This IP address has been reported a total of 11,734
times from 1,370 distinct
sources.
113.106.63.54 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
This IP address carried out 119 port scanning attempts on 17-03-2025. For more information or to rep ... show moreThis IP address carried out 119 port scanning attempts on 17-03-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
This IP address carried out 20 SSH credential attack (attempts) on 17-03-2025. For more information ... show moreThis IP address carried out 20 SSH credential attack (attempts) on 17-03-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
2025-03-17T08:12:57.682563+00:00 mapir-proxmox sshd[1427657]: Failed password for root from 113.106. ... show more2025-03-17T08:12:57.682563+00:00 mapir-proxmox sshd[1427657]: Failed password for root from 113.106.63.54 port 2132 ssh2
2025-03-17T08:13:25.382465+00:00 mapir-proxmox sshd[1431534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.106.63.54 user=root
2025-03-17T08:13:27.249038+00:00 mapir-proxmox sshd[1431534]: Failed password for root from 113.106.63.54 port 2133 ssh2
... show less
Mar 17 00:57:38 server01 sshd[6102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreMar 17 00:57:38 server01 sshd[6102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.106.63.54
Mar 17 00:57:39 server01 sshd[6102]: Failed password for invalid user Root from 113.106.63.54 port 2177 ssh2
Mar 17 00:58:48 server01 sshd[6140]: Failed password for root from 113.106.63.54 port 2178 ssh2
... show less
Mar 17 00:32:08 server01 sshd[4497]: Failed password for root from 113.106.63.54 port 2155 ssh2<br / ... show moreMar 17 00:32:08 server01 sshd[4497]: Failed password for root from 113.106.63.54 port 2155 ssh2
Mar 17 00:33:22 server01 sshd[4529]: Failed password for root from 113.106.63.54 port 2156 ssh2
... show less
Mar 17 06:56:48 wworkflows sshd[3302102]: Failed password for root from 113.106.63.54 port 2176 ssh2 ... show moreMar 17 06:56:48 wworkflows sshd[3302102]: Failed password for root from 113.106.63.54 port 2176 ssh2
Mar 17 06:56:46 wworkflows sshd[3302102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.106.63.54 user=root
Mar 17 06:56:48 wworkflows sshd[3302102]: Failed password for root from 113.106.63.54 port 2176 ssh2
... show less
This IP address carried out 122 port scanning attempts on 16-03-2025. For more information or to rep ... show moreThis IP address carried out 122 port scanning attempts on 16-03-2025. For more information or to report interesting / incorrect findings, give me a shoutout @parthmaniar on Twitter. show less
Mar 17 06:38:45 wworkflows sshd[3299861]: Failed password for root from 113.106.63.54 port 2163 ssh2 ... show moreMar 17 06:38:45 wworkflows sshd[3299861]: Failed password for root from 113.106.63.54 port 2163 ssh2
Mar 17 06:40:13 wworkflows sshd[3300107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.106.63.54 user=root
Mar 17 06:40:16 wworkflows sshd[3300107]: Failed password for root from 113.106.63.54 port 2164 ssh2
... show less