This IP address has been reported a total of 2,985
times from 836 distinct
sources.
106.52.93.130 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2024-08-10T22:15:16.401487+02:00 main sshd[2147927]: Failed password for invalid user openwrt from 1 ... show more2024-08-10T22:15:16.401487+02:00 main sshd[2147927]: Failed password for invalid user openwrt from 106.52.93.130 port 42322 ssh2
2024-08-10T22:20:27.550266+02:00 main sshd[2152030]: Invalid user adonix from 106.52.93.130 port 52722
2024-08-10T22:20:27.552406+02:00 main sshd[2152030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
2024-08-10T22:20:30.167306+02:00 main sshd[2152030]: Failed password for invalid user adonix from 106.52.93.130 port 52722 ssh2
2024-08-10T22:25:46.424081+02:00 main sshd[2156201]: Invalid user temp from 106.52.93.130 port 50774
... show less
Aug 10 21:40:10 mail sshd[2675102]: Failed password for invalid user albert from 106.52.93.130 port ... show moreAug 10 21:40:10 mail sshd[2675102]: Failed password for invalid user albert from 106.52.93.130 port 52996 ssh2
Aug 10 21:43:58 mail sshd[2675275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130 user=root
Aug 10 21:44:00 mail sshd[2675275]: Failed password for root from 106.52.93.130 port 57418 ssh2
... show less
Brute-ForceSSH
Anonymous
Aug 10 18:18:01 ubuntu sshd[2369636]: Invalid user cristian from 106.52.93.130 port 55216
Aug ... show moreAug 10 18:18:01 ubuntu sshd[2369636]: Invalid user cristian from 106.52.93.130 port 55216
Aug 10 18:27:55 ubuntu sshd[2375707]: Invalid user lin from 106.52.93.130 port 54840
Aug 10 18:29:22 ubuntu sshd[2376519]: Invalid user blg from 106.52.93.130 port 40558
... show less
Aug 10 15:48:57 de-dus1-icmp1 sshd[3306588]: Invalid user yhchen from 106.52.93.130 port 37706 ... show moreAug 10 15:48:57 de-dus1-icmp1 sshd[3306588]: Invalid user yhchen from 106.52.93.130 port 37706
Aug 10 15:57:00 de-dus1-icmp1 sshd[3306619]: Invalid user hdfs from 106.52.93.130 port 47068
Aug 10 16:03:08 de-dus1-icmp1 sshd[3306904]: Invalid user chris from 106.52.93.130 port 45274
... show less
2024-08-10T17:00:24.909863+02:00 vm-197198 sshd[378702]: Invalid user rutorrent from 106.52.93.130 p ... show more2024-08-10T17:00:24.909863+02:00 vm-197198 sshd[378702]: Invalid user rutorrent from 106.52.93.130 port 38470
2024-08-10T17:01:14.442962+02:00 vm-197198 sshd[378715]: Connection from 106.52.93.130 port 48796 on 95.138.193.99 port 22 rdomain ""
2024-08-10T17:01:15.536554+02:00 vm-197198 sshd[378715]: Invalid user desarrollo from 106.52.93.130 port 48796
... show less
2024-08-10T12:44:54.331657+00:00 archlinux sshd-session[33498]: error: maximum authentication attemp ... show more2024-08-10T12:44:54.331657+00:00 archlinux sshd-session[33498]: error: maximum authentication attempts exceeded for root from 106.52.93.130 port 56566 ssh2 [preauth]
2024-08-10T12:46:35.042898+00:00 archlinux sshd-session[33512]: Connection from 106.52.93.130 port 53868 on 172.29.246.25 port 22 rdomain ""
2024-08-10T12:46:35.313046+00:00 archlinux sshd-session[33512]: Invalid user maddie from 106.52.93.130 port 53868
2024-08-10T12:46:35.318368+00:00 archlinux sshd-session[33512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
2024-08-10T12:46:37.590485+00:00 archlinux sshd-session[33512]: Failed password for invalid user maddie from 106.52.93.130 port 53868 ssh2
2024-08-10T12:46:39.749187+00:00 archlinux sshd-session[33512]: error: maximum authentication attempts exceeded for invalid user maddie from 106.52.93.130 port 53868 ssh2 [preauth]
2024-08-10T12:47:30.629839+00:00 archlinux sshd-session[33528]: Connection from 106.52.93.130
... show less
2024-08-10T13:16:00.942009+02:00 berohost-6c24g sshd[7128]: Invalid user zjy from 106.52.93.130 port ... show more2024-08-10T13:16:00.942009+02:00 berohost-6c24g sshd[7128]: Invalid user zjy from 106.52.93.130 port 48866
2024-08-10T13:16:00.943753+02:00 berohost-6c24g sshd[7128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
2024-08-10T13:16:02.613706+02:00 berohost-6c24g sshd[7128]: Failed password for invalid user zjy from 106.52.93.130 port 48866 ssh2
2024-08-10T13:17:01.730405+02:00 berohost-6c24g sshd[8073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130 user=root
2024-08-10T13:17:03.440283+02:00 berohost-6c24g sshd[8073]: Failed password for root from 106.52.93.130 port 34754 ssh2
... show less
[rede-164-29] (sshd) Failed SSH login from 106.52.93.130 (CN/China/-): 5 in the last 3600 secs; Port ... show more[rede-164-29] (sshd) Failed SSH login from 106.52.93.130 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 10 08:07:26 sshd[5842]: Invalid user [USERNAME] from 106.52.93.130 port 35472
Aug 10 08:07:29 sshd[5842]: Failed password for invalid user [USERNAME] from 106.52.93.130 port 35472 ssh2
Aug 10 08:15:46 sshd[6011]: Invalid user [USERNAME] from 106.52.93.130 port 40930
Aug 10 08:15:47 sshd[6011]: Failed password for invalid user [USERNAME] from 106.52.93.130 port 40930 ssh2
Aug 10 08:16:46 sshd[6031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52 show less
sshd[520099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos ... show moresshd[520099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130 user=root
sshd[520099]: Failed password for root from 106.52.93.130 port 60708 ssh2
sshd[536163]: Invalid user satellite from 106.52.93.130 port 34774
sshd[536163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
sshd[536163]: Failed password for invalid user satellite from 106.52.93.130 port 34774 ssh2 show less