Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.159.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.159.42.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032201 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 23 03:21:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.159.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.159.14.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.54.64.55 attack
Feb 29 22:51:04 IngegnereFirenze sshd[8461]: Failed password for invalid user omn from 106.54.64.55 port 48618 ssh2
...
2020-03-01 06:55:33
45.180.73.217 attackspambots
Automatic report - Port Scan Attack
2020-03-01 07:17:38
66.229.19.7 attackspambots
Unauthorized connection attempt detected from IP address 66.229.19.7 to port 23 [J]
2020-03-01 06:46:01
195.154.45.194 attack
[2020-02-29 17:46:54] NOTICE[1148][C-0000d232] chan_sip.c: Call from '' (195.154.45.194:63169) to extension '5011972592277524' rejected because extension not found in context 'public'.
[2020-02-29 17:46:54] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-29T17:46:54.656-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="5011972592277524",SessionID="0x7fd82c4d9f48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.154.45.194/63169",ACLName="no_extension_match"
[2020-02-29 17:50:58] NOTICE[1148][C-0000d237] chan_sip.c: Call from '' (195.154.45.194:57334) to extension '4011972592277524' rejected because extension not found in context 'public'.
[2020-02-29 17:50:58] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-29T17:50:58.655-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4011972592277524",SessionID="0x7fd82c4d9f48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IP
...
2020-03-01 07:00:04
217.79.34.202 attackbots
$f2bV_matches
2020-03-01 07:18:48
218.92.0.171 attack
Feb 29 23:49:15 meumeu sshd[19835]: Failed password for root from 218.92.0.171 port 41063 ssh2
Feb 29 23:49:32 meumeu sshd[19835]: error: maximum authentication attempts exceeded for root from 218.92.0.171 port 41063 ssh2 [preauth]
Feb 29 23:49:54 meumeu sshd[19892]: Failed password for root from 218.92.0.171 port 33479 ssh2
...
2020-03-01 06:55:15
90.152.158.230 attackspambots
Feb 29 23:51:06 *host* sshd\[6761\]: Invalid user lianwei from 90.152.158.230 port 50988
2020-03-01 06:54:57
49.233.141.224 attackspam
Invalid user zabbix from 49.233.141.224 port 48136
2020-03-01 07:14:15
190.85.34.142 attack
Feb 29 17:50:52 plusreed sshd[19532]: Invalid user robot from 190.85.34.142
...
2020-03-01 07:03:21
180.140.177.10 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-01 07:08:09
201.108.175.208 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-03-01 06:59:04
209.250.243.85 attackspambots
Feb 29 23:51:08 vpn01 sshd[19010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.250.243.85
Feb 29 23:51:10 vpn01 sshd[19010]: Failed password for invalid user david from 209.250.243.85 port 39778 ssh2
...
2020-03-01 06:53:17
61.216.131.31 attackbotsspam
Mar  1 00:12:44 vps647732 sshd[18095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.131.31
Mar  1 00:12:46 vps647732 sshd[18095]: Failed password for invalid user user from 61.216.131.31 port 38898 ssh2
...
2020-03-01 07:13:29
187.201.77.130 attack
Automatic report - Port Scan Attack
2020-03-01 06:52:13
188.26.96.96 attackspambots
Automatic report - Port Scan Attack
2020-03-01 07:19:42

Recently Reported IPs

106.14.144.61 106.14.25.25 106.14.29.229 106.14.33.175
238.52.201.114 106.14.92.121 106.15.205.187 106.15.38.181
107.189.6.178 107.190.135.98 107.191.46.86 107.191.48.146
107.191.50.72 107.191.58.12 107.20.1.21 107.20.134.105
107.20.164.84 107.20.172.1 107.20.186.243 107.20.204.183