Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.139.182.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.139.182.248.		IN	A

;; AUTHORITY SECTION:
.			291	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:55:13 CST 2023
;; MSG SIZE  rcvd: 108
Host info
248.182.139.106.in-addr.arpa domain name pointer KD106139182248.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.182.139.106.in-addr.arpa	name = KD106139182248.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.27.86.166 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-07 14:07:31
92.222.216.71 attackbotsspam
Sep  7 08:08:15 v22019058497090703 sshd[27797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.71
Sep  7 08:08:17 v22019058497090703 sshd[27797]: Failed password for invalid user git from 92.222.216.71 port 42688 ssh2
Sep  7 08:12:13 v22019058497090703 sshd[28166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.71
...
2019-09-07 14:51:53
49.88.112.78 attack
Sep  6 20:50:16 hiderm sshd\[18445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.78  user=root
Sep  6 20:50:18 hiderm sshd\[18445\]: Failed password for root from 49.88.112.78 port 33685 ssh2
Sep  6 20:50:23 hiderm sshd\[18456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.78  user=root
Sep  6 20:50:25 hiderm sshd\[18456\]: Failed password for root from 49.88.112.78 port 27184 ssh2
Sep  6 20:50:33 hiderm sshd\[18458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.78  user=root
2019-09-07 14:55:12
86.121.38.42 attack
Honeypot attack, port: 23, PTR: static-86-121-38-42.rdsnet.ro.
2019-09-07 14:28:31
141.98.9.67 attackbots
Sep  7 08:00:20 relay postfix/smtpd\[8074\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 08:00:39 relay postfix/smtpd\[2624\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 08:01:04 relay postfix/smtpd\[4737\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 08:01:23 relay postfix/smtpd\[2624\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 08:01:47 relay postfix/smtpd\[8073\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-07 14:10:11
51.254.220.20 attackbots
Sep  7 06:52:34 www5 sshd\[3375\]: Invalid user jenkins from 51.254.220.20
Sep  7 06:52:34 www5 sshd\[3375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20
Sep  7 06:52:36 www5 sshd\[3375\]: Failed password for invalid user jenkins from 51.254.220.20 port 55996 ssh2
...
2019-09-07 14:55:42
122.225.200.114 attackspambots
$f2bV_matches
2019-09-07 14:43:16
68.183.127.13 attackbots
Sep  7 07:58:41 plex sshd[11481]: Invalid user user from 68.183.127.13 port 51232
2019-09-07 14:06:13
129.211.80.201 attackbotsspam
Sep  7 03:47:38 localhost sshd\[2459\]: Invalid user 123456789 from 129.211.80.201 port 52991
Sep  7 03:47:38 localhost sshd\[2459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.80.201
Sep  7 03:47:39 localhost sshd\[2459\]: Failed password for invalid user 123456789 from 129.211.80.201 port 52991 ssh2
2019-09-07 14:33:28
163.172.13.168 attackspam
Sep  6 20:33:46 aiointranet sshd\[16474\]: Invalid user 123456 from 163.172.13.168
Sep  6 20:33:46 aiointranet sshd\[16474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163-172-13-168.rev.poneytelecom.eu
Sep  6 20:33:47 aiointranet sshd\[16474\]: Failed password for invalid user 123456 from 163.172.13.168 port 49921 ssh2
Sep  6 20:37:55 aiointranet sshd\[16856\]: Invalid user miusuario from 163.172.13.168
Sep  6 20:37:55 aiointranet sshd\[16856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163-172-13-168.rev.poneytelecom.eu
2019-09-07 14:50:52
106.12.24.170 attackbotsspam
Sep  7 03:52:01 game-panel sshd[21391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.170
Sep  7 03:52:03 game-panel sshd[21391]: Failed password for invalid user nagios12345 from 106.12.24.170 port 49620 ssh2
Sep  7 03:56:01 game-panel sshd[21542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.170
2019-09-07 14:39:28
118.243.117.67 attack
$f2bV_matches
2019-09-07 14:45:03
176.56.236.21 attackbots
Brute force attempt
2019-09-07 14:46:43
190.145.19.99 attack
Sep  7 06:49:21 core sshd[10623]: Invalid user guest from 190.145.19.99 port 58178
Sep  7 06:49:23 core sshd[10623]: Failed password for invalid user guest from 190.145.19.99 port 58178 ssh2
...
2019-09-07 14:35:12
165.22.246.63 attackbots
$f2bV_matches
2019-09-07 15:01:15

Recently Reported IPs

106.139.190.163 106.139.67.83 106.139.167.27 106.139.36.106
106.139.173.98 106.139.179.43 106.139.138.42 106.139.42.218
106.139.162.6 106.139.141.239 106.139.23.241 106.139.126.17
106.139.49.118 106.139.132.231 106.139.139.127 106.139.121.181
106.139.177.211 106.138.81.240 106.139.122.97 106.138.66.166