Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.116.81.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.116.81.114.			IN	A

;; AUTHORITY SECTION:
.			156	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:21:09 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 114.81.116.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.81.116.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.251.41.52 attack
Feb 11 13:21:58 hpm sshd\[26819\]: Invalid user test from 213.251.41.52
Feb 11 13:21:58 hpm sshd\[26819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.41.52
Feb 11 13:22:00 hpm sshd\[26819\]: Failed password for invalid user test from 213.251.41.52 port 55286 ssh2
Feb 11 13:24:49 hpm sshd\[27232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.41.52  user=root
Feb 11 13:24:51 hpm sshd\[27232\]: Failed password for root from 213.251.41.52 port 55474 ssh2
2020-02-12 07:28:47
60.247.36.119 attackspam
Feb 11 23:54:03 mout sshd[21487]: Invalid user chi from 60.247.36.119 port 48587
2020-02-12 07:04:31
1.179.137.10 attack
Feb 12 00:13:03 legacy sshd[10491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10
Feb 12 00:13:05 legacy sshd[10491]: Failed password for invalid user 1234 from 1.179.137.10 port 57238 ssh2
Feb 12 00:16:51 legacy sshd[10813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10
...
2020-02-12 07:31:06
185.176.27.54 attackbotsspam
02/11/2020-17:43:25.791071 185.176.27.54 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-12 07:37:02
182.61.3.223 attack
Feb 11 23:13:47 prox sshd[30903]: Failed password for root from 182.61.3.223 port 52530 ssh2
Feb 11 23:18:49 prox sshd[2686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.3.223
2020-02-12 07:22:47
35.222.209.136 attackspam
Web bot scraping website [bot:python8]
2020-02-12 07:22:05
88.214.26.20 attack
200211 17:15:28 [Warning] Access denied for user 'root'@'88.214.26.20' (using password: YES)
200211 17:15:31 [Warning] Access denied for user 'root'@'88.214.26.20' (using password: YES)
200211 17:15:34 [Warning] Access denied for user 'root'@'88.214.26.20' (using password: YES)
...
2020-02-12 06:59:07
189.232.117.90 attackbots
Automatic report - Port Scan Attack
2020-02-12 07:21:14
106.12.26.160 attackbots
Feb 11 23:28:57  sshd\[22375\]: Invalid user docker from 106.12.26.160Feb 11 23:28:59  sshd\[22375\]: Failed password for invalid user docker from 106.12.26.160 port 43504 ssh2
...
2020-02-12 07:13:20
106.13.37.203 attack
Feb 12 00:13:39 dedicated sshd[30527]: Invalid user Freddy from 106.13.37.203 port 41288
2020-02-12 07:21:42
47.176.39.218 attackbotsspam
Feb 12 00:25:28 silence02 sshd[32532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.176.39.218
Feb 12 00:25:31 silence02 sshd[32532]: Failed password for invalid user gavin from 47.176.39.218 port 21461 ssh2
Feb 12 00:28:31 silence02 sshd[325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.176.39.218
2020-02-12 07:35:00
88.214.26.17 attackbotsspam
200211 17:15:27 [Warning] Access denied for user 'root'@'88.214.26.17' (using password: YES)
200211 17:15:30 [Warning] Access denied for user 'root'@'88.214.26.17' (using password: YES)
200211 17:15:32 [Warning] Access denied for user 'root'@'88.214.26.17' (using password: YES)
...
2020-02-12 07:10:24
191.205.176.80 attackspam
1581460135 - 02/11/2020 23:28:55 Host: 191.205.176.80/191.205.176.80 Port: 445 TCP Blocked
2020-02-12 07:15:35
202.62.88.126 attackspambots
1581460124 - 02/11/2020 23:28:44 Host: 202.62.88.126/202.62.88.126 Port: 445 TCP Blocked
2020-02-12 07:22:23
176.31.252.148 attackspambots
Feb 11 23:28:56 pornomens sshd\[31834\]: Invalid user guest from 176.31.252.148 port 48164
Feb 11 23:28:56 pornomens sshd\[31834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.252.148
Feb 11 23:28:58 pornomens sshd\[31834\]: Failed password for invalid user guest from 176.31.252.148 port 48164 ssh2
...
2020-02-12 07:13:54

Recently Reported IPs

106.116.80.83 101.236.19.186 101.236.19.189 101.236.19.210
87.62.65.200 101.236.19.213 101.236.19.214 101.236.19.216
106.122.165.64 106.122.168.10 106.122.165.7 106.122.165.78
106.122.165.99 106.122.165.81 106.122.165.52 106.122.165.43
106.122.165.41 106.122.165.44 23.145.205.47 106.122.165.85