Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.104.181.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.104.181.96.			IN	A

;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 05:13:17 CST 2022
;; MSG SIZE  rcvd: 107
Host info
96.181.104.106.in-addr.arpa domain name pointer 106-104-181-96.adsl.static.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
96.181.104.106.in-addr.arpa	name = 106-104-181-96.adsl.static.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.162.51.63 attack
2020-06-24T08:45:37.767010amanda2.illicoweb.com sshd\[15284\]: Invalid user ths from 187.162.51.63 port 41722
2020-06-24T08:45:37.770609amanda2.illicoweb.com sshd\[15284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-162-51-63.static.axtel.net
2020-06-24T08:45:40.120741amanda2.illicoweb.com sshd\[15284\]: Failed password for invalid user ths from 187.162.51.63 port 41722 ssh2
2020-06-24T08:55:05.173935amanda2.illicoweb.com sshd\[15806\]: Invalid user misp from 187.162.51.63 port 42768
2020-06-24T08:55:05.180624amanda2.illicoweb.com sshd\[15806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-162-51-63.static.axtel.net
...
2020-06-24 15:05:11
117.4.106.66 attackbotsspam
Unauthorized connection attempt detected from IP address 117.4.106.66 to port 445
2020-06-24 15:02:15
176.103.103.181 attackspam
 TCP (SYN) 176.103.103.181:6840 -> port 5555, len 44
2020-06-24 15:19:53
68.183.148.159 attackspam
SSH Brute-Force reported by Fail2Ban
2020-06-24 15:39:35
49.234.43.224 attackbots
Invalid user dev from 49.234.43.224 port 36632
2020-06-24 15:11:54
148.70.157.213 attack
Jun 24 05:54:54 debian-2gb-nbg1-2 kernel: \[15229561.848117\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=148.70.157.213 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=42664 PROTO=TCP SPT=41856 DPT=19262 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-24 15:14:45
18.195.119.8 attackspam
Unauthorized connection attempt: SRC=18.195.119.8
...
2020-06-24 15:26:57
195.54.160.159 attackspam
firewall-block, port(s): 2390/tcp, 3030/tcp
2020-06-24 15:41:30
212.70.149.18 attackspam
Jun 24 09:35:30 srv01 postfix/smtpd\[364\]: warning: unknown\[212.70.149.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 09:35:41 srv01 postfix/smtpd\[20847\]: warning: unknown\[212.70.149.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 09:35:48 srv01 postfix/smtpd\[364\]: warning: unknown\[212.70.149.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 09:36:09 srv01 postfix/smtpd\[20847\]: warning: unknown\[212.70.149.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 09:36:18 srv01 postfix/smtpd\[364\]: warning: unknown\[212.70.149.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-24 15:39:17
182.156.209.222 attackbots
k+ssh-bruteforce
2020-06-24 15:10:16
37.59.112.180 attack
Invalid user samba from 37.59.112.180 port 45234
2020-06-24 15:07:22
91.244.83.132 attackbotsspam
Unauthorized connection attempt: SRC=91.244.83.132
...
2020-06-24 15:11:38
180.76.148.87 attack
$f2bV_matches
2020-06-24 15:03:10
36.91.152.234 attackspam
Jun 24 07:35:45 onepixel sshd[1961259]: Invalid user elastic from 36.91.152.234 port 54512
Jun 24 07:35:45 onepixel sshd[1961259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.152.234 
Jun 24 07:35:45 onepixel sshd[1961259]: Invalid user elastic from 36.91.152.234 port 54512
Jun 24 07:35:47 onepixel sshd[1961259]: Failed password for invalid user elastic from 36.91.152.234 port 54512 ssh2
Jun 24 07:40:28 onepixel sshd[1963575]: Invalid user cert from 36.91.152.234 port 60232
2020-06-24 15:42:31
117.221.196.224 attackspambots
Telnet Honeypot -> Telnet Bruteforce / Login
2020-06-24 15:23:49

Recently Reported IPs

106.102.0.159 106.104.162.171 106.104.74.191 106.104.76.205
106.105.218.222 106.105.214.143 106.105.228.191 106.109.8.7
106.104.77.42 106.107.218.47 106.11.130.216 106.11.153.20
106.11.172.9 106.11.156.204 106.11.19.68 106.11.19.78
106.11.210.187 106.11.210.44 106.11.253.83 106.11.43.158