Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.218.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54037
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.218.196.			IN	A

;; AUTHORITY SECTION:
.			501	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:32:03 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 196.218.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.218.14.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.135.123.34 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: .
2019-09-21 18:54:31
68.183.178.162 attackbots
2019-09-21T09:09:47.383451abusebot-8.cloudsearch.cf sshd\[30136\]: Invalid user skyrix from 68.183.178.162 port 52770
2019-09-21 17:37:49
193.23.4.8 attack
firewall-block, port(s): 5984/tcp
2019-09-21 17:35:28
58.254.132.239 attack
Sep 21 11:19:32 SilenceServices sshd[5240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.239
Sep 21 11:19:34 SilenceServices sshd[5240]: Failed password for invalid user apc from 58.254.132.239 port 29723 ssh2
Sep 21 11:22:23 SilenceServices sshd[6155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.239
2019-09-21 18:06:44
209.97.169.136 attackbotsspam
Invalid user mall from 209.97.169.136 port 43870
2019-09-21 17:33:17
50.18.196.152 attackbots
Attempted WordPress login: "GET /wordpress/wp-login.php"
2019-09-21 18:07:01
210.178.25.71 attackspam
Telnet Server BruteForce Attack
2019-09-21 17:24:44
104.154.50.149 attackbotsspam
Sep 20 19:09:29 friendsofhawaii sshd\[20689\]: Invalid user testing from 104.154.50.149
Sep 20 19:09:29 friendsofhawaii sshd\[20689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.50.154.104.bc.googleusercontent.com
Sep 20 19:09:31 friendsofhawaii sshd\[20689\]: Failed password for invalid user testing from 104.154.50.149 port 48984 ssh2
Sep 20 19:13:52 friendsofhawaii sshd\[21064\]: Invalid user noemi from 104.154.50.149
Sep 20 19:13:52 friendsofhawaii sshd\[21064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.50.154.104.bc.googleusercontent.com
2019-09-21 17:19:56
213.34.208.90 attackspam
Unauthorized connection attempt from IP address 213.34.208.90 on Port 445(SMB)
2019-09-21 17:35:07
185.208.164.149 attackbots
/blog/wp-login.php
2019-09-21 17:29:18
128.199.253.133 attackbots
Invalid user mercedes from 128.199.253.133 port 53061
2019-09-21 17:26:51
180.126.218.70 attackspam
Invalid user admin from 180.126.218.70 port 23912
2019-09-21 18:58:43
46.105.124.52 attackbotsspam
Sep 20 23:37:18 tdfoods sshd\[18603\]: Invalid user john from 46.105.124.52
Sep 20 23:37:18 tdfoods sshd\[18603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.124.52
Sep 20 23:37:19 tdfoods sshd\[18603\]: Failed password for invalid user john from 46.105.124.52 port 43990 ssh2
Sep 20 23:43:00 tdfoods sshd\[19162\]: Invalid user frank from 46.105.124.52
Sep 20 23:43:00 tdfoods sshd\[19162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.124.52
2019-09-21 17:55:41
104.236.244.98 attack
Sep 20 23:40:36 hiderm sshd\[10324\]: Invalid user rrr from 104.236.244.98
Sep 20 23:40:36 hiderm sshd\[10324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.244.98
Sep 20 23:40:39 hiderm sshd\[10324\]: Failed password for invalid user rrr from 104.236.244.98 port 34856 ssh2
Sep 20 23:44:49 hiderm sshd\[10640\]: Invalid user User from 104.236.244.98
Sep 20 23:44:49 hiderm sshd\[10640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.244.98
2019-09-21 17:46:09
178.33.233.54 attackbotsspam
Sep 21 04:23:32 thevastnessof sshd[15622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.233.54
...
2019-09-21 17:25:42

Recently Reported IPs

106.14.218.129 106.14.218.237 106.14.218.213 106.14.218.21
106.14.218.28 106.14.218.39 106.14.218.46 106.14.218.33
106.14.218.64 106.14.218.42 106.14.218.234 106.14.218.66
106.14.218.86 106.14.218.78 106.14.218.53 106.14.219.102
106.14.219.131 106.14.219.26 106.14.219.137 106.14.219.99