Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.116.198.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.116.198.1.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 07:46:07 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 1.198.116.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.198.116.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.4.109.159 attackspam
Invalid user n from 81.4.109.159 port 54376
2020-04-29 17:23:11
122.156.219.158 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-29 17:34:22
125.99.159.87 attackspambots
Unauthorized SSH login attempts
2020-04-29 17:36:09
222.186.180.41 attackbots
Apr 29 11:11:01 server sshd[43734]: Failed none for root from 222.186.180.41 port 9634 ssh2
Apr 29 11:11:04 server sshd[43734]: Failed password for root from 222.186.180.41 port 9634 ssh2
Apr 29 11:11:06 server sshd[43734]: Failed password for root from 222.186.180.41 port 9634 ssh2
2020-04-29 17:11:47
51.68.227.98 attackbots
k+ssh-bruteforce
2020-04-29 17:33:41
5.94.20.9 attack
Unauthorized connection attempt detected from IP address 5.94.20.9 to port 23
2020-04-29 17:35:39
138.68.148.177 attack
Apr 29 07:51:46 l03 sshd[3082]: Invalid user ftpuser from 138.68.148.177 port 34724
...
2020-04-29 17:21:34
80.211.238.5 attackspambots
[Aegis] @ 2019-07-03 08:40:49  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-04-29 17:20:44
45.227.255.4 attackbots
SSH Brute-Forcing (server1)
2020-04-29 16:56:28
1.159.18.236 attackspam
Automatic report - Port Scan Attack
2020-04-29 17:08:02
222.186.52.39 attackbotsspam
Apr 29 08:54:45 scw-6657dc sshd[4935]: Failed password for root from 222.186.52.39 port 10519 ssh2
Apr 29 08:54:45 scw-6657dc sshd[4935]: Failed password for root from 222.186.52.39 port 10519 ssh2
Apr 29 08:54:48 scw-6657dc sshd[4935]: Failed password for root from 222.186.52.39 port 10519 ssh2
...
2020-04-29 17:05:37
123.206.45.16 attackbotsspam
$f2bV_matches
2020-04-29 17:32:51
74.199.108.162 attackspam
Apr 28 23:03:35 php1 sshd\[5042\]: Invalid user suporte from 74.199.108.162
Apr 28 23:03:35 php1 sshd\[5042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.199.108.162
Apr 28 23:03:37 php1 sshd\[5042\]: Failed password for invalid user suporte from 74.199.108.162 port 53396 ssh2
Apr 28 23:07:25 php1 sshd\[6029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.199.108.162  user=root
Apr 28 23:07:27 php1 sshd\[6029\]: Failed password for root from 74.199.108.162 port 35490 ssh2
2020-04-29 17:21:14
110.43.49.148 attack
Apr 29 10:30:09 server sshd[12532]: Failed password for invalid user fork from 110.43.49.148 port 25040 ssh2
Apr 29 10:34:21 server sshd[13935]: Failed password for invalid user eoffice from 110.43.49.148 port 10074 ssh2
Apr 29 10:53:57 server sshd[20232]: Failed password for root from 110.43.49.148 port 14720 ssh2
2020-04-29 17:24:06
115.68.207.164 attackbotsspam
$f2bV_matches
2020-04-29 16:58:52

Recently Reported IPs

106.116.189.165 106.116.226.107 106.116.32.245 106.116.114.246
106.116.173.126 106.116.0.0 106.116.171.201 106.116.166.126
106.116.25.133 106.116.15.201 106.115.9.174 106.116.16.241
106.116.204.205 106.115.84.213 106.116.31.225 106.116.152.90
106.115.53.3 106.115.55.12 106.115.249.178 106.115.58.33