Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.125.244.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.125.244.164.		IN	A

;; AUTHORITY SECTION:
.			86	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:29:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 164.244.125.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.244.125.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.195.150.131 attack
Aug  8 22:44:00 buvik sshd[4856]: Failed password for root from 203.195.150.131 port 58820 ssh2
Aug  8 22:47:51 buvik sshd[5422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.150.131  user=root
Aug  8 22:47:53 buvik sshd[5422]: Failed password for root from 203.195.150.131 port 45578 ssh2
...
2020-08-09 05:10:25
222.186.180.130 attackbotsspam
2020-08-08T20:42:14.651169dmca.cloudsearch.cf sshd[27223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-08-08T20:42:16.859625dmca.cloudsearch.cf sshd[27223]: Failed password for root from 222.186.180.130 port 33932 ssh2
2020-08-08T20:42:18.991880dmca.cloudsearch.cf sshd[27223]: Failed password for root from 222.186.180.130 port 33932 ssh2
2020-08-08T20:42:14.651169dmca.cloudsearch.cf sshd[27223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-08-08T20:42:16.859625dmca.cloudsearch.cf sshd[27223]: Failed password for root from 222.186.180.130 port 33932 ssh2
2020-08-08T20:42:18.991880dmca.cloudsearch.cf sshd[27223]: Failed password for root from 222.186.180.130 port 33932 ssh2
2020-08-08T20:42:14.651169dmca.cloudsearch.cf sshd[27223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user
...
2020-08-09 04:42:46
46.101.209.178 attackbotsspam
Failed password for root from 46.101.209.178 port 36318 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=goryansky.ru  user=root
Failed password for root from 46.101.209.178 port 48190 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=goryansky.ru  user=root
Failed password for root from 46.101.209.178 port 60064 ssh2
2020-08-09 05:11:31
49.232.17.14 attackspam
Aug  8 17:24:20 firewall sshd[13459]: Failed password for root from 49.232.17.14 port 42376 ssh2
Aug  8 17:28:50 firewall sshd[13630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.17.14  user=root
Aug  8 17:28:52 firewall sshd[13630]: Failed password for root from 49.232.17.14 port 34174 ssh2
...
2020-08-09 04:36:55
129.211.36.4 attack
Aug  8 17:22:12 ws12vmsma01 sshd[48825]: Failed password for root from 129.211.36.4 port 59204 ssh2
Aug  8 17:26:44 ws12vmsma01 sshd[49446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.36.4  user=root
Aug  8 17:26:46 ws12vmsma01 sshd[49446]: Failed password for root from 129.211.36.4 port 41908 ssh2
...
2020-08-09 04:48:31
51.83.42.108 attackspambots
Aug  8 20:43:31 localhost sshd[106888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.ip-51-83-42.eu  user=root
Aug  8 20:43:34 localhost sshd[106888]: Failed password for root from 51.83.42.108 port 40230 ssh2
Aug  8 20:47:20 localhost sshd[107327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.ip-51-83-42.eu  user=root
Aug  8 20:47:22 localhost sshd[107327]: Failed password for root from 51.83.42.108 port 51384 ssh2
Aug  8 20:51:11 localhost sshd[107713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.ip-51-83-42.eu  user=root
Aug  8 20:51:13 localhost sshd[107713]: Failed password for root from 51.83.42.108 port 34304 ssh2
...
2020-08-09 05:08:21
51.38.145.5 attack
From return-2jz9-marcos=marcoslimaimoveis.com.br@lansor.com.br Sat Aug 08 17:28:18 2020
Received: from ogm2oguwnjrl.nedan.we.bs ([51.38.145.5]:40601)
2020-08-09 05:02:02
45.129.33.155 attack
Port scan on 8 port(s): 33820 33823 33831 33834 33843 33850 33869 33876
2020-08-09 05:12:35
118.163.51.192 attackbots
20/8/8@16:28:12: FAIL: Alarm-Network address from=118.163.51.192
...
2020-08-09 05:11:03
52.82.60.27 attackbots
Aug  8 22:23:30 plg sshd[2834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.82.60.27  user=root
Aug  8 22:23:32 plg sshd[2834]: Failed password for invalid user root from 52.82.60.27 port 36440 ssh2
Aug  8 22:26:58 plg sshd[2868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.82.60.27  user=root
Aug  8 22:27:00 plg sshd[2868]: Failed password for invalid user root from 52.82.60.27 port 48948 ssh2
Aug  8 22:27:57 plg sshd[2872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.82.60.27  user=root
Aug  8 22:27:58 plg sshd[2872]: Failed password for invalid user root from 52.82.60.27 port 35902 ssh2
...
2020-08-09 04:33:57
198.100.146.67 attackbots
SSH invalid-user multiple login attempts
2020-08-09 04:38:25
180.126.58.175 attackspam
Aug  8 22:20:38 xxxx sshd[18687]: Bad protocol version identification '' from 180.126.58.175
Aug  8 22:20:47 xxxx sshd[18688]: Invalid user pi from 180.126.58.175
Aug  8 22:20:47 xxxx sshd[18688]: Failed none for invalid user pi from 180.126.58.175 port 58727 ssh2
Aug  8 22:20:47 xxxx sshd[18688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.58.175 
Aug  8 22:20:50 xxxx sshd[18688]: Failed password for invalid user pi from 180.126.58.175 port 58727 ssh2
Aug  8 22:20:58 xxxx sshd[18690]: Invalid user pi from 180.126.58.175
Aug  8 22:20:58 xxxx sshd[18690]: Failed none for invalid user pi from 180.126.58.175 port 36197 ssh2
Aug  8 22:20:58 xxxx sshd[18690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.58.175 
Aug  8 22:21:01 xxxx sshd[18690]: Failed password for invalid user pi from 180.126.58.175 port 36197 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip
2020-08-09 05:12:19
139.198.17.144 attackbotsspam
Aug  8 16:50:56 NPSTNNYC01T sshd[12817]: Failed password for root from 139.198.17.144 port 50962 ssh2
Aug  8 16:55:17 NPSTNNYC01T sshd[13195]: Failed password for root from 139.198.17.144 port 56854 ssh2
...
2020-08-09 05:01:07
80.234.165.143 attackbots
Lines containing failures of 80.234.165.143
Aug  8 22:10:26 nemesis sshd[19230]: Invalid user pi from 80.234.165.143 port 44806
Aug  8 22:10:26 nemesis sshd[19231]: Invalid user pi from 80.234.165.143 port 44810
Aug  8 22:10:26 nemesis sshd[19230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.234.165.143 
Aug  8 22:10:26 nemesis sshd[19231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.234.165.143 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.234.165.143
2020-08-09 05:09:21
178.128.125.10 attack
2020-08-08T22:20:48.073110amanda2.illicoweb.com sshd\[24693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.125.10  user=root
2020-08-08T22:20:50.066260amanda2.illicoweb.com sshd\[24693\]: Failed password for root from 178.128.125.10 port 57958 ssh2
2020-08-08T22:24:39.813824amanda2.illicoweb.com sshd\[25037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.125.10  user=root
2020-08-08T22:24:41.852122amanda2.illicoweb.com sshd\[25037\]: Failed password for root from 178.128.125.10 port 57781 ssh2
2020-08-08T22:28:23.624419amanda2.illicoweb.com sshd\[25268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.125.10  user=root
...
2020-08-09 04:58:48

Recently Reported IPs

106.125.239.90 106.125.244.141 106.125.244.180 106.125.244.190
106.125.244.234 106.125.244.206 106.125.244.221 106.125.244.242
106.125.244.239 106.14.199.49 106.125.244.252 106.125.244.37
106.125.244.35 106.125.244.248 106.125.244.48 106.125.244.200
106.125.244.5 106.125.244.41 106.125.244.6 106.14.199.54