Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.121.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22935
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.121.229.			IN	A

;; AUTHORITY SECTION:
.			573	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:30:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 229.121.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 229.121.14.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.242.25.96 attackspambots
scan z
2019-11-14 03:39:44
167.114.113.173 attackbots
SSH brutforce
2019-11-14 03:41:28
132.232.52.48 attackspambots
Nov 13 19:55:25 markkoudstaal sshd[32513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.52.48
Nov 13 19:55:26 markkoudstaal sshd[32513]: Failed password for invalid user agi from 132.232.52.48 port 33806 ssh2
Nov 13 20:00:24 markkoudstaal sshd[461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.52.48
2019-11-14 03:50:20
40.73.116.245 attackbotsspam
Nov 13 20:20:16 pornomens sshd\[1300\]: Invalid user cegnar from 40.73.116.245 port 59462
Nov 13 20:20:16 pornomens sshd\[1300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.116.245
Nov 13 20:20:18 pornomens sshd\[1300\]: Failed password for invalid user cegnar from 40.73.116.245 port 59462 ssh2
...
2019-11-14 03:34:17
41.90.122.21 attack
Unauthorized connection attempt from IP address 41.90.122.21 on Port 445(SMB)
2019-11-14 03:42:13
51.91.20.174 attackspambots
Nov 13 15:45:49 [host] sshd[22257]: Invalid user boennec from 51.91.20.174
Nov 13 15:45:49 [host] sshd[22257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.20.174
Nov 13 15:45:51 [host] sshd[22257]: Failed password for invalid user boennec from 51.91.20.174 port 39398 ssh2
2019-11-14 03:47:20
45.112.136.114 attackspambots
Unauthorized connection attempt from IP address 45.112.136.114 on Port 445(SMB)
2019-11-14 03:43:08
112.85.42.227 attack
Nov 13 13:58:38 TORMINT sshd\[4991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Nov 13 13:58:40 TORMINT sshd\[4991\]: Failed password for root from 112.85.42.227 port 30369 ssh2
Nov 13 13:58:42 TORMINT sshd\[4991\]: Failed password for root from 112.85.42.227 port 30369 ssh2
...
2019-11-14 03:13:41
179.108.254.128 attackspambots
Unauthorized connection attempt from IP address 179.108.254.128 on Port 445(SMB)
2019-11-14 03:45:33
190.79.251.71 attackspambots
Unauthorized connection attempt from IP address 190.79.251.71 on Port 445(SMB)
2019-11-14 03:49:29
95.216.212.165 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-14 03:44:44
46.53.234.240 attackbotsspam
Automatic report - Port Scan Attack
2019-11-14 03:23:20
49.88.112.117 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.117  user=root
Failed password for root from 49.88.112.117 port 48252 ssh2
Failed password for root from 49.88.112.117 port 48252 ssh2
Failed password for root from 49.88.112.117 port 48252 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.117  user=root
2019-11-14 03:22:52
114.141.50.171 attackbotsspam
Nov 13 20:07:08 vmanager6029 sshd\[28455\]: Invalid user colord from 114.141.50.171 port 37982
Nov 13 20:07:08 vmanager6029 sshd\[28455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.141.50.171
Nov 13 20:07:09 vmanager6029 sshd\[28455\]: Failed password for invalid user colord from 114.141.50.171 port 37982 ssh2
2019-11-14 03:46:28
203.113.164.134 attack
Unauthorized connection attempt from IP address 203.113.164.134 on Port 445(SMB)
2019-11-14 03:25:45

Recently Reported IPs

106.14.121.233 106.14.121.250 106.14.121.240 106.14.121.48
106.14.121.55 106.14.2.235 106.14.121.6 106.14.121.71
106.14.122.159 106.14.121.82 106.14.122.162 106.14.122.224
106.14.122.231 106.14.122.0 106.14.122.250 106.14.2.54
106.14.122.71 106.14.122.46 106.14.122.28 106.14.123.105