Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.105.125.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.105.125.245.		IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040301 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 04 14:22:15 CST 2022
;; MSG SIZE  rcvd: 108
Host info
245.125.105.106.in-addr.arpa domain name pointer 106.105.125.245.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.125.105.106.in-addr.arpa	name = 106.105.125.245.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.189.11.43 attackbotsspam
Apr 11 14:20:36 sip sshd[17204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.11.43
Apr 11 14:20:38 sip sshd[17204]: Failed password for invalid user admin from 187.189.11.43 port 56164 ssh2
Apr 11 14:20:42 sip sshd[17290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.11.43
2020-04-11 20:45:38
201.47.158.130 attackspam
leo_www
2020-04-11 21:17:16
162.243.129.153 attack
firewall-block, port(s): 1080/tcp
2020-04-11 21:21:32
105.112.31.160 attackbotsspam
1586607633 - 04/11/2020 14:20:33 Host: 105.112.31.160/105.112.31.160 Port: 445 TCP Blocked
2020-04-11 20:57:45
178.128.59.109 attackbots
2020-04-11T12:32:10.535648shield sshd\[23571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.59.109  user=root
2020-04-11T12:32:12.477339shield sshd\[23571\]: Failed password for root from 178.128.59.109 port 48038 ssh2
2020-04-11T12:35:56.280056shield sshd\[24698\]: Invalid user redis from 178.128.59.109 port 49280
2020-04-11T12:35:56.282791shield sshd\[24698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.59.109
2020-04-11T12:35:57.918098shield sshd\[24698\]: Failed password for invalid user redis from 178.128.59.109 port 49280 ssh2
2020-04-11 20:39:05
80.28.211.131 attack
Apr 11 14:53:24 plex sshd[6683]: Failed password for root from 80.28.211.131 port 45258 ssh2
Apr 11 14:57:10 plex sshd[6880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.28.211.131  user=root
Apr 11 14:57:11 plex sshd[6880]: Failed password for root from 80.28.211.131 port 52432 ssh2
Apr 11 14:57:10 plex sshd[6880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.28.211.131  user=root
Apr 11 14:57:11 plex sshd[6880]: Failed password for root from 80.28.211.131 port 52432 ssh2
2020-04-11 21:08:14
54.38.53.251 attack
Apr 11 14:16:49 sso sshd[22566]: Failed password for root from 54.38.53.251 port 41276 ssh2
...
2020-04-11 20:59:07
123.58.2.127 attack
Port scan: Attack repeated for 24 hours
2020-04-11 21:25:26
73.15.91.251 attackbotsspam
Apr 11 08:50:16 NPSTNNYC01T sshd[24155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.15.91.251
Apr 11 08:50:18 NPSTNNYC01T sshd[24155]: Failed password for invalid user donovan from 73.15.91.251 port 51404 ssh2
Apr 11 08:54:48 NPSTNNYC01T sshd[24506]: Failed password for root from 73.15.91.251 port 59562 ssh2
...
2020-04-11 21:02:47
67.205.153.16 attack
Apr 11 12:30:36 localhost sshd[50129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=imap.vtigermail.com  user=root
Apr 11 12:30:39 localhost sshd[50129]: Failed password for root from 67.205.153.16 port 39122 ssh2
Apr 11 12:34:08 localhost sshd[50497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=imap.vtigermail.com  user=root
Apr 11 12:34:09 localhost sshd[50497]: Failed password for root from 67.205.153.16 port 46610 ssh2
Apr 11 12:37:36 localhost sshd[50851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=imap.vtigermail.com  user=root
Apr 11 12:37:38 localhost sshd[50851]: Failed password for root from 67.205.153.16 port 54098 ssh2
...
2020-04-11 21:21:46
194.26.29.119 attackspam
scans 14 times in preceeding hours on the ports (in chronological order) 1465 1353 2922 2645 2947 2347 3034 2583 2114 1622 1353 2367 2581 3105 resulting in total of 93 scans from 194.26.29.0/24 block.
2020-04-11 21:16:27
201.158.25.217 attackspambots
Apr 10 10:12:38 zimbra postfix/smtps/smtpd[17518]: warning: unknown[201.158.25.217]: SASL PLAIN authentication failed: authentication failure
Apr 10 10:12:39 zimbra postfix/smtps/smtpd[17518]: lost connection after AUTH from unknown[201.158.25.217]
Apr 10 10:12:39 zimbra postfix/smtps/smtpd[17518]: disconnect from unknown[201.158.25.217] ehlo=1 auth=0/1 commands=1/2
Apr 11 14:20:37 zimbra postfix/smtps/smtpd[8049]: warning: unknown[201.158.25.217]: SASL PLAIN authentication failed: authentication failure
...

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=201.158.25.217
2020-04-11 20:50:37
31.22.7.58 attack
B: Abusive content scan (301)
2020-04-11 21:09:39
162.243.130.205 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 8080 resulting in total of 56 scans from 162.243.0.0/16 block.
2020-04-11 21:20:38
222.186.30.167 attack
Apr 11 19:56:14 webhost01 sshd[15243]: Failed password for root from 222.186.30.167 port 28668 ssh2
...
2020-04-11 21:12:32

Recently Reported IPs

106.105.119.62 106.105.127.78 106.105.194.226 106.105.83.167
106.105.94.2 106.107.180.167 106.107.219.89 106.11.158.48
106.11.223.99 106.110.113.235 106.110.122.50 106.110.180.35
106.110.189.58 106.110.195.23 106.110.212.105 106.110.212.133
106.110.212.202 106.110.212.70 106.110.217.25 106.110.226.14