30 01:36:13 srv1 sshd[32230]: Failed password for r.r from 174.138.16.52 port 52338 ssh2
Jun 30 01:36:14 srv1 sshd[32231]: Received disconnect from 174.138.16.52: 11: Bye Bye
Jun 30 01:46:00 srv1 sshd[32578]: Address 174.138.16.52 maps to cmn-nexus01.prod.trakinvest.io, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 30 01:46:00 srv1 sshd[32578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.16.52  user=r.r
Jun 30 01:46:02 srv1 sshd[32578]: Failed password for r.r from 174.138.16.52 port 55350 ssh2
Jun 30 01:46:03 srv1 sshd[32579]: Received disconnect from 174.138.16.52: 11: Bye Bye
........
-------------------------------
2020-06-30 21:35:53
49.235.134.224 attackbotsspam
Jun 30 15:16:36 OPSO sshd\[29862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.134.224  user=root
Jun 30 15:16:38 OPSO sshd\[29862\]: Failed password for root from 49.235.134.224 port 56856 ssh2
Jun 30 15:19:20 OPSO sshd\[30286\]: Invalid user enrique from 49.235.134.224 port 56250
Jun 30 15:19:20 OPSO sshd\[30286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.134.224
Jun 30 15:19:22 OPSO sshd\[30286\]: Failed password for invalid user enrique from 49.235.134.224 port 56250 ssh2
2020-06-30 21:28:06
95.106.173.225 attackspam
Tried our host z.
2020-06-30 21:09:34
46.105.29.59 attackbots
Jun 30 14:24:44 vm0 sshd[9374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.59
Jun 30 14:24:46 vm0 sshd[9374]: Failed password for invalid user 123456789 from 46.105.29.59 port 34776 ssh2
...
2020-06-30 21:14:03
145.255.31.188 attackspambots
$f2bV_matches
2020-06-30 20:50:23
104.131.231.109 attackspam
*Port Scan* detected from 104.131.231.109 (US/United States/New York/New York/-). 4 hits in the last 211 seconds
2020-06-30 20:52:28

最近上报的IP列表

175.111.131.86 94.247.58.201 175.111.131.190 212.112.151.95
5.8.184.151 116.102.36.197 110.78.156.6 92.32.88.68
177.37.199.130 139.190.42.199 41.109.179.206 130.61.123.41
178.236.35.42 37.145.190.72 202.101.116.160 125.160.66.195
203.207.58.199 200.68.139.39 174.253.140.176 183.87.215.100