This IP address has been reported a total of 180 times from 48 distinct sources.
106.13.49.221 was first reported on , and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Dec 4 00:23:01 ncomp sshd[2453]: Invalid user teddy from 106.13.49.221
Dec 4 00:23:01 ncomp ... show moreDec 4 00:23:01 ncomp sshd[2453]: Invalid user teddy from 106.13.49.221
Dec 4 00:23:01 ncomp sshd[2453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 4 00:23:01 ncomp sshd[2453]: Invalid user teddy from 106.13.49.221
Dec 4 00:23:04 ncomp sshd[2453]: Failed password for invalid user teddy from 106.13.49.221 port 52828 ssh2 show less
Dec 3 02:23:32 server sshd\[8891\]: Failed password for invalid user nfs from 106.13.49.221 port 37 ... show moreDec 3 02:23:32 server sshd\[8891\]: Failed password for invalid user nfs from 106.13.49.221 port 37244 ssh2
Dec 3 13:33:39 server sshd\[27760\]: Invalid user greszczuk from 106.13.49.221
Dec 3 13:33:39 server sshd\[27760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 3 13:33:40 server sshd\[27760\]: Failed password for invalid user greszczuk from 106.13.49.221 port 56308 ssh2
Dec 3 13:58:43 server sshd\[958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221 user=root
... show less
Dec 3 08:58:24 MainVPS sshd[8235]: Invalid user dx from 106.13.49.221 port 35912
Dec 3 08:58 ... show moreDec 3 08:58:24 MainVPS sshd[8235]: Invalid user dx from 106.13.49.221 port 35912
Dec 3 08:58:24 MainVPS sshd[8235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 3 08:58:24 MainVPS sshd[8235]: Invalid user dx from 106.13.49.221 port 35912
Dec 3 08:58:26 MainVPS sshd[8235]: Failed password for invalid user dx from 106.13.49.221 port 35912 ssh2
Dec 3 09:04:01 MainVPS sshd[18295]: Invalid user rpc from 106.13.49.221 port 32992
... show less
Dec 3 06:47:21 MainVPS sshd[368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid= ... show moreDec 3 06:47:21 MainVPS sshd[368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221 user=games
Dec 3 06:47:23 MainVPS sshd[368]: Failed password for games from 106.13.49.221 port 43770 ssh2
Dec 3 06:54:12 MainVPS sshd[12490]: Invalid user fafara from 106.13.49.221 port 40880
Dec 3 06:54:12 MainVPS sshd[12490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 3 06:54:12 MainVPS sshd[12490]: Invalid user fafara from 106.13.49.221 port 40880
Dec 3 06:54:14 MainVPS sshd[12490]: Failed password for invalid user fafara from 106.13.49.221 port 40880 ssh2
... show less
Dec 3 02:11:00 server sshd\[5874\]: Invalid user guest from 106.13.49.221
Dec 3 02:11:00 ser ... show moreDec 3 02:11:00 server sshd\[5874\]: Invalid user guest from 106.13.49.221
Dec 3 02:11:00 server sshd\[5874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 3 02:11:02 server sshd\[5874\]: Failed password for invalid user guest from 106.13.49.221 port 35170 ssh2
Dec 3 02:23:30 server sshd\[8891\]: Invalid user nfs from 106.13.49.221
Dec 3 02:23:30 server sshd\[8891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
... show less
2019-12-02T17:11:21.340369abusebot.cloudsearch.cf sshd\[20261\]: Invalid user web from 106.13.49.221 ... show more2019-12-02T17:11:21.340369abusebot.cloudsearch.cf sshd\[20261\]: Invalid user web from 106.13.49.221 port 55584 show less
Dec 2 06:15:49 Tower sshd[34929]: Connection from 106.13.49.221 port 46854 on 192.168.10.220 port 2 ... show moreDec 2 06:15:49 Tower sshd[34929]: Connection from 106.13.49.221 port 46854 on 192.168.10.220 port 22
Dec 2 06:15:50 Tower sshd[34929]: Invalid user tatge from 106.13.49.221 port 46854
Dec 2 06:15:50 Tower sshd[34929]: error: Could not get shadow information for NOUSER
Dec 2 06:15:50 Tower sshd[34929]: Failed password for invalid user tatge from 106.13.49.221 port 46854 ssh2
Dec 2 06:15:51 Tower sshd[34929]: Received disconnect from 106.13.49.221 port 46854:11: Bye Bye [preauth]
Dec 2 06:15:51 Tower sshd[34929]: Disconnected from invalid user tatge 106.13.49.221 port 46854 [preauth] show less
Brute-ForceSSH
Anonymous
Dec 1 18:37:19 hpm sshd\[11600\]: Invalid user wpyan from 106.13.49.221
Dec 1 18:37:19 hpm s ... show moreDec 1 18:37:19 hpm sshd\[11600\]: Invalid user wpyan from 106.13.49.221
Dec 1 18:37:19 hpm sshd\[11600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 1 18:37:22 hpm sshd\[11600\]: Failed password for invalid user wpyan from 106.13.49.221 port 38264 ssh2
Dec 1 18:44:32 hpm sshd\[12522\]: Invalid user test from 106.13.49.221
Dec 1 18:44:32 hpm sshd\[12522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221 show less
Brute-ForceSSH
Anonymous
Dec 1 18:03:26 hpm sshd\[7685\]: Invalid user test from 106.13.49.221
Dec 1 18:03:26 hpm ssh ... show moreDec 1 18:03:26 hpm sshd\[7685\]: Invalid user test from 106.13.49.221
Dec 1 18:03:26 hpm sshd\[7685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 1 18:03:28 hpm sshd\[7685\]: Failed password for invalid user test from 106.13.49.221 port 49960 ssh2
Dec 1 18:10:16 hpm sshd\[8556\]: Invalid user conciergerie from 106.13.49.221
Dec 1 18:10:16 hpm sshd\[8556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221 show less
Brute-ForceSSH
Anonymous
Dec 1 17:39:52 hpm sshd\[5042\]: Invalid user admin from 106.13.49.221
Dec 1 17:39:52 hpm ss ... show moreDec 1 17:39:52 hpm sshd\[5042\]: Invalid user admin from 106.13.49.221
Dec 1 17:39:52 hpm sshd\[5042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 1 17:39:54 hpm sshd\[5042\]: Failed password for invalid user admin from 106.13.49.221 port 39976 ssh2
Dec 1 17:46:47 hpm sshd\[5807\]: Invalid user cplus from 106.13.49.221
Dec 1 17:46:47 hpm sshd\[5807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221 show less
Brute-ForceSSH
Anonymous
Dec 1 17:20:31 hpm sshd\[2831\]: Invalid user prod from 106.13.49.221
Dec 1 17:20:31 hpm ssh ... show moreDec 1 17:20:31 hpm sshd\[2831\]: Invalid user prod from 106.13.49.221
Dec 1 17:20:31 hpm sshd\[2831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221
Dec 1 17:20:33 hpm sshd\[2831\]: Failed password for invalid user prod from 106.13.49.221 port 58304 ssh2
Dec 1 17:27:25 hpm sshd\[3561\]: Invalid user admin from 106.13.49.221
Dec 1 17:27:25 hpm sshd\[3561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.221 show less