Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, Province of China

Internet Service Provider: New Century Infocomm Tech. Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Dec 22 22:37:41 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=106.105.66.51 DST=109.74.200.221 LEN=32 TOS=0x00 PREC=0x00 TTL=46 ID=0 DF PROTO=UDP SPT=123 DPT=123 LEN=12 
...
2020-03-04 01:48:39
Comments on same subnet:
IP Type Details Datetime
106.105.66.23 attackspambots
Dec 11 18:15:30 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:5a:1a:41:08:00 SRC=106.105.66.23 DST=109.74.200.221 LEN=32 TOS=0x00 PREC=0x00 TTL=45 ID=0 DF PROTO=UDP SPT=123 DPT=123 LEN=12 
...
2020-03-04 01:51:57
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.105.66.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.105.66.51.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030300 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 04 01:48:31 CST 2020
;; MSG SIZE  rcvd: 117
Host info
51.66.105.106.in-addr.arpa domain name pointer 106.105.66.51.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.66.105.106.in-addr.arpa	name = 106.105.66.51.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.108.99.150 spamattackproxy
VIRUS: Gen:Variant.Fugrafa.315207
2024-06-21 19:36:46
110.18.0.227 spam
https://www.fiverr.com/users/rthreatassessme https://www.fiverr.com/s/dD0j55a fiverr freelancer jobs
2024-06-28 02:03:13
192.229.221.95 botsattackproxy
Vulnerability Scanner/illegal TCP ports in packet header
2024-06-24 21:19:46
194.50.142.254 attackproxy
Fraud connect
2024-07-09 12:52:34
111.226.228.12 spam
https://alientechnologyunveiled.blogspot.com

Everything is very open with a clear clarification of the issues.
It was really informative. Your website is very useful.
Many thanks for sharing!
2024-06-30 09:56:36
195.178.31.14 attackproxy
Fraud connect
2024-06-28 12:57:35
2001:0002:14:5:1:2:bf35:3610 attack
Robo
2024-06-29 09:39:54
138.117.4.226 attack
Vulnerability Scanner
2024-07-04 21:28:50
147.185.132.9 attack
SSH bot
2024-07-01 12:48:16
185.63.253.200 spam
Ok
2024-07-07 03:47:32
198.235.24.3 attack
Vulnerability Scanner
2024-06-19 14:37:50
172.233.57.39 botsattackproxy
SSH bot
2024-07-09 21:33:56
2001:0002:14:5:1:2:bf35:3610 attack
Robo
2024-06-29 09:40:04
185.57.29.28 botsattackproxy
Malicious IP / Malware
2024-06-24 21:14:42
122.228.23.224 attack
Malicious IP / Malware\\DDoS
2024-07-10 03:09:43

Recently Reported IPs

103.21.163.84 103.123.170.40 14.207.172.76 111.150.90.192
103.209.89.66 103.103.128.201 103.114.10.238 14.207.0.13
139.196.186.36 106.104.79.125 103.73.102.130 159.89.48.245
123.148.211.123 154.9.161.211 138.97.3.139 113.64.92.19
112.196.23.52 109.67.71.224 116.49.132.113 114.69.230.114