Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.13.222.115 attackbots
Aug 30 01:39:45 ajax sshd[27673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.222.115 
Aug 30 01:39:47 ajax sshd[27673]: Failed password for invalid user bill from 106.13.222.115 port 51512 ssh2
2020-08-30 08:51:08
106.13.222.115 attackspam
SSH Brute-Force. Ports scanning.
2020-08-23 04:36:54
106.13.222.115 attackbotsspam
SSH Invalid Login
2020-08-22 05:48:01
106.13.222.115 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-19 04:16:28
106.13.222.115 attack
Aug 12 05:46:09 marvibiene sshd[10417]: Failed password for root from 106.13.222.115 port 38090 ssh2
Aug 12 05:53:35 marvibiene sshd[10762]: Failed password for root from 106.13.222.115 port 49102 ssh2
2020-08-12 12:11:39
106.13.222.115 attackspam
$f2bV_matches
2020-08-12 00:26:49
106.13.222.115 attackbotsspam
Aug  4 08:03:29 rancher-0 sshd[761208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.222.115  user=root
Aug  4 08:03:30 rancher-0 sshd[761208]: Failed password for root from 106.13.222.115 port 41784 ssh2
...
2020-08-04 14:19:19
106.13.222.115 attackbots
Aug  1 19:18:49 mail sshd\[36556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.222.115  user=root
...
2020-08-02 08:23:36
106.13.222.115 attackbotsspam
Failed password for invalid user tatenda from 106.13.222.115 port 44066 ssh2
2020-07-09 19:01:59
106.13.222.115 attackspambots
Ssh brute force
2020-07-08 09:36:32
106.13.222.115 attackspam
Jun 21 19:12:55 webhost01 sshd[16166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.222.115
Jun 21 19:12:57 webhost01 sshd[16166]: Failed password for invalid user jboss from 106.13.222.115 port 41718 ssh2
...
2020-06-22 00:58:30
106.13.222.115 attack
Jun 13 02:01:33 XXX sshd[44213]: Invalid user admin from 106.13.222.115 port 50302
2020-06-14 09:09:52
106.13.222.115 attackspambots
5x Failed Password
2020-06-08 02:27:20
106.13.222.115 attackspambots
Tried sshing with brute force.
2020-06-05 06:53:16
106.13.222.115 attackbotsspam
May 15 14:27:19 melroy-server sshd[3388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.222.115 
May 15 14:27:21 melroy-server sshd[3388]: Failed password for invalid user dspace from 106.13.222.115 port 52470 ssh2
...
2020-05-15 21:51:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.13.222.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.13.222.148.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 05:47:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 148.222.13.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.222.13.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.63.167.178 attackspambots
rdp brute-force attack (aggressivity: high)
2020-03-18 00:27:26
222.222.141.171 attackbotsspam
Mar 16 23:38:58 web9 sshd\[1582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.222.141.171  user=root
Mar 16 23:39:01 web9 sshd\[1582\]: Failed password for root from 222.222.141.171 port 48133 ssh2
Mar 16 23:42:42 web9 sshd\[2065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.222.141.171  user=root
Mar 16 23:42:43 web9 sshd\[2065\]: Failed password for root from 222.222.141.171 port 42263 ssh2
Mar 16 23:46:17 web9 sshd\[2579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.222.141.171  user=root
2020-03-18 00:38:50
222.186.15.158 attackbotsspam
2020-03-17T17:38:42.039806scmdmz1 sshd[16388]: Failed password for root from 222.186.15.158 port 12431 ssh2
2020-03-17T17:38:41.380317scmdmz1 sshd[16390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
2020-03-17T17:38:43.153557scmdmz1 sshd[16390]: Failed password for root from 222.186.15.158 port 58999 ssh2
...
2020-03-18 00:43:16
203.195.157.36 attack
Mar 17 13:14:16 jane sshd[10341]: Failed password for root from 203.195.157.36 port 10485 ssh2
Mar 17 13:16:51 jane sshd[14723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.157.36 
...
2020-03-18 00:45:11
117.198.135.250 attackspambots
Mar 17 13:00:40 ns3042688 courier-imaps: LOGIN FAILED, method=PLAIN, ip=\[::ffff:117.198.135.250\]
...
2020-03-18 00:16:05
49.235.20.79 attackbotsspam
...
2020-03-18 00:46:35
171.251.233.105 attackspambots
firewall-block, port(s): 1433/tcp
2020-03-18 00:53:10
96.92.222.124 attackbotsspam
RDP brute forcing (d)
2020-03-18 00:28:57
70.119.124.150 attack
Mar 17 09:40:55 debian-2gb-nbg1-2 kernel: \[6693571.718900\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=70.119.124.150 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=589 DF PROTO=TCP SPT=61064 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2020-03-18 00:24:54
218.92.0.158 attackbots
Mar 17 17:42:26 vps691689 sshd[29397]: Failed password for root from 218.92.0.158 port 39075 ssh2
Mar 17 17:42:38 vps691689 sshd[29397]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 39075 ssh2 [preauth]
...
2020-03-18 00:51:55
5.117.121.1 attackspambots
1584434460 - 03/17/2020 09:41:00 Host: 5.117.121.1/5.117.121.1 Port: 445 TCP Blocked
2020-03-18 00:19:12
106.13.212.194 attackbots
Mar 17 04:40:30 plusreed sshd[1143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.212.194  user=root
Mar 17 04:40:31 plusreed sshd[1143]: Failed password for root from 106.13.212.194 port 53244 ssh2
...
2020-03-18 00:40:42
222.186.31.135 attack
Mar 17 17:53:55 rotator sshd\[1385\]: Failed password for root from 222.186.31.135 port 18754 ssh2Mar 17 17:53:57 rotator sshd\[1385\]: Failed password for root from 222.186.31.135 port 18754 ssh2Mar 17 17:54:00 rotator sshd\[1385\]: Failed password for root from 222.186.31.135 port 18754 ssh2Mar 17 17:56:51 rotator sshd\[2160\]: Failed password for root from 222.186.31.135 port 51716 ssh2Mar 17 17:56:55 rotator sshd\[2160\]: Failed password for root from 222.186.31.135 port 51716 ssh2Mar 17 17:56:57 rotator sshd\[2160\]: Failed password for root from 222.186.31.135 port 51716 ssh2
...
2020-03-18 01:01:12
14.162.147.251 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 17-03-2020 08:40:10.
2020-03-18 01:05:22
122.228.19.80 attack
122.228.19.80 was recorded 13 times by 7 hosts attempting to connect to the following ports: 515,37,16993,27017,7001,4880,9876,1991,4000,4369,55443,520,1201. Incident counter (4h, 24h, all-time): 13, 70, 28099
2020-03-18 00:59:38

Recently Reported IPs

106.126.15.159 106.13.45.102 106.14.135.67 106.14.176.244
106.14.183.175 106.14.29.180 106.15.195.212 106.15.72.208
106.15.93.220 106.208.59.63 106.210.1.73 106.210.109.60
106.210.149.14 106.210.32.226 106.210.99.141 106.211.2.113
106.211.213.212 106.211.45.178 106.211.47.239 106.211.88.166