Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.130.116.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.130.116.57.			IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:57:14 CST 2023
;; MSG SIZE  rcvd: 107
Host info
57.116.130.106.in-addr.arpa domain name pointer KD106130116057.au-net.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.116.130.106.in-addr.arpa	name = KD106130116057.au-net.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.202.233.45 attackbots
RDP brute forcing (r)
2020-07-24 12:16:33
188.166.117.213 attack
Jul 24 00:07:27 ny01 sshd[30889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213
Jul 24 00:07:29 ny01 sshd[30889]: Failed password for invalid user admin from 188.166.117.213 port 49176 ssh2
Jul 24 00:11:28 ny01 sshd[31958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213
2020-07-24 12:14:13
185.234.218.85 attackspam
2020-07-23T21:55:23.735522linuxbox-skyline auth[170173]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=fernando rhost=185.234.218.85
...
2020-07-24 12:27:43
79.137.80.110 attackspam
Failed password for invalid user ct from 79.137.80.110 port 46170 ssh2
2020-07-24 12:11:01
49.233.180.38 attackbotsspam
SSH BruteForce Attack
2020-07-24 12:07:27
74.124.24.114 attackbotsspam
Jul 23 21:47:36 server1 sshd\[6338\]: Failed password for invalid user admin from 74.124.24.114 port 36964 ssh2
Jul 23 21:51:29 server1 sshd\[7440\]: Invalid user customers from 74.124.24.114
Jul 23 21:51:29 server1 sshd\[7440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.124.24.114 
Jul 23 21:51:31 server1 sshd\[7440\]: Failed password for invalid user customers from 74.124.24.114 port 50680 ssh2
Jul 23 21:55:37 server1 sshd\[8521\]: Invalid user andy from 74.124.24.114
...
2020-07-24 12:06:58
134.122.20.146 attackspam
Jul 24 05:58:52  sshd\[20312\]: Invalid user yly from 134.122.20.146Jul 24 05:58:54  sshd\[20312\]: Failed password for invalid user yly from 134.122.20.146 port 59258 ssh2
...
2020-07-24 12:16:15
64.227.97.122 attackspambots
Jul 24 06:54:11 lukav-desktop sshd\[21177\]: Invalid user ninja from 64.227.97.122
Jul 24 06:54:11 lukav-desktop sshd\[21177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.97.122
Jul 24 06:54:13 lukav-desktop sshd\[21177\]: Failed password for invalid user ninja from 64.227.97.122 port 33554 ssh2
Jul 24 07:03:46 lukav-desktop sshd\[21415\]: Invalid user sergey from 64.227.97.122
Jul 24 07:03:46 lukav-desktop sshd\[21415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.97.122
2020-07-24 12:11:14
207.154.218.16 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-24 12:28:33
159.89.9.84 attackspam
SSH brute force
2020-07-24 08:15:11
104.248.61.192 attack
Invalid user zen from 104.248.61.192 port 33848
2020-07-24 12:10:11
139.59.16.88 attackbots
Invalid user danb from 139.59.16.88 port 47468
2020-07-24 12:28:06
159.89.38.228 attackspambots
" "
2020-07-24 08:20:39
202.88.237.15 attackbots
ssh brute force
2020-07-24 12:27:25
216.244.66.227 attack
$f2bV_matches
2020-07-24 08:22:28

Recently Reported IPs

106.130.46.0 106.130.120.90 106.130.140.161 106.130.164.88
106.130.128.201 106.130.109.65 106.130.173.164 106.130.104.236
106.130.7.88 106.130.16.135 106.130.215.134 106.13.90.153
106.13.75.124 106.13.66.126 106.13.65.208 106.13.51.18
106.13.41.102 106.13.37.118 106.13.3.170 106.13.244.231