This IP address has been reported a total of 1,228
times from 465 distinct
sources.
106.52.93.130 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Nov 30 03:08:57 cow sshd[3936814]: Failed password for invalid user kadek from 106.52.93.130 port 59 ... show moreNov 30 03:08:57 cow sshd[3936814]: Failed password for invalid user kadek from 106.52.93.130 port 59100 ssh2
Nov 30 03:11:08 cow sshd[3938253]: Invalid user lara from 106.52.93.130 port 56776
Nov 30 03:11:08 cow sshd[3938253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
Nov 30 03:11:10 cow sshd[3938253]: Failed password for invalid user lara from 106.52.93.130 port 56776 ssh2
Nov 30 03:13:08 cow sshd[3939577]: Invalid user sona from 106.52.93.130 port 52426
... show less
Nov 30 02:09:58 jumphost sshd[72289]: Connection from 106.52.93.130 port 37930 on 192.168.1.4 port 2 ... show moreNov 30 02:09:58 jumphost sshd[72289]: Connection from 106.52.93.130 port 37930 on 192.168.1.4 port 22 rdomain ""
Nov 30 02:09:59 jumphost sshd[72289]: Invalid user lara from 106.52.93.130 port 37930
... show less
ThreatBook Intelligence: Scanner,Zombie more details on https://threatbook.io/ip/106.52.93.130
Brute-Force
Anonymous
Nov 29 05:02:33 203-66-73-2 sshd[2056048]: Invalid user surf from 106.52.93.130 port 58746
Nov ... show moreNov 29 05:02:33 203-66-73-2 sshd[2056048]: Invalid user surf from 106.52.93.130 port 58746
Nov 29 05:02:36 203-66-73-2 sshd[2056048]: Failed password for invalid user surf from 106.52.93.130 port 58746 ssh2
Nov 29 05:05:13 203-66-73-2 sshd[2056090]: Invalid user kds from 106.52.93.130 port 54884
... show less
Nov 28 21:56:29 mail sshd[1720933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreNov 28 21:56:29 mail sshd[1720933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
Nov 28 21:56:31 mail sshd[1720933]: Failed password for invalid user surf from 106.52.93.130 port 39110 ssh2
Nov 28 22:03:54 mail sshd[1722728]: Invalid user kds from 106.52.93.130 port 41574
... show less
2023-11-28T19:39:40.624996+00:00 bluefire sshd[490146]: pam_unix(sshd:auth): authentication failure; ... show more2023-11-28T19:39:40.624996+00:00 bluefire sshd[490146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
2023-11-28T19:39:42.882258+00:00 bluefire sshd[490146]: Failed password for invalid user user from 106.52.93.130 port 47298 ssh2
2023-11-28T19:42:08.449831+00:00 bluefire sshd[491190]: Invalid user user22 from 106.52.93.130 port 40114
... show less
Nov 28 20:33:22 www sshd\[43317\]: Invalid user zoom from 106.52.93.130Nov 28 20:33:23 www sshd\[433 ... show moreNov 28 20:33:22 www sshd\[43317\]: Invalid user zoom from 106.52.93.130Nov 28 20:33:23 www sshd\[43317\]: Failed password for invalid user zoom from 106.52.93.130 port 54524 ssh2Nov 28 20:34:42 www sshd\[43335\]: Invalid user rogerio from 106.52.93.130
... show less
Nov 28 20:13:59 www sshd\[43089\]: Failed password for manager from 106.52.93.130 port 44080 ssh2Nov ... show moreNov 28 20:13:59 www sshd\[43089\]: Failed password for manager from 106.52.93.130 port 44080 ssh2Nov 28 20:17:55 www sshd\[43122\]: Invalid user marcel from 106.52.93.130Nov 28 20:17:57 www sshd\[43122\]: Failed password for invalid user marcel from 106.52.93.130 port 57502 ssh2
... show less