Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taiwan

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.104.76.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.104.76.113.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120201 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 03 09:14:53 CST 2019
;; MSG SIZE  rcvd: 118
Host info
113.76.104.106.in-addr.arpa domain name pointer 106-104-76-113.adsl.static.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.76.104.106.in-addr.arpa	name = 106-104-76-113.adsl.static.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.65.172.240 attackspam
Mar 31 13:06:50 legacy sshd[10598]: Failed password for root from 159.65.172.240 port 54204 ssh2
Mar 31 13:09:23 legacy sshd[10670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.172.240
Mar 31 13:09:25 legacy sshd[10670]: Failed password for invalid user hakurei from 159.65.172.240 port 44810 ssh2
...
2020-03-31 19:10:24
213.74.176.36 attack
Mar 31 09:50:13 XXXXXX sshd[61192]: Invalid user wangwentao from 213.74.176.36 port 58496
2020-03-31 18:33:31
52.166.68.207 attackbotsspam
firewall-block, port(s): 7067/tcp
2020-03-31 18:55:47
159.203.27.98 attack
Mar 31 07:44:48 vps647732 sshd[14657]: Failed password for root from 159.203.27.98 port 48138 ssh2
...
2020-03-31 18:52:51
51.38.130.205 attack
Mar 31 11:56:02 ns381471 sshd[4829]: Failed password for root from 51.38.130.205 port 54646 ssh2
Mar 31 11:59:59 ns381471 sshd[5092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.130.205
2020-03-31 18:26:32
186.215.132.150 attack
Invalid user puz from 186.215.132.150 port 37070
2020-03-31 19:07:34
203.147.76.146 attackspam
(imapd) Failed IMAP login from 203.147.76.146 (NC/New Caledonia/host-203-147-76-146.h29.canl.nc): 1 in the last 3600 secs
2020-03-31 18:47:21
111.167.180.3 attackspambots
firewall-block, port(s): 23/tcp
2020-03-31 18:51:33
114.67.74.139 attack
Mar 31 10:45:18 haigwepa sshd[17355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139 
Mar 31 10:45:20 haigwepa sshd[17355]: Failed password for invalid user deploy from 114.67.74.139 port 48376 ssh2
...
2020-03-31 18:31:00
84.201.206.214 attack
firewall-block, port(s): 1433/tcp
2020-03-31 18:54:12
103.243.141.144 attack
Mar 31 12:50:58 debian-2gb-nbg1-2 kernel: \[7910912.034706\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.243.141.144 DST=195.201.40.59 LEN=40 TOS=0x18 PREC=0xA0 TTL=239 ID=17653 PROTO=TCP SPT=55883 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-31 18:53:29
203.192.204.168 attackspam
Mar 31 11:37:29 mail sshd[5080]: Invalid user mn from 203.192.204.168
Mar 31 11:37:29 mail sshd[5080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.192.204.168
Mar 31 11:37:29 mail sshd[5080]: Invalid user mn from 203.192.204.168
Mar 31 11:37:31 mail sshd[5080]: Failed password for invalid user mn from 203.192.204.168 port 33000 ssh2
Mar 31 11:42:35 mail sshd[12962]: Invalid user ss from 203.192.204.168
...
2020-03-31 18:27:48
51.144.82.235 attackspambots
20 attempts against mh-ssh on cloud
2020-03-31 19:02:48
193.112.62.103 attackspam
2020-03-31T09:05:16.451000homeassistant sshd[8415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.62.103  user=root
2020-03-31T09:05:19.131901homeassistant sshd[8415]: Failed password for root from 193.112.62.103 port 32886 ssh2
...
2020-03-31 18:55:25
112.72.94.160 attackbots
1585626607 - 03/31/2020 05:50:07 Host: 112.72.94.160/112.72.94.160 Port: 445 TCP Blocked
2020-03-31 18:56:15

Recently Reported IPs

137.178.248.196 49.202.4.132 87.162.35.199 139.90.253.145
113.144.186.172 37.251.221.232 185.225.196.123 49.24.56.140
194.80.125.158 52.55.62.51 5.232.246.168 79.23.104.202
119.51.217.24 134.126.18.113 69.153.250.23 198.211.243.111
65.106.58.118 113.193.211.63 129.41.133.5 44.200.130.86