This IP address has been reported a total of 2,983
times from 834 distinct
sources.
106.52.93.130 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Aug 3 03:26:40 accessallareas sshd[66628]: Invalid user hg from 106.52.93.130 port 46520
Aug ... show moreAug 3 03:26:40 accessallareas sshd[66628]: Invalid user hg from 106.52.93.130 port 46520
Aug 3 03:27:16 accessallareas sshd[66646]: Invalid user wss from 106.52.93.130 port 55858
Aug 3 03:27:51 accessallareas sshd[66668]: Invalid user tako from 106.52.93.130 port 36960
... show less
2024-08-02T02:42:03.229849+02:00 rma01.ch.pop.as202427.net sshd[2844094]: Invalid user mind from 106 ... show more2024-08-02T02:42:03.229849+02:00 rma01.ch.pop.as202427.net sshd[2844094]: Invalid user mind from 106.52.93.130 port 53596
2024-08-02T02:50:50.008080+02:00 rma01.ch.pop.as202427.net sshd[2845539]: Invalid user elasticsearch from 106.52.93.130 port 59186
2024-08-02T02:51:21.137607+02:00 rma01.ch.pop.as202427.net sshd[2845580]: Invalid user ajinkya from 106.52.93.130 port 38662
... show less
Aug 2 00:41:28 dagasistemas sshd[21263]: Invalid user mind from 106.52.93.130 port 40000
Aug ... show moreAug 2 00:41:28 dagasistemas sshd[21263]: Invalid user mind from 106.52.93.130 port 40000
Aug 2 00:41:28 dagasistemas sshd[21263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
Aug 2 00:41:30 dagasistemas sshd[21263]: Failed password for invalid user mind from 106.52.93.130 port 40000 ssh2
... show less
[rede-176-124] (sshd) Failed SSH login from 106.52.93.130 (CN/China/-): 5 in the last 3600 secs; Por ... show more[rede-176-124] (sshd) Failed SSH login from 106.52.93.130 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 1 20:18:41 sshd[14001]: Invalid user [USERNAME] from 106.52.93.130 port 51028
Aug 1 20:18:44 sshd[14001]: Failed password for invalid user [USERNAME] from 106.52.93.130 port 51028 ssh2
Aug 1 20:26:29 sshd[14176]: Invalid user [USERNAME] from 106.52.93.130 port 53784
Aug 1 20:26:31 sshd[14176]: Failed password for invalid user [USERNAME] from 106.52.93.130 port 53784 ssh2
Aug 1 20:32:27 sshd[14551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1 show less
Aug 1 22:35:50 VPS sshd[1020503]: Invalid user ilya from 106.52.93.130 port 33636
Aug 1 22:3 ... show moreAug 1 22:35:50 VPS sshd[1020503]: Invalid user ilya from 106.52.93.130 port 33636
Aug 1 22:35:50 VPS sshd[1020503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
Aug 1 22:35:50 VPS sshd[1020503]: Invalid user ilya from 106.52.93.130 port 33636
Aug 1 22:35:52 VPS sshd[1020503]: Failed password for invalid user ilya from 106.52.93.130 port 33636 ssh2
Aug 1 22:36:39 VPS sshd[1020555]: User root from 106.52.93.130 not allowed because not listed in AllowUsers
... show less
Aug 1 22:32:25 secure sshd[36747]: Invalid user apolo from 106.52.93.130 port 44468
Aug 1 22 ... show moreAug 1 22:32:25 secure sshd[36747]: Invalid user apolo from 106.52.93.130 port 44468
Aug 1 22:36:29 secure sshd[36769]: Invalid user yau from 106.52.93.130 port 44968
Aug 1 22:39:40 secure sshd[36789]: User root from 106.52.93.130 not allowed because not listed in AllowUsers
... show less
Aug 1 19:43:30 webhosting02 sshd[2433908]: Invalid user admin from 106.52.93.130 port 41012
A ... show moreAug 1 19:43:30 webhosting02 sshd[2433908]: Invalid user admin from 106.52.93.130 port 41012
Aug 1 19:51:34 webhosting02 sshd[2434424]: Invalid user amigo from 106.52.93.130 port 44912
Aug 1 19:52:36 webhosting02 sshd[2434490]: Invalid user szidi from 106.52.93.130 port 59546
Aug 1 19:54:30 webhosting02 sshd[2434621]: Invalid user user from 106.52.93.130 port 60566
... show less
2024-08-01T13:47:44.771590-04:00 Fubuki sshd[2586444]: Failed password for invalid user admin from 1 ... show more2024-08-01T13:47:44.771590-04:00 Fubuki sshd[2586444]: Failed password for invalid user admin from 106.52.93.130 port 46452 ssh2
2024-08-01T13:52:24.606813-04:00 Fubuki sshd[2587799]: Invalid user amigo from 106.52.93.130 port 56630
2024-08-01T13:52:24.609339-04:00 Fubuki sshd[2587799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.130
2024-08-01T13:52:26.472712-04:00 Fubuki sshd[2587799]: Failed password for invalid user amigo from 106.52.93.130 port 56630 ssh2
2024-08-01T13:53:26.173724-04:00 Fubuki sshd[2587981]: Invalid user szidi from 106.52.93.130 port 43036
... show less