This IP address has been reported a total of 2,983
times from 834 distinct
sources.
106.52.93.130 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Jul 28 23:32:55 Xenoserver sshd[3085926]: Invalid user admin from 106.52.93.130 port 59516
Jul ... show moreJul 28 23:32:55 Xenoserver sshd[3085926]: Invalid user admin from 106.52.93.130 port 59516
Jul 28 23:33:50 Xenoserver sshd[3086214]: Invalid user testmail from 106.52.93.130 port 43738
Jul 28 23:35:16 Xenoserver sshd[3089179]: Invalid user sftptest1 from 106.52.93.130 port 34202
... show less
Jul 28 20:10:11 Assets-ubuntu-sfo3a sshd[623766]: Invalid user es from 106.52.93.130 port 48614<br / ... show moreJul 28 20:10:11 Assets-ubuntu-sfo3a sshd[623766]: Invalid user es from 106.52.93.130 port 48614
Jul 28 20:10:52 Assets-ubuntu-sfo3a sshd[623768]: Invalid user ubuntu from 106.52.93.130 port 60362
Jul 28 20:12:54 Assets-ubuntu-sfo3a sshd[623798]: Invalid user postgres from 106.52.93.130 port 37410
... show less
2024-07-28T22:05:38.153824+02:00 api sshd[1566779]: Invalid user testuser from 106.52.93.130 port 33 ... show more2024-07-28T22:05:38.153824+02:00 api sshd[1566779]: Invalid user testuser from 106.52.93.130 port 33932
2024-07-28T22:05:38.156643+02:00 api sshd[1566779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
2024-07-28T22:05:40.261578+02:00 api sshd[1566779]: Failed password for invalid user testuser from 106.52.93.130 port 33932 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-07-28T22:01:24.751962 - sshd[3540461]: pam_unix(sshd:auth): authentication failure; logname= ui ... show more2024-07-28T22:01:24.751962 - sshd[3540461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130 user=root
2024-07-28T22:01:26.322147 - sshd[3540461]: Failed password for root from 106.52.93.130 port 58966 ssh2
2024-07-28T22:02:37.040989 - sshd[3540467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130 user=root
2024-07-28T22:02:38.630059 - sshd[3540467]: Failed password for root from 106.52.93.130 port 42178 ssh2
2024-07-28T22:05:07.556420 - sshd[3540482]: Invalid user testuser from 106.52.93.130 port 36912
... show less
2024-07-28T17:40:12.821541Z 6ff238ef99fc New connection: 106.52.93.130:34622 (10.89.0.2:2222) [sessi ... show more2024-07-28T17:40:12.821541Z 6ff238ef99fc New connection: 106.52.93.130:34622 (10.89.0.2:2222) [session: 6ff238ef99fc]
2024-07-28T17:47:47.237186Z 4de041e1fcf8 New connection: 106.52.93.130:56372 (10.89.0.2:2222) [session: 4de041e1fcf8] show less
2024-07-28T20:16:55.739861 chaos.ohost.bg sshd[3294928]: Invalid user deploy from 106.52.93.130 port ... show more2024-07-28T20:16:55.739861 chaos.ohost.bg sshd[3294928]: Invalid user deploy from 106.52.93.130 port 41080
2024-07-28T20:18:39.702454 chaos.ohost.bg sshd[3330868]: Invalid user admin from 106.52.93.130 port 36330
2024-07-28T20:23:15.680010 chaos.ohost.bg sshd[3429306]: Invalid user ubuntu from 106.52.93.130 port 50164
2024-07-28T20:23:58.802626 chaos.ohost.bg sshd[3444706]: Invalid user ubuntu from 106.52.93.130 port 33640
2024-07-28T20:25:35.705283 chaos.ohost.bg sshd[3481139]: Invalid user deploy from 106.52.93.130 port 57078
... show less
2024-07-28T04:27:08.543109-07:00 RoblOcean sshd-session[1613182]: Invalid user ubuntu from 106.52.93 ... show more2024-07-28T04:27:08.543109-07:00 RoblOcean sshd-session[1613182]: Invalid user ubuntu from 106.52.93.130 port 41576
2024-07-28T04:30:59.270201-07:00 RoblOcean sshd-session[1614123]: Invalid user ftpuser1 from 106.52.93.130 port 45630
2024-07-28T04:31:38.951795-07:00 RoblOcean sshd-session[1614264]: Invalid user student7 from 106.52.93.130 port 55732
2024-07-28T04:32:17.460460-07:00 RoblOcean sshd-session[1614408]: Invalid user abc from 106.52.93.130 port 37578
2024-07-28T04:34:15.225560-07:00 RoblOcean sshd-session[1614905]: Invalid user deploy from 106.52.93.130 port 39614
... show less
Jul 28 04:32:16 buttnugget sshd[1388651]: Invalid user demo from 106.52.93.130 port 36204
Jul ... show moreJul 28 04:32:16 buttnugget sshd[1388651]: Invalid user demo from 106.52.93.130 port 36204
Jul 28 04:40:25 buttnugget sshd[1392668]: Invalid user deploy from 106.52.93.130 port 55330
Jul 28 04:41:21 buttnugget sshd[1393154]: Invalid user test from 106.52.93.130 port 41506
... show less
2024-07-28T10:00:11.578411+02:00 kittycat sshd-session[932346]: Failed password for root from 106.52 ... show more2024-07-28T10:00:11.578411+02:00 kittycat sshd-session[932346]: Failed password for root from 106.52.93.130 port 58138 ssh2
2024-07-28T10:01:10.325135+02:00 kittycat sshd-session[932520]: Connection from 106.52.93.130 port 44414 on 144.91.110.176 port 22 rdomain ""
2024-07-28T10:01:11.672017+02:00 kittycat sshd-session[932520]: Invalid user test from 106.52.93.130 port 44414
2024-07-28T10:01:11.679696+02:00 kittycat sshd-session[932520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
2024-07-28T10:01:13.554916+02:00 kittycat sshd-session[932520]: Failed password for invalid user test from 106.52.93.130 port 44414 ssh2
... show less