Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.122.212.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.122.212.80.			IN	A

;; AUTHORITY SECTION:
.			422	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 06:33:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
80.212.122.106.in-addr.arpa domain name pointer 80.212.122.106.broad.xm.fj.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.212.122.106.in-addr.arpa	name = 80.212.122.106.broad.xm.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.156.95.250 attack
1601930509 - 10/05/2020 22:41:49 Host: 177.156.95.250/177.156.95.250 Port: 445 TCP Blocked
2020-10-06 15:01:25
181.48.134.66 attack
$f2bV_matches
2020-10-06 15:33:43
175.103.40.69 attack
Automatic report - Banned IP Access
2020-10-06 15:19:32
104.140.80.4 attack
Email rejected due to spam filtering
2020-10-06 15:24:05
143.110.184.96 attackspambots
SP-Scan 58145:3389 detected 2020.10.05 19:37:45
blocked until 2020.11.24 11:40:32
2020-10-06 15:32:25
94.182.189.235 attackspambots
Oct  6 06:26:41 root sshd[28163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.189.235  user=root
Oct  6 06:26:43 root sshd[28163]: Failed password for root from 94.182.189.235 port 41826 ssh2
...
2020-10-06 15:03:40
134.101.138.47 attack
Oct  5 22:38:37 alaska sshd[29486]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:43 alaska sshd[29496]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:48 alaska sshd[29506]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:53 alaska sshd[29527]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:59 alaska sshd[29537]: refused connect from 134.101.138.47 (134.101.138.47)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.101.138.47
2020-10-06 15:45:53
50.66.177.24 attackbotsspam
SSH auth scanning - multiple failed logins
2020-10-06 15:38:00
190.24.56.61 attackbots
1601930504 - 10/05/2020 22:41:44 Host: 190.24.56.61/190.24.56.61 Port: 445 TCP Blocked
2020-10-06 15:06:00
123.206.219.211 attackbotsspam
Invalid user jeremy from 123.206.219.211 port 45034
2020-10-06 15:18:38
88.207.113.101 attackspambots
C1,WP GET /wp-login.php
2020-10-06 15:22:01
112.2.219.4 attack
Invalid user sunshine from 112.2.219.4 port 51982
2020-10-06 15:24:56
192.126.160.218 attackspambots
Automatic report - Banned IP Access
2020-10-06 15:07:27
2.186.170.165 attackbots
Brute forcing RDP port 3389
2020-10-06 15:40:15
122.51.186.86 attackbotsspam
Invalid user diana from 122.51.186.86 port 48022
2020-10-06 15:34:15

Recently Reported IPs

106.122.212.229 106.122.212.87 203.123.139.228 106.124.147.187
106.125.237.97 106.125.246.105 106.126.14.133 106.126.14.180
106.126.14.181 106.13.0.78 106.13.104.73 106.13.126.194
106.13.14.132 106.13.144.25 106.13.229.115 106.13.234.160
106.13.26.10 106.13.26.65 106.13.3.140 106.13.63.17