必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): Beijing Baidu Netcom Science and Technology Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Search Engine Spider

用户上报:
类型 评论内容 时间
attack
2020-05-29T05:52:41.816628sd-86998 sshd[37195]: Invalid user ts from 106.13.160.12 port 52176
2020-05-29T05:52:41.818832sd-86998 sshd[37195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.160.12
2020-05-29T05:52:41.816628sd-86998 sshd[37195]: Invalid user ts from 106.13.160.12 port 52176
2020-05-29T05:52:44.129109sd-86998 sshd[37195]: Failed password for invalid user ts from 106.13.160.12 port 52176 ssh2
2020-05-29T05:56:28.703662sd-86998 sshd[38337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.160.12  user=root
2020-05-29T05:56:30.843582sd-86998 sshd[38337]: Failed password for root from 106.13.160.12 port 48740 ssh2
...
2020-05-29 12:04:03
attack
fail2ban -- 106.13.160.12
...
2020-05-01 15:12:18
相同子网IP讨论:
IP 类型 评论内容 时间
106.13.160.127 attackspam
" "
2020-08-20 23:00:33
106.13.160.55 attackspambots
Aug 18 06:55:35 main sshd[10787]: Failed password for invalid user sk from 106.13.160.55 port 33390 ssh2
Aug 18 08:37:50 main sshd[12135]: Failed password for invalid user dai from 106.13.160.55 port 55038 ssh2
Aug 18 08:49:50 main sshd[12409]: Failed password for invalid user admin from 106.13.160.55 port 35590 ssh2
Aug 18 09:13:18 main sshd[12899]: Failed password for invalid user bram from 106.13.160.55 port 53150 ssh2
Aug 18 09:36:06 main sshd[13343]: Failed password for invalid user zhangfei from 106.13.160.55 port 42474 ssh2
2020-08-19 04:21:39
106.13.160.127 attackbots
SSH Invalid Login
2020-08-17 05:57:27
106.13.160.127 attack
IP blocked
2020-08-15 07:06:24
106.13.160.55 attackbots
Aug 10 13:07:00 vm0 sshd[352]: Failed password for root from 106.13.160.55 port 54960 ssh2
...
2020-08-10 21:01:29
106.13.160.249 attack
[ssh] SSH attack
2020-08-10 04:53:37
106.13.160.127 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-08T15:16:09Z and 2020-08-08T15:23:25Z
2020-08-09 02:21:04
106.13.160.249 attack
Jul 31 03:51:22 ws26vmsma01 sshd[154666]: Failed password for root from 106.13.160.249 port 55736 ssh2
...
2020-07-31 12:52:11
106.13.160.127 attackbots
Jul 30 05:57:46 *hidden* sshd[49338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.160.127 Jul 30 05:57:47 *hidden* sshd[49338]: Failed password for invalid user srs from 106.13.160.127 port 43786 ssh2 Jul 30 06:06:16 *hidden* sshd[49526]: Invalid user capture from 106.13.160.127 port 42794
2020-07-30 12:53:36
106.13.160.127 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-24 03:52:59
106.13.160.127 attackbotsspam
Jul 17 14:34:26 master sshd[13619]: Failed password for invalid user henk from 106.13.160.127 port 59044 ssh2
Jul 17 14:37:27 master sshd[13627]: Failed password for invalid user apt-mirror from 106.13.160.127 port 33706 ssh2
Jul 17 14:39:32 master sshd[13672]: Failed password for invalid user stephen from 106.13.160.127 port 56784 ssh2
Jul 17 14:41:26 master sshd[13716]: Failed password for invalid user wc from 106.13.160.127 port 51632 ssh2
Jul 17 14:43:29 master sshd[13726]: Failed password for invalid user kai from 106.13.160.127 port 46480 ssh2
Jul 17 14:45:22 master sshd[13773]: Failed password for invalid user ftpuser from 106.13.160.127 port 41328 ssh2
Jul 17 14:47:16 master sshd[13781]: Failed password for invalid user fuser1 from 106.13.160.127 port 36174 ssh2
Jul 17 14:49:11 master sshd[13793]: Failed password for invalid user filo from 106.13.160.127 port 59250 ssh2
Jul 17 14:51:10 master sshd[13843]: Failed password for invalid user laura from 106.13.160.127 port 54096 ssh2
2020-07-17 23:10:43
106.13.160.55 attack
Invalid user park from 106.13.160.55 port 52126
2020-07-12 03:53:12
106.13.160.249 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 100 - port: 17899 proto: TCP cat: Misc Attack
2020-07-11 05:09:47
106.13.160.14 attackbots
Jun 30 22:02:19 ns382633 sshd\[4291\]: Invalid user caj from 106.13.160.14 port 41528
Jun 30 22:02:19 ns382633 sshd\[4291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.160.14
Jun 30 22:02:21 ns382633 sshd\[4291\]: Failed password for invalid user caj from 106.13.160.14 port 41528 ssh2
Jun 30 22:08:49 ns382633 sshd\[5251\]: Invalid user robert from 106.13.160.14 port 60564
Jun 30 22:08:49 ns382633 sshd\[5251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.160.14
2020-07-02 03:27:00
106.13.160.127 attackbots
Multiple SSH authentication failures from 106.13.160.127
2020-07-01 22:20:29
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.160.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44076
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.13.160.12.			IN	A

;; AUTHORITY SECTION:
.			367	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 15:12:11 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 12.160.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.160.13.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.22.196.100 attackspambots
Nov 29 11:05:43 lnxded63 sshd[20896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.22.196.100
2019-11-29 18:31:04
117.169.38.69 attack
Nov 28 23:13:35 php1 sshd\[20597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.169.38.69  user=root
Nov 28 23:13:37 php1 sshd\[20597\]: Failed password for root from 117.169.38.69 port 54566 ssh2
Nov 28 23:18:29 php1 sshd\[20989\]: Invalid user squid from 117.169.38.69
Nov 28 23:18:29 php1 sshd\[20989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.169.38.69
Nov 28 23:18:32 php1 sshd\[20989\]: Failed password for invalid user squid from 117.169.38.69 port 55624 ssh2
2019-11-29 18:26:29
92.63.194.148 attack
11/29/2019-08:22:37.049216 92.63.194.148 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-29 18:15:34
121.15.2.178 attack
Nov 29 10:40:21 ncomp sshd[26582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.2.178  user=root
Nov 29 10:40:24 ncomp sshd[26582]: Failed password for root from 121.15.2.178 port 35750 ssh2
Nov 29 10:49:59 ncomp sshd[26695]: Invalid user ardith from 121.15.2.178
2019-11-29 18:28:24
182.61.170.251 attackbotsspam
(sshd) Failed SSH login from 182.61.170.251 (-): 5 in the last 3600 secs
2019-11-29 18:16:17
82.237.6.67 attack
Nov 24 03:32:41 mh1361109 sshd[15878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.237.6.67  user=r.r
Nov 24 03:32:43 mh1361109 sshd[15878]: Failed password for r.r from 82.237.6.67 port 49898 ssh2
Nov 24 03:56:48 mh1361109 sshd[18089]: Invalid user test123 from 82.237.6.67
Nov 24 03:56:48 mh1361109 sshd[18089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.237.6.67
Nov 24 03:56:50 mh1361109 sshd[18089]: Failed password for invalid user test123 from 82.237.6.67 port 44524 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.237.6.67
2019-11-29 18:46:09
182.61.4.60 attack
Nov 28 20:19:22 web9 sshd\[19433\]: Invalid user 555555 from 182.61.4.60
Nov 28 20:19:22 web9 sshd\[19433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.4.60
Nov 28 20:19:23 web9 sshd\[19433\]: Failed password for invalid user 555555 from 182.61.4.60 port 41850 ssh2
Nov 28 20:23:21 web9 sshd\[19957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.4.60  user=backup
Nov 28 20:23:24 web9 sshd\[19957\]: Failed password for backup from 182.61.4.60 port 47550 ssh2
2019-11-29 18:46:53
191.7.14.56 attack
191.7.14.56 - - \[29/Nov/2019:07:23:31 +0100\] "POST /editBlackAndWhiteList HTTP/1.1\\n" 400 0 "-" "-"
2019-11-29 18:42:18
99.90.93.80 attack
RDP Bruteforce
2019-11-29 18:15:07
67.225.188.144 attackbots
US from host.advocatemag.com [67.225.188.144]:32912
2019-11-29 18:24:09
36.67.197.52 attackbotsspam
Nov 29 11:18:35 MK-Soft-VM6 sshd[3774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.197.52 
Nov 29 11:18:37 MK-Soft-VM6 sshd[3774]: Failed password for invalid user nf from 36.67.197.52 port 51552 ssh2
...
2019-11-29 18:19:05
193.188.22.229 attack
Nov 29 10:59:48 host sshd[50792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.229  user=daemon
Nov 29 10:59:51 host sshd[50792]: Failed password for daemon from 193.188.22.229 port 23417 ssh2
...
2019-11-29 18:27:37
58.246.187.102 attack
2019-11-29T00:08:49.3054901495-001 sshd\[13694\]: Failed password for root from 58.246.187.102 port 41600 ssh2
2019-11-29T01:09:01.9791091495-001 sshd\[16010\]: Invalid user carlo from 58.246.187.102 port 14912
2019-11-29T01:09:01.9874901495-001 sshd\[16010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.187.102
2019-11-29T01:09:04.4377321495-001 sshd\[16010\]: Failed password for invalid user carlo from 58.246.187.102 port 14912 ssh2
2019-11-29T01:12:58.9719591495-001 sshd\[16184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.187.102  user=root
2019-11-29T01:13:00.6246511495-001 sshd\[16184\]: Failed password for root from 58.246.187.102 port 32544 ssh2
...
2019-11-29 18:27:05
150.136.152.237 attack
Nov 29 06:39:06 XXX sshd[15480]: Did not receive identification string from 150.136.152.237
Nov 29 06:39:22 XXX sshd[15481]: User r.r from 150.136.152.237 not allowed because none of user's groups are listed in AllowGroups
Nov 29 06:39:22 XXX sshd[15481]: Received disconnect from 150.136.152.237: 11: Normal Shutdown, Thank you for playing [preauth]
Nov 29 06:39:22 XXX sshd[15483]: User r.r from 150.136.152.237 not allowed because none of user's groups are listed in AllowGroups
Nov 29 06:39:22 XXX sshd[15483]: Received disconnect from 150.136.152.237: 11: Normal Shutdown, Thank you for playing [preauth]
Nov 29 06:39:24 XXX sshd[15485]: User r.r from 150.136.152.237 not allowed because none of user's groups are listed in AllowGroups
Nov 29 06:39:25 XXX sshd[15485]: Received disconnect from 150.136.152.237: 11: Normal Shutdown, Thank you for playing [preauth]
Nov 29 06:39:26 XXX sshd[15487]: User r.r from 150.136.152.237 not allowed because none of user's groups are listed........
-------------------------------
2019-11-29 18:33:50
164.52.24.167 attackbots
Automatic report - Banned IP Access
2019-11-29 18:26:08

最近上报的IP列表

44.68.159.190 163.151.251.252 211.115.83.215 131.100.249.64
8.194.161.85 130.56.134.240 220.94.197.6 116.40.216.72
106.12.149.196 55.187.177.184 158.209.100.54 80.193.218.230
218.253.134.195 55.78.243.209 98.175.112.89 49.84.144.180
58.11.86.248 45.2.91.185 204.152.122.231 211.172.122.70