Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.104.127.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39828
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.104.127.49.			IN	A

;; AUTHORITY SECTION:
.			236	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:09:58 CST 2022
;; MSG SIZE  rcvd: 107
Host info
49.127.104.106.in-addr.arpa domain name pointer 106-104-127-49.adsl.static.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.127.104.106.in-addr.arpa	name = 106-104-127-49.adsl.static.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.146.141.16 attackbots
445/tcp
[2019-06-23]1pkt
2019-06-24 01:59:18
80.241.222.37 attackspam
Chat Spam
2019-06-24 02:03:48
107.175.68.101 attackspambots
Automatic report - Web App Attack
2019-06-24 01:47:59
177.130.139.39 attackspambots
SMTP-sasl brute force
...
2019-06-24 01:56:32
179.108.245.192 attackbotsspam
SMTP-sasl brute force
...
2019-06-24 01:53:15
191.53.199.225 attack
Brute force attempt
2019-06-24 01:52:15
177.11.116.242 attackspambots
SMTP-sasl brute force
...
2019-06-24 02:00:59
139.59.17.173 attack
SSH Bruteforce Attack
2019-06-24 02:01:56
72.23.152.87 attackbots
Jun 23 12:47:34 srv-4 sshd\[23628\]: Invalid user admin from 72.23.152.87
Jun 23 12:47:34 srv-4 sshd\[23628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.23.152.87
Jun 23 12:47:36 srv-4 sshd\[23628\]: Failed password for invalid user admin from 72.23.152.87 port 57547 ssh2
...
2019-06-24 01:54:18
201.48.206.146 attack
Jun 23 10:42:27 xb3 sshd[28139]: reveeclipse mapping checking getaddrinfo for 201-048-206-146.static.ctbctelecom.com.br [201.48.206.146] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 23 10:42:29 xb3 sshd[28139]: Failed password for invalid user hh from 201.48.206.146 port 36357 ssh2
Jun 23 10:42:29 xb3 sshd[28139]: Received disconnect from 201.48.206.146: 11: Bye Bye [preauth]
Jun 23 10:45:28 xb3 sshd[20279]: reveeclipse mapping checking getaddrinfo for 201-048-206-146.static.ctbctelecom.com.br [201.48.206.146] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 23 10:45:31 xb3 sshd[20279]: Failed password for invalid user electrical from 201.48.206.146 port 48445 ssh2
Jun 23 10:45:31 xb3 sshd[20279]: Received disconnect from 201.48.206.146: 11: Bye Bye [preauth]
Jun 23 10:47:33 xb3 sshd[25943]: reveeclipse mapping checking getaddrinfo for 201-048-206-146.static.ctbctelecom.com.br [201.48.206.146] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 23 10:47:35 xb3 sshd[25943]: Failed password for in........
-------------------------------
2019-06-24 02:19:26
138.122.39.5 attackbotsspam
Unauthorized SMTP/IMAP/POP3 connection attempt
2019-06-24 01:55:18
2.32.113.118 attackspam
$f2bV_matches
2019-06-24 02:20:23
80.191.105.6 attackbots
19/6/23@05:47:15: FAIL: Alarm-Intrusion address from=80.191.105.6
...
2019-06-24 02:04:07
124.123.109.95 attack
Unauthorized connection attempt from IP address 124.123.109.95 on Port 445(SMB)
2019-06-24 02:14:17
14.243.31.213 attackspam
Unauthorised access (Jun 23) SRC=14.243.31.213 LEN=52 TTL=118 ID=1207 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-24 02:13:06

Recently Reported IPs

106.104.101.191 106.104.124.156 106.104.136.11 106.104.136.157
106.104.136.122 106.104.136.174 106.104.137.18 106.104.148.208
106.104.148.2 106.104.151.128 106.104.151.191 106.104.151.30
106.104.151.42 101.205.49.230 106.104.160.181 106.104.165.227
106.104.151.188 106.104.166.31 106.104.168.15 106.104.166.54