Go
106.13.67.22
is a
Hacker
100 %
China
Report Abuse
346attacks reported
284Brute-ForceSSH
15Hacking
9Brute-Force
8SSH
8FTP Brute-ForceHacking
7uncategorized
6Web App Attack
3HackingBrute-ForceSSH
1Brute-ForceSSHPort Scan
1Brute-ForceSSHHacking
...
from 52 distinct reporters
and 5 distinct sources : BadIPs.com, Blocklist.de, FireHOL, darklist.de, AbuseIPDB
106.13.67.22 was first signaled at 2019-07-24 09:58 and last record was at 2019-09-26 16:57.
IP

106.13.67.22

Localisation
China
Beijing, Beijing
NetRange : First & Last IP
106.12.0.0 - 106.13.255.255
Network CIDR
106.12.0.0/15

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-09-26 16:57 attacks Brute-ForceSSH AbuseIPDB Unauthorized SSH login attempts
2019-09-26 16:31 attacks Brute-ForceSSH AbuseIPDB Sep 27 03:31:27 localhost sshd\[14937\]: Invalid user ADONI from 106.13.67.22 port 38000 Sep 27 03:31:27 localhost sshd\[14937\]: pam_unix\(sshd:auth\
2019-09-26 16:10 attacks Brute-ForceSSH AbuseIPDB Sep 27 03:10:21 localhost sshd\[29855\]: Invalid user administrator from 106.13.67.22 port 46562 Sep 27 03:10:22 localhost sshd\[29855\]: pam_unix\(ss
2019-09-26 15:49 attacks Brute-ForceSSH AbuseIPDB Sep 27 02:49:31 localhost sshd\[25701\]: Invalid user support from 106.13.67.22 port 55120 Sep 27 02:49:31 localhost sshd\[25701\]: pam_unix\(sshd:aut
2019-09-26 15:29 attacks Brute-ForceSSH AbuseIPDB Sep 27 02:29:00 localhost sshd\[23523\]: Invalid user mr from 106.13.67.22 port 35452 Sep 27 02:29:00 localhost sshd\[23523\]: pam_unix\(sshd:auth\):
2019-09-26 15:08 attacks Brute-ForceSSH AbuseIPDB Sep 27 02:08:36 localhost sshd\[20355\]: Invalid user rusty from 106.13.67.22 port 44028 Sep 27 02:08:36 localhost sshd\[20355\]: pam_unix\(sshd:auth\
2019-09-26 14:43 attacks Brute-ForceSSH AbuseIPDB Sep 27 01:43:17 localhost sshd\[16831\]: Invalid user kononenko from 106.13.67.22 port 40554 Sep 27 01:43:17 localhost sshd\[16831\]: pam_unix\(sshd:a
2019-09-26 14:18 attacks Brute-ForceSSH AbuseIPDB Sep 27 01:18:41 localhost sshd\[13701\]: Invalid user co from 106.13.67.22 port 37022 Sep 27 01:18:41 localhost sshd\[13701\]: pam_unix\(sshd:auth\):
2019-09-26 13:54 attacks Brute-ForceSSH AbuseIPDB Sep 27 00:49:07 localhost sshd\[9995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22 user=r
2019-09-26 13:24 attacks Brute-ForceSSH AbuseIPDB Sep 27 00:20:10 localhost sshd\[6877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22 user=r
2019-09-26 12:56 attacks Brute-ForceSSH AbuseIPDB Sep 26 23:56:30 localhost sshd\[4600\]: Invalid user fremont from 106.13.67.22 port 59002 Sep 26 23:56:30 localhost sshd\[4600\]: pam_unix\(sshd:auth\
2019-09-26 12:33 attacks Brute-ForceSSH AbuseIPDB Sep 26 23:33:06 localhost sshd\[2361\]: Invalid user valentino from 106.13.67.22 port 55500 Sep 26 23:33:06 localhost sshd\[2361\]: pam_unix\(sshd:aut
2019-09-26 12:10 attacks Brute-ForceSSH AbuseIPDB Sep 26 23:10:35 localhost sshd\[32642\]: Invalid user teste from 106.13.67.22 port 51986 Sep 26 23:10:35 localhost sshd\[32642\]: pam_unix\(sshd:auth\
2019-09-26 11:48 attacks Brute-ForceSSH AbuseIPDB Sep 26 22:48:07 localhost sshd\[30230\]: Invalid user faith from 106.13.67.22 port 48518 Sep 26 22:48:07 localhost sshd\[30230\]: pam_unix\(sshd:auth\
2019-09-26 11:26 attacks Brute-ForceSSH AbuseIPDB Sep 26 22:25:39 localhost sshd\[28044\]: Invalid user jira from 106.13.67.22 port 45014 Sep 26 22:25:39 localhost sshd\[28044\]: pam_unix\(sshd:auth\)
2019-09-26 11:03 attacks Brute-ForceSSH AbuseIPDB Sep 26 22:03:10 localhost sshd\[25558\]: Invalid user mark from 106.13.67.22 port 41520 Sep 26 22:03:10 localhost sshd\[25558\]: pam_unix\(sshd:auth\)
2019-09-26 10:41 attacks Brute-ForceSSH AbuseIPDB Sep 26 21:40:54 localhost sshd\[23282\]: Invalid user nxpgsql from 106.13.67.22 port 38026 Sep 26 21:40:54 localhost sshd\[23282\]: pam_unix\(sshd:aut
2019-09-26 10:18 attacks Brute-ForceSSH AbuseIPDB Sep 26 21:14:03 localhost sshd\[20518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22 user=
2019-09-26 06:57 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T11:27:18.4670621495-001 sshd\[14074\]: Failed password for invalid user forscher from 106.13.67.22 port 56434 ssh2 2019-09-26T11:41:16.5997
2019-09-26 06:36 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T11:06:35.8145881495-001 sshd\[12515\]: Failed password for invalid user wpyan from 106.13.67.22 port 49422 ssh2 2019-09-26T11:20:26.6546501
2019-09-26 06:15 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T10:45:35.9873151495-001 sshd\[10971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67
2019-09-26 05:54 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T10:25:11.6110141495-001 sshd\[9454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.
2019-09-26 05:34 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T09:58:13.3342621495-001 sshd\[7471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.
2019-09-26 04:54 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T09:38:35.3861671495-001 sshd\[5938\]: Invalid user souleke from 106.13.67.22 port 37940 2019-09-26T09:38:35.3931211495-001 sshd\[5938\]: pa
2019-09-26 04:34 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T09:19:13.7757121495-001 sshd\[4478\]: Invalid user libvirt from 106.13.67.22 port 59192 2019-09-26T09:19:13.7831711495-001 sshd\[4478\]: pa
2019-09-26 04:15 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T09:00:32.3779511495-001 sshd\[2761\]: Invalid user webmaster from 106.13.67.22 port 52204 2019-09-26T09:00:32.3849531495-001 sshd\[2761\]:
2019-09-26 03:58 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T08:42:39.9676331495-001 sshd\[1459\]: Invalid user kj from 106.13.67.22 port 45230 2019-09-26T08:42:40.0019991495-001 sshd\[1459\]: pam_uni
2019-09-26 03:39 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T08:24:59.6730371495-001 sshd\[65237\]: Invalid user client from 106.13.67.22 port 38266 2019-09-26T08:24:59.6760801495-001 sshd\[65237\]: p
2019-09-26 03:22 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T08:07:43.7070091495-001 sshd\[63876\]: Invalid user joon from 106.13.67.22 port 59540 2019-09-26T08:07:43.7142931495-001 sshd\[63876\]: pam
2019-09-26 03:05 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T07:51:25.5498521495-001 sshd\[62622\]: Invalid user vpnguardbot from 106.13.67.22 port 52596 2019-09-26T07:51:25.5530141495-001 sshd\[62622
2019-09-26 02:49 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T07:35:15.8233611495-001 sshd\[61403\]: Invalid user pg from 106.13.67.22 port 45632 2019-09-26T07:35:15.8301221495-001 sshd\[61403\]: pam_u
2019-09-26 02:33 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T07:18:40.8040631495-001 sshd\[60110\]: Invalid user ftptest from 106.13.67.22 port 38674 2019-09-26T07:18:40.8071711495-001 sshd\[60110\]:
2019-09-26 02:16 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T07:01:52.1025051495-001 sshd\[58845\]: Invalid user abc1 from 106.13.67.22 port 59950 2019-09-26T07:01:52.1096321495-001 sshd\[58845\]: pam
2019-09-26 02:00 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T06:46:36.0398891495-001 sshd\[57740\]: Invalid user default from 106.13.67.22 port 53004 2019-09-26T06:46:36.0470661495-001 sshd\[57740\]:
2019-09-26 01:40 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T06:26:17.0271511495-001 sshd\[56203\]: Invalid user informix from 106.13.67.22 port 34334 2019-09-26T06:26:17.0313051495-001 sshd\[56203\]:
2019-09-26 01:25 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T06:10:57.6348641495-001 sshd\[55094\]: Invalid user ee from 106.13.67.22 port 55616 2019-09-26T06:10:57.6377321495-001 sshd\[55094\]: pam_u
2019-09-26 01:05 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T05:50:50.4378741495-001 sshd\[53630\]: Invalid user hamoelet from 106.13.67.22 port 36960 2019-09-26T05:50:50.4446531495-001 sshd\[53630\]:
2019-09-26 00:45 attacks Brute-ForceSSH AbuseIPDB 2019-09-26T05:20:05.3055931495-001 sshd\[51627\]: Invalid user ack from 106.13.67.22 port 46698 2019-09-26T05:20:05.3127221495-001 sshd\[51627\]: pam_
2019-09-24 22:14 attacks Brute-ForceSSH AbuseIPDB Sep 25 09:14:40 lnxded63 sshd[11038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22
2019-09-24 20:51 attacks Brute-ForceSSH AbuseIPDB Sep 25 07:51:58 lnxded63 sshd[3935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22
2019-09-24 20:10 attacks Brute-ForceSSH AbuseIPDB Sep 25 07:10:14 lnxded63 sshd[762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22 Sep 25 07:10:
2019-09-24 19:36 attacks Brute-ForceSSH AbuseIPDB Sep 25 06:28:29 lnxded63 sshd[29419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22 Sep 25 06:2
2019-09-24 19:06 attacks Brute-ForceSSH AbuseIPDB Sep 25 06:06:36 cvbmail sshd\[24037\]: Invalid user dcjianghu from 106.13.67.22 Sep 25 06:06:36 cvbmail sshd\[24037\]: pam_unix\(sshd:auth\): authenti
2019-09-24 11:00 attacks Brute-ForceSSH AbuseIPDB Sep 24 21:28:51 *** sshd[5136]: Failed password for invalid user user3 from 106.13.67.22 port 41302 ssh2
2019-09-23 06:15 attacks Brute-ForceSSH AbuseIPDB 2019-09-21 01:59:29 server sshd[55259]: Failed password for invalid user ubuntu from 106.13.67.22 port 50222 ssh2
2019-09-23 04:51 attacks Brute-ForceSSH AbuseIPDB Sep 23 03:46:27 php1 sshd\[18658\]: Invalid user winston from 106.13.67.22 Sep 23 03:46:27 php1 sshd\[18658\]: pam_unix\(sshd:auth\): authentication f
2019-09-23 04:31 attacks Brute-ForceSSH AbuseIPDB Sep 23 03:27:22 php1 sshd\[17020\]: Invalid user lists123 from 106.13.67.22 Sep 23 03:27:22 php1 sshd\[17020\]: pam_unix\(sshd:auth\): authentication
2019-09-23 03:55 attacks Brute-ForceSSH AbuseIPDB Sep 23 02:50:42 php1 sshd\[14006\]: Invalid user bb123 from 106.13.67.22 Sep 23 02:50:42 php1 sshd\[14006\]: pam_unix\(sshd:auth\): authentication fai
2019-09-23 03:36 attacks Brute-ForceSSH AbuseIPDB Sep 23 02:32:11 php1 sshd\[12396\]: Invalid user temp from 106.13.67.22 Sep 23 02:32:11 php1 sshd\[12396\]: pam_unix\(sshd:auth\): authentication fail
2019-09-23 03:18 attacks Brute-ForceSSH AbuseIPDB Sep 23 02:14:39 php1 sshd\[10898\]: Invalid user valentine from 106.13.67.22 Sep 23 02:14:39 php1 sshd\[10898\]: pam_unix\(sshd:auth\): authentication
2019-07-24 09:58 attacks Hacking AbuseIPDB Jul 24 20:51:23 h2177944 sshd\[16666\]: Invalid user mb from 106.13.67.22 port 53468 Jul 24 20:51:23 h2177944 sshd\[16666\]: pam_unix\(sshd:auth\): au
2019-07-24 14:03 attacks Hacking AbuseIPDB Jul 25 00:59:42 h2177944 sshd\[25097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22 user=r
2019-07-24 20:12 attacks Hacking AbuseIPDB Jul 25 07:09:32 h2177944 sshd\[7661\]: Invalid user jian from 106.13.67.22 port 53686 Jul 25 07:09:32 h2177944 sshd\[7661\]: pam_unix\(sshd:auth\): au
2019-07-24 22:17 attacks Hacking AbuseIPDB Jul 25 09:14:15 h2177944 sshd\[11872\]: Invalid user admin from 106.13.67.22 port 35790 Jul 25 09:14:15 h2177944 sshd\[11872\]: pam_unix\(sshd:auth\):
2019-07-25 00:22 attacks Hacking AbuseIPDB Jul 25 11:18:50 h2177944 sshd\[16023\]: Invalid user it from 106.13.67.22 port 43952 Jul 25 11:18:50 h2177944 sshd\[16023\]: pam_unix\(sshd:auth\): au
2019-07-25 02:29 attacks Hacking AbuseIPDB Jul 25 13:24:15 h2177944 sshd\[19915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.22 user=r
2019-07-25 04:39 attacks Hacking AbuseIPDB Jul 25 15:35:49 h2177944 sshd\[24581\]: Invalid user juan from 106.13.67.22 port 51962 Jul 25 15:35:49 h2177944 sshd\[24581\]: pam_unix\(sshd:auth\):
2019-07-25 07:11 attacks Hacking AbuseIPDB Jul 25 18:08:15 h2177944 sshd\[30060\]: Invalid user opc from 106.13.67.22 port 58272 Jul 25 18:08:15 h2177944 sshd\[30060\]: pam_unix\(sshd:auth\): a
2019-07-29 16:10 attacks FTP Brute-ForceHacking AbuseIPDB Jul 30 02:12:09 www sshd[2808]: Invalid user popd from 106.13.67.22 Jul 30 02:12:09 www sshd[2808]: pam_unix(sshd:auth): authentication failure; logna
2019-07-29 22:57 attacks Brute-ForceSSH AbuseIPDB Automatic report - SSH Brute-Force Attack
2019-07-27 20:55 attacks bi_any_0_1d BadIPs.com  
2019-07-27 20:58 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-07-30 19:06 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-07-30 19:07 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-07-30 19:07 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-07-30 19:07 attacks blocklist_de Blocklist.de  
2019-07-30 19:08 attacks SSH blocklist_de_ssh Blocklist.de  
2019-07-30 19:12 attacks firehol_level2 FireHOL  
2019-08-21 16:17 attacks bi_default_0_1d BadIPs.com  
2019-08-21 16:18 attacks bi_unknown_0_1d BadIPs.com  
2019-09-25 04:43 attacks Fraud VoIP blocklist_de_sip Blocklist.de  
2019-09-03 03:47 attacks darklist_de darklist.de  
2019-08-20 17:20 attacks darklist_de darklist.de  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 106.12.0.0 - 106.13.255.255
netname: Baidu
descr: Beijing Baidu Netcom Science and Technology Co., Ltd.
descr: Baidu Plaza, No.10, Shangdi 10th street,
descr: Haidian District Beijing,100080
admin-c: SD753-AP
tech-c: SD753-AP
country: CN
mnt-by: MAINT-CNNIC-AP
mnt-lower: MAINT-CNNIC-AP
mnt-irt: IRT-CNNIC-CN
mnt-routes: MAINT-CNNIC-AP
status: ALLOCATED PORTABLE
last-modified: 2015-01-28T09:58:01Z
source: APNIC

irt: IRT-CNNIC-CN
address: Beijing, China
e-mail: ipas@cnnic.cn
abuse-mailbox: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
auth: # Filtered
remarks: Please note that CNNIC is not an ISP and is not
remarks: empowered to investigate complaints of network abuse.
remarks: Please contact the tech-c or admin-c of the network.
mnt-by: MAINT-CNNIC-AP
last-modified: 2017-11-01T08:57:39Z
source: APNIC

person: Supeng Deng
nic-hdl: SD753-AP
address: No.6 2nd North Street Haidian District Beijing
country: CN
phone: +86-10-58003402
fax-no: +86-10-58003402
e-mail: zhangyukun@baidu.com
mnt-by: MAINT-CNNIC-AP
last-modified: 2016-11-01T08:04:01Z
source: APNIC

route: 106.13.0.0/18
descr: Baidu
country: CN
origin: AS38365
notify: zhangyukun@baidu.com
mnt-by: MAINT-CNNIC-AP
last-modified: 2018-11-14T23:46:02Z
source: APNIC

route: 106.13.0.0/18
descr: Baidu
country: CN
origin: AS55967
notify: zhangyukun@baidu.com
mnt-by: MAINT-CNNIC-AP
last-modified: 2018-11-14T23:46:02Z
source: APNIC
most specific ip range is highlighted
Updated : 2019-11-14