Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.107.196.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.107.196.105.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100701 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 08 01:38:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
105.196.107.106.in-addr.arpa domain name pointer 106.107.196.105.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.196.107.106.in-addr.arpa	name = 106.107.196.105.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.233.1.28 attack
5555/tcp
[2020-04-15]1pkt
2020-04-16 04:08:52
37.151.69.131 attack
1586952397 - 04/15/2020 14:06:37 Host: 37.151.69.131/37.151.69.131 Port: 445 TCP Blocked
2020-04-16 04:01:54
5.135.253.172 attackbots
Fail2Ban Ban Triggered
2020-04-16 03:54:43
222.252.111.11 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-04-16 03:58:41
51.91.212.80 attackspam
04/15/2020-15:58:33.927913 51.91.212.80 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2020-04-16 04:09:23
111.229.57.21 attackspam
frenzy
2020-04-16 04:17:43
74.82.47.34 attackbots
SMB Server BruteForce Attack
2020-04-16 04:08:36
132.232.218.246 attackspam
SSH/22 MH Probe, BF, Hack -
2020-04-16 03:57:48
162.243.133.39 attackspam
Port Scan: Events[2] countPorts[2]: 21 28015 ..
2020-04-16 04:35:12
41.226.11.252 attack
$f2bV_matches
2020-04-16 04:00:37
196.52.43.57 attack
Port Scan: Events[1] countPorts[1]: 5632 ..
2020-04-16 04:32:52
121.46.26.126 attackspam
$f2bV_matches
2020-04-16 03:58:17
117.50.6.27 attackspambots
Apr 15 22:29:18  sshd\[22205\]: Invalid user cturner from 117.50.6.27Apr 15 22:29:20  sshd\[22205\]: Failed password for invalid user cturner from 117.50.6.27 port 47616 ssh2
...
2020-04-16 04:29:49
178.128.94.116 attack
$f2bV_matches
2020-04-16 04:04:17
150.109.62.167 attackbotsspam
Apr 15 22:05:46 www2 sshd\[36697\]: Invalid user av from 150.109.62.167Apr 15 22:05:48 www2 sshd\[36697\]: Failed password for invalid user av from 150.109.62.167 port 39818 ssh2Apr 15 22:11:34 www2 sshd\[37332\]: Invalid user patrick from 150.109.62.167
...
2020-04-16 04:16:57

Recently Reported IPs

47.200.32.215 59.120.73.247 138.68.70.123 95.216.148.120
110.181.108.188 117.63.65.190 117.63.127.29 83.8.159.177
79.225.79.78 91.134.26.205 121.147.146.230 41.79.235.92
180.116.173.224 78.69.113.134 71.92.60.227 80.76.35.248
106.110.202.118 117.81.195.182 121.239.104.84 69.167.13.37