This IP address has been reported a total of 2,985
times from 836 distinct
sources.
106.52.93.130 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Aug 6 02:03:45 webhook sshd[52888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreAug 6 02:03:45 webhook sshd[52888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
Aug 6 02:03:47 webhook sshd[52888]: Failed password for invalid user wd from 106.52.93.130 port 36332 ssh2
Aug 6 02:04:18 webhook sshd[52972]: Invalid user oracle from 106.52.93.130 port 41988
... show less
Brute-ForceSSH
Anonymous
Aug 6 04:03:56 mailserver sshd\[3549\]: Invalid user wd from 106.52.93.130
...
Aug 5 23:00:17 SRC=106.52.93.130 PROTO=TCP SPT=42552 DPT=22 SYN
Aug 5 23:00:18 SRC=106.52.93 ... show moreAug 5 23:00:17 SRC=106.52.93.130 PROTO=TCP SPT=42552 DPT=22 SYN
Aug 5 23:00:18 SRC=106.52.93.130 PROTO=TCP SPT=42552 DPT=22 SYN
... show less
Aug 5 02:30:54 spotterlog sshd[156029]: Invalid user mgm from 106.52.93.130 port 32876
Aug 5 ... show moreAug 5 02:30:54 spotterlog sshd[156029]: Invalid user mgm from 106.52.93.130 port 32876
Aug 5 02:43:06 spotterlog sshd[156185]: Invalid user emily from 106.52.93.130 port 60990
Aug 5 02:43:38 spotterlog sshd[156211]: Invalid user damaris from 106.52.93.130 port 38134
... show less
Aug 4 22:13:11 fusco sshd[857751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreAug 4 22:13:11 fusco sshd[857751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
Aug 4 22:13:14 fusco sshd[857751]: Failed password for invalid user test2 from 106.52.93.130 port 34850 ssh2
Aug 4 22:21:18 fusco sshd[862691]: Invalid user technical from 106.52.93.130 port 34548
... show less
Aug 5 03:07:40 honeypot sshd[14990]: Failed password for root from 106.52.93.130 port 33620 ssh2<br ... show moreAug 5 03:07:40 honeypot sshd[14990]: Failed password for root from 106.52.93.130 port 33620 ssh2
... show less
Aug 5 02:45:01 honeypot sshd[14362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreAug 5 02:45:01 honeypot sshd[14362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
... show less
Brute-ForceSSH
Anonymous
2024-08-04T21:25:38.725534+02:00 microfood-srv sshd[2972983]: Invalid user save from 106.52.93.130 p ... show more2024-08-04T21:25:38.725534+02:00 microfood-srv sshd[2972983]: Invalid user save from 106.52.93.130 port 54962
2024-08-04T21:28:14.082209+02:00 microfood-srv sshd[2974716]: Invalid user atul from 106.52.93.130 port 51718
2024-08-04T21:29:11.301964+02:00 microfood-srv sshd[2975352]: Invalid user ghost5 from 106.52.93.130 port 37952
... show less
[rede-44-49] (sshd) Failed SSH login from 106.52.93.130 (CN/China/-): 5 in the last 3600 secs; Ports ... show more[rede-44-49] (sshd) Failed SSH login from 106.52.93.130 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 4 14:38:49 sshd[16535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130 user=[USERNAME]
Aug 4 14:38:50 sshd[16535]: Failed password for [USERNAME] from 106.52.93.130 port 46218 ssh2
Aug 4 14:45:42 sshd[16859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130 user=[USERNAME]
Aug 4 14:45:44 sshd[16859]: Failed password for [USERNAME] from 106.52.93.130 port 48978 ssh2
Aug 4 14:47:0 show less
[Birdo Server] 2024-08-04T15:11:23.776561+00:00 vps-33858171 sshd[41740]: Failed password for invali ... show more[Birdo Server] 2024-08-04T15:11:23.776561+00:00 vps-33858171 sshd[41740]: Failed password for invalid user amandabackup from 106.52.93.130 port 41128 ssh2
2024-08-04T15:12:15.755947+00:00 vps-33858171 sshd[41757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130 user=root
2024-08-04T15:12:18.450568+00:00 vps-33858171 sshd[41757]: Failed password for root from 106.52.93.130 port 53270 ssh2
... show less