Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.105.92.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62446
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.105.92.199.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:14:13 CST 2022
;; MSG SIZE  rcvd: 107
Host info
199.92.105.106.in-addr.arpa domain name pointer 106.105.92.199.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.92.105.106.in-addr.arpa	name = 106.105.92.199.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.230.240.226 attackbots
37215/tcp
[2019-07-08]1pkt
2019-07-09 05:48:50
192.198.84.198 attack
fail2ban honeypot
2019-07-09 05:50:28
118.170.66.154 attack
37215/tcp
[2019-07-08]1pkt
2019-07-09 06:03:28
206.189.131.213 attack
Jul  8 23:29:27 ArkNodeAT sshd\[2587\]: Invalid user juan from 206.189.131.213
Jul  8 23:29:27 ArkNodeAT sshd\[2587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.131.213
Jul  8 23:29:29 ArkNodeAT sshd\[2587\]: Failed password for invalid user juan from 206.189.131.213 port 52396 ssh2
2019-07-09 05:48:31
222.242.223.75 attack
web-1 [ssh] SSH Attack
2019-07-09 05:53:07
101.109.211.244 attackspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-08 20:42:28]
2019-07-09 06:04:58
200.196.138.201 attack
Jul  8 14:43:00 web1 postfix/smtpd[5897]: warning: unknown[200.196.138.201]: SASL PLAIN authentication failed: authentication failure
...
2019-07-09 06:16:04
114.40.184.55 attackspambots
37215/tcp
[2019-07-08]1pkt
2019-07-09 05:46:43
117.27.151.104 attackspambots
Jul  8 15:01:38 borg sshd[71296]: Failed unknown for invalid user farid from 117.27.151.104 port 55657 ssh2
Jul  8 15:02:24 borg sshd[71353]: Failed unknown for invalid user goldsp from 117.27.151.104 port 52514 ssh2
Jul  8 15:02:26 borg sshd[71355]: Failed unknown for invalid user hp from 117.27.151.104 port 53587 ssh2
...
2019-07-09 05:36:41
220.83.200.89 attackbots
9527/tcp 9527/tcp 9527/tcp
[2019-07-08]3pkt
2019-07-09 06:12:41
1.161.195.132 attack
37215/tcp
[2019-07-08]1pkt
2019-07-09 05:38:26
113.53.106.49 attackspam
8291/tcp
[2019-07-08]1pkt
2019-07-09 05:55:40
81.74.229.246 attack
Jul  8 21:20:20 *** sshd[28499]: Invalid user davidc from 81.74.229.246
2019-07-09 05:52:41
36.66.149.211 attackspambots
ssh bruteforce or scan
...
2019-07-09 06:09:45
41.45.101.237 attackbotsspam
2323/tcp
[2019-07-08]1pkt
2019-07-09 05:56:12

Recently Reported IPs

106.107.208.177 106.110.150.34 106.111.116.34 106.110.222.96
106.110.9.250 106.111.132.198 106.110.94.229 106.111.169.83
106.111.169.34 106.111.169.159 106.111.169.204 106.111.30.81
106.110.216.192 106.111.77.79 106.111.120.175 106.111.97.88
106.111.90.247 106.113.12.2 106.111.90.228 106.112.54.144