Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, Province of China

Internet Service Provider: New Century Infocomm Tech. Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
Dec 11 15:13:55 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=106.107.131.18 DST=109.74.200.221 LEN=32 TOS=0x00 PREC=0x00 TTL=45 ID=0 DF PROTO=UDP SPT=123 DPT=123 LEN=12 
...
2020-03-04 00:12:01
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.107.131.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57829
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.107.131.18.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030202 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 04 00:11:50 CST 2020
;; MSG SIZE  rcvd: 118
Host info
18.131.107.106.in-addr.arpa domain name pointer 106.107.131.18.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.131.107.106.in-addr.arpa	name = 106.107.131.18.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.92.186.89 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=17249)(08041230)
2019-08-05 03:19:10
122.191.198.250 attackbotsspam
[portscan] tcp/22 [SSH]
*(RWIN=2112)(08041230)
2019-08-05 03:40:29
2.50.138.181 attackspambots
Automatic report - Port Scan Attack
2019-08-05 03:22:59
223.25.101.76 attack
Unauthorized connection attempt from IP address 223.25.101.76 on Port 445(SMB)
2019-08-05 03:23:38
98.128.161.105 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=2419)(08041230)
2019-08-05 03:12:06
125.167.92.194 attackspambots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 03:06:02
177.230.60.221 attackspambots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 03:02:24
77.82.148.234 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(08041230)
2019-08-05 03:17:26
103.81.63.18 attack
445/tcp 445/tcp 445/tcp...
[2019-06-22/08-04]21pkt,1pt.(tcp)
2019-08-05 03:11:30
125.73.177.234 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=50086)(08041230)
2019-08-05 03:06:30
78.85.69.59 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 03:16:57
77.45.171.50 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=39922)(08041230)
2019-08-05 03:17:47
172.116.233.91 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=41961)(08041230)
2019-08-05 03:37:40
80.209.152.82 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 03:16:04
187.115.165.204 attack
Scanning random ports - tries to find possible vulnerable services
2019-08-05 03:31:58

Recently Reported IPs

123.148.240.200 103.250.152.62 104.148.41.11 45.32.32.166
123.148.219.95 117.193.79.185 106.105.87.69 99.162.136.54
77.30.6.147 154.9.175.131 106.105.87.139 103.209.131.3
176.241.53.190 104.140.83.71 106.105.70.51 103.241.141.234
175.138.33.3 170.79.9.54 123.148.217.72 79.143.31.93