Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.205.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31008
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.205.22.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:24:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 22.205.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.205.14.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.28.136.172 attackspambots
$f2bV_matches
2020-07-27 20:47:30
94.199.16.74 attack
1595851063 - 07/27/2020 13:57:43 Host: 94.199.16.74/94.199.16.74 Port: 445 TCP Blocked
2020-07-27 20:23:39
109.197.80.98 attackbots
Automatic report - Banned IP Access
2020-07-27 20:27:46
122.51.191.69 attackspam
Jul 27 14:23:39 piServer sshd[21467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.191.69 
Jul 27 14:23:42 piServer sshd[21467]: Failed password for invalid user maint from 122.51.191.69 port 39064 ssh2
Jul 27 14:27:25 piServer sshd[21741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.191.69 
...
2020-07-27 20:36:10
114.38.242.221 attackspam
Unauthorised access (Jul 27) SRC=114.38.242.221 LEN=52 TTL=107 ID=29263 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-27 20:17:29
31.173.120.181 attackspam
20/7/27@07:57:28: FAIL: Alarm-Network address from=31.173.120.181
...
2020-07-27 20:36:38
115.159.153.180 attack
SSH brute-force attempt
2020-07-27 20:28:48
193.112.93.2 attackbots
Jul 27 07:45:47 finn sshd[24975]: Invalid user virtual from 193.112.93.2 port 33448
Jul 27 07:45:47 finn sshd[24975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.93.2
Jul 27 07:45:49 finn sshd[24975]: Failed password for invalid user virtual from 193.112.93.2 port 33448 ssh2
Jul 27 07:45:49 finn sshd[24975]: Received disconnect from 193.112.93.2 port 33448:11: Bye Bye [preauth]
Jul 27 07:45:49 finn sshd[24975]: Disconnected from 193.112.93.2 port 33448 [preauth]
Jul 27 07:53:30 finn sshd[26447]: Invalid user sdtdserver from 193.112.93.2 port 54916
Jul 27 07:53:30 finn sshd[26447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.93.2
Jul 27 07:53:31 finn sshd[26447]: Failed password for invalid user sdtdserver from 193.112.93.2 port 54916 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=193.112.93.2
2020-07-27 20:21:01
117.158.175.167 attack
Jul 27 12:32:57 vps-51d81928 sshd[209184]: Invalid user crmdev from 117.158.175.167 port 34642
Jul 27 12:32:57 vps-51d81928 sshd[209184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.175.167 
Jul 27 12:32:57 vps-51d81928 sshd[209184]: Invalid user crmdev from 117.158.175.167 port 34642
Jul 27 12:32:59 vps-51d81928 sshd[209184]: Failed password for invalid user crmdev from 117.158.175.167 port 34642 ssh2
Jul 27 12:36:14 vps-51d81928 sshd[209203]: Invalid user ansible from 117.158.175.167 port 39800
...
2020-07-27 20:41:54
61.50.99.26 attack
$f2bV_matches
2020-07-27 20:20:29
222.186.30.57 attack
Jul 27 12:31:27 rush sshd[16201]: Failed password for root from 222.186.30.57 port 59335 ssh2
Jul 27 12:31:40 rush sshd[16203]: Failed password for root from 222.186.30.57 port 31853 ssh2
...
2020-07-27 20:38:35
150.109.120.253 attackbotsspam
2020-07-27T11:49:22.395101abusebot-3.cloudsearch.cf sshd[24064]: Invalid user olivier from 150.109.120.253 port 34164
2020-07-27T11:49:22.403130abusebot-3.cloudsearch.cf sshd[24064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.120.253
2020-07-27T11:49:22.395101abusebot-3.cloudsearch.cf sshd[24064]: Invalid user olivier from 150.109.120.253 port 34164
2020-07-27T11:49:24.160882abusebot-3.cloudsearch.cf sshd[24064]: Failed password for invalid user olivier from 150.109.120.253 port 34164 ssh2
2020-07-27T11:57:48.135151abusebot-3.cloudsearch.cf sshd[24228]: Invalid user ssz from 150.109.120.253 port 39592
2020-07-27T11:57:48.140785abusebot-3.cloudsearch.cf sshd[24228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.120.253
2020-07-27T11:57:48.135151abusebot-3.cloudsearch.cf sshd[24228]: Invalid user ssz from 150.109.120.253 port 39592
2020-07-27T11:57:50.364884abusebot-3.cloudsearch.cf ssh
...
2020-07-27 20:17:04
185.250.220.170 attackspam
ModSecurity detections (a)
2020-07-27 20:17:53
83.97.20.31 attackbots
Jul 27 13:57:29 debian-2gb-nbg1-2 kernel: \[18109555.155805\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.97.20.31 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=54506 DPT=7547 WINDOW=65535 RES=0x00 SYN URGP=0
2020-07-27 20:32:41
114.80.94.228 attackbotsspam
$f2bV_matches
2020-07-27 20:27:19

Recently Reported IPs

106.14.205.203 106.14.205.63 106.14.224.129 106.14.223.64
106.14.243.123 106.14.244.158 106.14.243.15 106.14.243.221
106.14.243.165 106.14.244.10 106.14.243.167 106.14.243.112
106.14.243.229 106.14.244.110 106.14.243.151 106.14.244.168
106.14.244.2 106.14.244.217 106.14.244.33 106.14.244.254