Go
106.12.98.12
is a
Hacker
100 %
China
Report Abuse
608attacks reported
452Brute-ForceSSH
66Brute-Force
37SSH
14FTP Brute-ForceHacking
7Web App Attack
7HackingBrute-ForceSSH
7uncategorized
5Port ScanHackingBrute-ForceWeb App AttackSSH
3Port ScanBrute-ForceSSH
1Brute-ForceSSHPort Scan
...
from 106 distinct reporters
and 7 distinct sources : BadIPs.com, Blocklist.de, FireHOL, danger.rulez.sk, Emerging Threats, darklist.de, AbuseIPDB
106.12.98.12 was first signaled at 2019-03-29 18:23 and last record was at 2019-09-26 17:01.
IP

106.12.98.12

Organization
Beijing Baidu Netcom Science and Technology Co., Ltd.
Localisation
China
Beijing, Beijing
NetRange : First & Last IP
106.12.0.0 - 106.13.255.255
Network CIDR
106.12.0.0/15

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-09-26 17:01 attacks Brute-ForceSSH AbuseIPDB Sep 27 03:55:37 meumeu sshd[28060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 03:55
2019-09-26 16:44 attacks Brute-ForceSSH AbuseIPDB Sep 27 03:38:38 meumeu sshd[25418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 03:38
2019-09-26 16:27 attacks Brute-ForceSSH AbuseIPDB Sep 27 03:21:35 meumeu sshd[22592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 03:21
2019-09-26 16:10 attacks Brute-ForceSSH AbuseIPDB Sep 27 03:04:38 meumeu sshd[15181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 03:04
2019-09-26 15:53 attacks Brute-ForceSSH AbuseIPDB Sep 27 02:47:55 meumeu sshd[10734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 02:47
2019-09-26 15:36 attacks Brute-ForceSSH AbuseIPDB Sep 27 02:31:17 meumeu sshd[6290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 02:31:
2019-09-26 15:20 attacks Brute-ForceSSH AbuseIPDB Sep 27 02:15:02 meumeu sshd[4032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 02:15:
2019-09-26 15:04 attacks Brute-ForceSSH AbuseIPDB Sep 27 01:58:57 meumeu sshd[1291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 01:58:
2019-09-26 14:48 attacks Brute-ForceSSH AbuseIPDB Sep 27 01:43:10 meumeu sshd[31415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 01:43
2019-09-26 14:32 attacks Brute-ForceSSH AbuseIPDB Sep 27 01:27:28 meumeu sshd[29093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 01:27
2019-09-26 14:17 attacks Brute-ForceSSH AbuseIPDB Sep 27 01:11:52 meumeu sshd[27003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 01:11
2019-09-26 14:01 attacks Brute-ForceSSH AbuseIPDB Sep 27 00:56:34 meumeu sshd[24781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 00:56
2019-09-26 13:46 attacks Brute-ForceSSH AbuseIPDB Sep 27 00:41:21 meumeu sshd[22430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 00:41
2019-09-26 13:26 attacks Brute-ForceSSH AbuseIPDB Sep 27 00:21:31 meumeu sshd[19430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 00:21
2019-09-26 13:06 attacks Brute-ForceSSH AbuseIPDB Sep 27 00:01:49 meumeu sshd[16646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 27 00:01
2019-09-26 12:47 attacks Brute-ForceSSH AbuseIPDB Sep 26 23:42:43 meumeu sshd[13398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 26 23:42
2019-09-26 12:28 attacks Brute-ForceSSH AbuseIPDB Sep 26 23:24:02 meumeu sshd[10267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 26 23:24
2019-09-26 12:10 attacks Brute-ForceSSH AbuseIPDB Sep 26 23:05:28 meumeu sshd[7574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 26 23:05:
2019-09-26 11:51 attacks Brute-ForceSSH AbuseIPDB Sep 26 22:46:55 meumeu sshd[4933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 26 22:46:
2019-09-26 11:33 attacks Brute-ForceSSH AbuseIPDB Sep 26 22:28:20 meumeu sshd[2180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 26 22:28:
2019-09-26 11:14 attacks Brute-ForceSSH AbuseIPDB Sep 26 22:09:26 meumeu sshd[31858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 26 22:09
2019-09-26 10:55 attacks Brute-ForceSSH AbuseIPDB Sep 26 21:50:39 meumeu sshd[28830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 26 21:50
2019-09-26 10:36 attacks Brute-ForceSSH AbuseIPDB Sep 26 21:32:01 meumeu sshd[25990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 26 21:32
2019-09-26 07:57 attacks Brute-ForceSSH AbuseIPDB Fail2Ban - SSH Bruteforce Attempt
2019-09-26 06:23 attacks Brute-ForceSSH AbuseIPDB Sep 26 17:18:30 tux-35-217 sshd\[27031\]: Invalid user www from 106.12.98.12 port 40152 Sep 26 17:18:30 tux-35-217 sshd\[27031\]: pam_unix\(sshd:auth\
2019-09-26 05:16 attacks Brute-ForceSSH AbuseIPDB Sep 26 16:11:06 tux-35-217 sshd\[26856\]: Invalid user jwilleto from 106.12.98.12 port 40796 Sep 26 16:11:06 tux-35-217 sshd\[26856\]: pam_unix\(sshd:
2019-09-26 04:09 attacks Brute-ForceSSH AbuseIPDB Sep 26 15:04:59 tux-35-217 sshd\[26681\]: Invalid user thys from 106.12.98.12 port 41484 Sep 26 15:04:59 tux-35-217 sshd\[26681\]: pam_unix\(sshd:auth
2019-09-26 03:02 attacks Brute-ForceSSH AbuseIPDB Sep 26 13:58:06 tux-35-217 sshd\[26541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 user
2019-09-26 01:55 attacks Brute-ForceSSH AbuseIPDB Sep 26 12:51:22 tux-35-217 sshd\[26362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 user
2019-09-26 00:51 attacks Brute-ForceSSH AbuseIPDB Sep 26 11:47:29 tux-35-217 sshd\[26247\]: Invalid user umcapasocanoas from 106.12.98.12 port 33240 Sep 26 11:47:29 tux-35-217 sshd\[26247\]: pam_unix\
2019-09-24 06:59 attacks Brute-ForceSSH AbuseIPDB Reported by AbuseIPDB proxy server.
2019-09-23 11:05 attacks Brute-ForceSSH AbuseIPDB Sep 23 22:05:40 MK-Soft-Root1 sshd[8435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12 Sep 23
2019-09-22 09:48 attacks Web App Attack AbuseIPDB Automatic report - Banned IP Access
2019-09-22 08:22 attacks SSH AbuseIPDB k+ssh-bruteforce
2019-09-20 20:26 attacks HackingBrute-ForceSSH AbuseIPDB SSH authentication failure x 6 reported by Fail2Ban
2019-09-19 18:02 attacks Web App Attack AbuseIPDB Automatic report - Banned IP Access
2019-09-18 18:54 attacks Brute-ForceSSH AbuseIPDB Sep 19 06:50:10 www sshd\[28376\]: Invalid user nagios from 106.12.98.12Sep 19 06:50:12 www sshd\[28376\]: Failed password for invalid user nagios fro
2019-09-18 18:33 attacks Brute-ForceSSH AbuseIPDB Sep 19 06:28:54 www sshd\[27831\]: Invalid user augusto from 106.12.98.12Sep 19 06:28:55 www sshd\[27831\]: Failed password for invalid user augusto f
2019-09-18 18:12 attacks Brute-ForceSSH AbuseIPDB Sep 19 06:08:05 www sshd\[27441\]: Invalid user zoey from 106.12.98.12Sep 19 06:08:08 www sshd\[27441\]: Failed password for invalid user zoey from 10
2019-09-18 17:51 attacks Brute-ForceSSH AbuseIPDB Sep 19 05:47:35 www sshd\[27107\]: Invalid user teamspeak3 from 106.12.98.12Sep 19 05:47:38 www sshd\[27107\]: Failed password for invalid user teamsp
2019-09-18 17:31 attacks Brute-ForceSSH AbuseIPDB Sep 19 05:27:12 www sshd\[26781\]: Invalid user informix from 106.12.98.12Sep 19 05:27:14 www sshd\[26781\]: Failed password for invalid user informix
2019-09-18 17:11 attacks Brute-ForceSSH AbuseIPDB Sep 19 05:06:44 www sshd\[26484\]: Invalid user Dakota from 106.12.98.12Sep 19 05:06:45 www sshd\[26484\]: Failed password for invalid user Dakota fro
2019-09-18 16:51 attacks Brute-ForceSSH AbuseIPDB Sep 19 04:47:12 www sshd\[26211\]: Invalid user wwwmp2s from 106.12.98.12Sep 19 04:47:14 www sshd\[26211\]: Failed password for invalid user wwwmp2s f
2019-09-18 16:31 attacks Brute-ForceSSH AbuseIPDB Sep 19 04:28:04 www sshd\[25906\]: Invalid user nunes from 106.12.98.12Sep 19 04:28:06 www sshd\[25906\]: Failed password for invalid user nunes from
2019-09-18 16:12 attacks Brute-ForceSSH AbuseIPDB Sep 19 04:08:45 www sshd\[25614\]: Invalid user ay from 106.12.98.12Sep 19 04:08:47 www sshd\[25614\]: Failed password for invalid user ay from 106.12
2019-09-18 15:53 attacks Brute-ForceSSH AbuseIPDB Sep 19 03:49:55 www sshd\[25355\]: Invalid user o from 106.12.98.12Sep 19 03:49:57 www sshd\[25355\]: Failed password for invalid user o from 106.12.9
2019-09-18 15:34 attacks Brute-ForceSSH AbuseIPDB Sep 19 03:31:11 www sshd\[25069\]: Invalid user louisa from 106.12.98.12Sep 19 03:31:13 www sshd\[25069\]: Failed password for invalid user louisa fro
2019-09-18 15:13 attacks Brute-ForceSSH AbuseIPDB Sep 19 03:10:23 www sshd\[24799\]: Invalid user ff from 106.12.98.12Sep 19 03:10:25 www sshd\[24799\]: Failed password for invalid user ff from 106.12
2019-09-18 05:21 attacks Brute-ForceSSH AbuseIPDB Sep 18 14:16:35 localhost sshd\[67302\]: Invalid user richy from 106.12.98.12 port 39322 Sep 18 14:16:35 localhost sshd\[67302\]: pam_unix\(sshd:auth\
2019-09-18 04:58 attacks Brute-ForceSSH AbuseIPDB Sep 18 13:54:17 localhost sshd\[66613\]: Invalid user gemma from 106.12.98.12 port 39036 Sep 18 13:54:17 localhost sshd\[66613\]: pam_unix\(sshd:auth\
2019-04-28 11:23 attacks FTP Brute-ForceHacking AbuseIPDB Apr 28 22:02:45 entropy sshd[7394]: Invalid user userftp from 106.12.98.12 Apr 28 22:02:47 entropy sshd[7394]: Failed password for invalid user userft
2019-04-28 14:20 attacks Brute-ForceSSH AbuseIPDB ssh failed login
2019-04-28 20:11 attacks SSH AbuseIPDB Apr 29 07:08:55 OPSO sshd\[28946\]: Invalid user qs from 106.12.98.12 port 54810 Apr 29 07:08:55 OPSO sshd\[28946\]: pam_unix\(sshd:auth\): authentica
2019-04-28 20:50 attacks SSH AbuseIPDB Apr 29 07:48:32 OPSO sshd\[1312\]: Invalid user desktop from 106.12.98.12 port 50012 Apr 29 07:48:32 OPSO sshd\[1312\]: pam_unix\(sshd:auth\): authent
2019-04-28 21:17 attacks SSH AbuseIPDB Apr 29 08:14:53 OPSO sshd\[4595\]: Invalid user rsunda from 106.12.98.12 port 49018 Apr 29 08:14:53 OPSO sshd\[4595\]: pam_unix\(sshd:auth\): authenti
2019-04-28 21:43 attacks SSH AbuseIPDB Apr 29 08:41:12 OPSO sshd\[7893\]: Invalid user shane from 106.12.98.12 port 48026 Apr 29 08:41:12 OPSO sshd\[7893\]: pam_unix\(sshd:auth\): authentic
2019-04-28 22:09 attacks SSH AbuseIPDB Apr 29 09:07:42 OPSO sshd\[10896\]: Invalid user jc from 106.12.98.12 port 47040 Apr 29 09:07:42 OPSO sshd\[10896\]: pam_unix\(sshd:auth\): authentica
2019-04-28 22:34 attacks SSH AbuseIPDB Apr 29 09:32:13 OPSO sshd\[13603\]: Invalid user test3 from 106.12.98.12 port 59160 Apr 29 09:32:13 OPSO sshd\[13603\]: pam_unix\(sshd:auth\): authent
2019-04-28 23:00 attacks SSH AbuseIPDB Apr 29 09:58:18 OPSO sshd\[16762\]: Invalid user vagrant2 from 106.12.98.12 port 58164 Apr 29 09:58:18 OPSO sshd\[16762\]: pam_unix\(sshd:auth\): auth
2019-04-28 23:27 attacks SSH AbuseIPDB Apr 29 10:25:20 OPSO sshd\[19959\]: Invalid user sysomc from 106.12.98.12 port 57178 Apr 29 10:25:20 OPSO sshd\[19959\]: pam_unix\(sshd:auth\): authen
2019-05-28 23:18 attacks bi_any_0_1d BadIPs.com  
2019-05-28 23:19 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-05-28 23:19 attacks blocklist_de Blocklist.de  
2019-05-28 23:20 attacks SSH blocklist_de_ssh Blocklist.de  
2019-05-28 23:30 attacks firehol_level2 FireHOL  
2019-06-03 22:44 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-06-09 17:20 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-06-09 17:20 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-06-12 12:56 attacks Brute-Force bruteforceblocker danger.rulez.sk  
2019-06-12 13:00 attacks firehol_level3 FireHOL  
2019-06-13 13:40 attacks et_compromised Emerging Threats  
2019-08-23 14:25 attacks Web App AttackApache Attack blocklist_de_apache Blocklist.de  
2019-08-23 14:25 attacks Brute-Force blocklist_de_bruteforce Blocklist.de  
2019-09-17 12:45 attacks Fraud VoIP blocklist_de_sip Blocklist.de  
2019-03-29 18:23 attacks darklist_de darklist.de  
2019-09-03 03:47 attacks darklist_de darklist.de  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 106.12.0.0 - 106.13.255.255
netname: Baidu
descr: Beijing Baidu Netcom Science and Technology Co., Ltd.
descr: Baidu Plaza, No.10, Shangdi 10th street,
descr: Haidian District Beijing,100080
admin-c: SD753-AP
tech-c: SD753-AP
country: CN
mnt-by: MAINT-CNNIC-AP
mnt-lower: MAINT-CNNIC-AP
mnt-irt: IRT-CNNIC-CN
mnt-routes: MAINT-CNNIC-AP
status: ALLOCATED PORTABLE
last-modified: 2015-01-28T09:58:01Z
source: APNIC

irt: IRT-CNNIC-CN
address: Beijing, China
e-mail: ipas@cnnic.cn
abuse-mailbox: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
auth: # Filtered
remarks: Please note that CNNIC is not an ISP and is not
remarks: empowered to investigate complaints of network abuse.
remarks: Please contact the tech-c or admin-c of the network.
mnt-by: MAINT-CNNIC-AP
last-modified: 2017-11-01T08:57:39Z
source: APNIC

person: Supeng Deng
nic-hdl: SD753-AP
address: No.6 2nd North Street Haidian District Beijing
country: CN
phone: +86-10-58003402
fax-no: +86-10-58003402
e-mail: zhangyukun@baidu.com
mnt-by: MAINT-CNNIC-AP
last-modified: 2016-11-01T08:04:01Z
source: APNIC

route: 106.13.0.0/18
descr: Baidu
country: CN
origin: AS38365
notify: zhangyukun@baidu.com
mnt-by: MAINT-CNNIC-AP
last-modified: 2018-11-14T23:46:02Z
source: APNIC

route: 106.13.0.0/18
descr: Baidu
country: CN
origin: AS55967
notify: zhangyukun@baidu.com
mnt-by: MAINT-CNNIC-AP
last-modified: 2018-11-14T23:46:02Z
source: APNIC
most specific ip range is highlighted
Updated : 2019-11-14