Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.133.112.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17794
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.133.112.172.		IN	A

;; AUTHORITY SECTION:
.			232	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:56:34 CST 2023
;; MSG SIZE  rcvd: 108
Host info
172.112.133.106.in-addr.arpa domain name pointer KD106133112172.au-net.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
172.112.133.106.in-addr.arpa	name = KD106133112172.au-net.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.209.228.253 attackbots
Jul 16 06:37:29 lnxweb62 sshd[31678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253
2020-07-16 13:51:33
164.90.212.48 attackspam
 TCP (SYN) 164.90.212.48:50731 -> port 22, len 44
2020-07-16 13:53:49
213.183.101.89 attack
Invalid user oracle from 213.183.101.89 port 50140
2020-07-16 13:25:35
106.13.50.145 attack
Invalid user dasusr1 from 106.13.50.145 port 60146
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.50.145
Invalid user dasusr1 from 106.13.50.145 port 60146
Failed password for invalid user dasusr1 from 106.13.50.145 port 60146 ssh2
Invalid user berta from 106.13.50.145 port 36518
2020-07-16 13:34:55
112.220.106.164 attack
Invalid user jolly from 112.220.106.164 port 4029
2020-07-16 13:45:34
13.75.120.217 attack
Jul 16 06:55:09 haigwepa sshd[1397]: Failed password for root from 13.75.120.217 port 52722 ssh2
...
2020-07-16 13:47:53
194.186.76.162 attackspam
Unauthorised access (Jul 16) SRC=194.186.76.162 LEN=52 PREC=0x20 TTL=116 ID=18536 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-16 13:20:31
106.225.152.206 attackspambots
Jul 16 07:21:05 eventyay sshd[14678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.225.152.206
Jul 16 07:21:06 eventyay sshd[14678]: Failed password for invalid user sultan from 106.225.152.206 port 46560 ssh2
Jul 16 07:23:44 eventyay sshd[14804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.225.152.206
...
2020-07-16 13:37:21
47.89.179.29 attackspam
Wordpress attack
2020-07-16 13:44:22
45.145.66.107 attackspambots
[H1.VM2] Blocked by UFW
2020-07-16 13:22:15
52.17.98.131 attackspam
21 attempts against mh-misbehave-ban on apple
2020-07-16 13:32:01
95.216.29.232 attack
Jul 16 10:07:29 gw1 sshd[18477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.216.29.232
Jul 16 10:07:32 gw1 sshd[18477]: Failed password for invalid user james from 95.216.29.232 port 35372 ssh2
...
2020-07-16 13:31:10
119.254.12.66 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-16 13:50:33
52.247.30.42 attackbots
Jul 16 06:28:57 rancher-0 sshd[363136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.247.30.42  user=root
Jul 16 06:28:58 rancher-0 sshd[363136]: Failed password for root from 52.247.30.42 port 10110 ssh2
...
2020-07-16 13:42:23
50.62.177.116 attackbots
Automatic report - XMLRPC Attack
2020-07-16 13:32:30

Recently Reported IPs

106.133.12.191 106.133.100.11 106.132.94.114 106.133.18.106
106.133.169.25 106.133.10.161 106.133.151.173 106.132.8.80
106.133.131.29 106.132.85.103 106.132.63.42 106.133.2.177
106.133.39.121 106.132.52.107 106.132.56.248 106.132.40.159
106.132.49.252 106.132.242.188 106.132.37.223 106.132.249.144