Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.118.46.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.118.46.242.			IN	A

;; AUTHORITY SECTION:
.			59	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 07:44:17 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 242.46.118.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.46.118.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.175.73.186 attack
Unauthorized connection attempt from IP address 203.175.73.186 on Port 445(SMB)
2019-06-29 20:53:12
36.68.160.163 attackspam
Unauthorized connection attempt from IP address 36.68.160.163 on Port 445(SMB)
2019-06-29 20:58:49
164.151.136.178 attackspambots
Unauthorized connection attempt from IP address 164.151.136.178 on Port 445(SMB)
2019-06-29 21:03:15
36.189.253.226 attack
Jun 29 14:20:06 MK-Soft-Root1 sshd\[15298\]: Invalid user da from 36.189.253.226 port 60865
Jun 29 14:20:06 MK-Soft-Root1 sshd\[15298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226
Jun 29 14:20:07 MK-Soft-Root1 sshd\[15298\]: Failed password for invalid user da from 36.189.253.226 port 60865 ssh2
...
2019-06-29 21:29:39
185.181.8.197 attack
Jun 29 04:32:33 localhost kernel: [13041346.867190] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=185.181.8.197 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=60 ID=46821 DF PROTO=TCP SPT=37312 DPT=21 WINDOW=29200 RES=0x00 SYN URGP=0 
Jun 29 04:32:33 localhost kernel: [13041346.867220] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=185.181.8.197 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=60 ID=46821 DF PROTO=TCP SPT=37312 DPT=21 SEQ=2360221592 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 
Jun 29 04:32:47 localhost kernel: [13041361.188715] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=185.181.8.197 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=51846 DF PROTO=TCP SPT=46523 DPT=21 WINDOW=29200 RES=0x00 SYN URGP=0 
Jun 29 04:32:47 localhost kernel: [13041361.188724] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=185.181.8.197 DST=[mungedIP2] LEN=40 TOS=0x
2019-06-29 21:34:13
196.202.47.61 attackbots
Unauthorized connection attempt from IP address 196.202.47.61 on Port 445(SMB)
2019-06-29 20:51:49
193.93.77.61 attackspam
Unauthorized connection attempt from IP address 193.93.77.61 on Port 445(SMB)
2019-06-29 21:03:35
185.176.27.42 attackspambots
29.06.2019 12:43:59 Connection to port 3087 blocked by firewall
2019-06-29 21:19:07
184.105.139.119 attackspambots
scan r
2019-06-29 21:07:10
31.23.4.44 attackbots
Unauthorized connection attempt from IP address 31.23.4.44 on Port 445(SMB)
2019-06-29 21:06:18
137.74.50.116 attackbots
445/tcp 445/tcp
[2019-06-29]2pkt
2019-06-29 21:15:04
41.39.98.99 attack
Unauthorized connection attempt from IP address 41.39.98.99 on Port 445(SMB)
2019-06-29 21:07:48
31.167.54.84 attackbotsspam
Unauthorized connection attempt from IP address 31.167.54.84 on Port 445(SMB)
2019-06-29 20:48:48
210.59.145.167 attackbotsspam
Jun 29 14:53:01 giegler sshd[31717]: Invalid user kirk from 210.59.145.167 port 48600
Jun 29 14:53:04 giegler sshd[31717]: Failed password for invalid user kirk from 210.59.145.167 port 48600 ssh2
Jun 29 14:53:01 giegler sshd[31717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.59.145.167
Jun 29 14:53:01 giegler sshd[31717]: Invalid user kirk from 210.59.145.167 port 48600
Jun 29 14:53:04 giegler sshd[31717]: Failed password for invalid user kirk from 210.59.145.167 port 48600 ssh2
2019-06-29 20:57:14
128.199.104.232 attackspambots
2019-06-29T19:43:41.335676enmeeting.mahidol.ac.th sshd\[23899\]: Invalid user rb from 128.199.104.232 port 54362
2019-06-29T19:43:41.350130enmeeting.mahidol.ac.th sshd\[23899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.104.232
2019-06-29T19:43:43.059449enmeeting.mahidol.ac.th sshd\[23899\]: Failed password for invalid user rb from 128.199.104.232 port 54362 ssh2
...
2019-06-29 21:27:53

Recently Reported IPs

106.119.133.100 106.119.172.187 106.119.120.134 106.118.62.56
106.118.222.242 106.119.17.219 106.118.3.49 106.118.48.230
106.118.45.255 106.119.252.109 106.118.250.36 106.119.19.141
106.118.196.18 106.119.141.94 106.119.146.127 106.119.105.184
106.119.48.102 106.118.172.186 106.119.248.152 106.118.66.93