Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.64.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.64.196.			IN	A

;; AUTHORITY SECTION:
.			438	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:23:14 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 196.64.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.64.14.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.113.235.76 attackspambots
Seq 2995002506
2019-12-07 03:22:27
45.167.250.19 attack
$f2bV_matches
2019-12-07 03:13:00
89.25.222.22 attack
$f2bV_matches
2019-12-07 03:09:47
13.68.175.90 attackspam
SSH bruteforce
2019-12-07 03:13:52
217.111.239.37 attack
Dec  6 12:23:48 dallas01 sshd[15412]: Failed password for root from 217.111.239.37 port 55054 ssh2
Dec  6 12:29:26 dallas01 sshd[16759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.111.239.37
Dec  6 12:29:28 dallas01 sshd[16759]: Failed password for invalid user uschi from 217.111.239.37 port 37744 ssh2
2019-12-07 03:04:59
92.222.158.249 attackspam
2019-12-06T16:32:10.224545abusebot-2.cloudsearch.cf sshd\[7373\]: Invalid user share from 92.222.158.249 port 53648
2019-12-07 03:08:14
144.217.161.78 attackbotsspam
2019-12-06T16:52:51.538633abusebot-3.cloudsearch.cf sshd\[1940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.ip-144-217-161.net  user=root
2019-12-07 03:10:30
14.39.204.55 attackspam
Fail2Ban Ban Triggered
2019-12-07 03:08:29
46.209.45.58 attackspam
Dec  6 19:07:31 tux-35-217 sshd\[6257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.209.45.58  user=root
Dec  6 19:07:33 tux-35-217 sshd\[6257\]: Failed password for root from 46.209.45.58 port 42598 ssh2
Dec  6 19:13:04 tux-35-217 sshd\[6296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.209.45.58  user=root
Dec  6 19:13:06 tux-35-217 sshd\[6296\]: Failed password for root from 46.209.45.58 port 40106 ssh2
...
2019-12-07 03:02:17
138.197.5.191 attackspam
----- report -----
Dec  6 11:42:44 sshd: Connection from 138.197.5.191 port 37622
Dec  6 11:42:44 sshd: Invalid user uftp1 from 138.197.5.191
Dec  6 11:42:44 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191
Dec  6 11:42:46 sshd: Failed password for invalid user uftp1 from 138.197.5.191 port 37622 ssh2
Dec  6 11:42:46 sshd: Received disconnect from 138.197.5.191: 11: Bye Bye [preauth]
Dec  6 11:48:42 sshd: Connection from 138.197.5.191 port 46594
Dec  6 11:48:42 sshd: Invalid user root12346 from 138.197.5.191
Dec  6 11:48:42 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191
Dec  6 11:48:44 sshd: Failed password for invalid user root12346 from 138.197.5.191 port 46594 ssh2
Dec  6 11:48:44 sshd: Received disconnect from 138.197.5.191: 11: Bye Bye [preauth]
2019-12-07 02:56:23
178.87.172.169 attackspam
Seq 2995002506
2019-12-07 03:19:33
61.161.237.38 attackbotsspam
Dec  6 07:14:34 server sshd\[22466\]: Failed password for invalid user topolino from 61.161.237.38 port 48212 ssh2
Dec  6 19:38:11 server sshd\[855\]: Invalid user guest from 61.161.237.38
Dec  6 19:38:11 server sshd\[855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.237.38 
Dec  6 19:38:13 server sshd\[855\]: Failed password for invalid user guest from 61.161.237.38 port 56322 ssh2
Dec  6 20:04:14 server sshd\[8425\]: Invalid user tyson from 61.161.237.38
...
2019-12-07 02:49:08
183.234.74.42 attack
Seq 2995002506
2019-12-07 03:17:58
163.172.191.192 attack
Dec  6 19:27:14 lnxweb61 sshd[32224]: Failed password for mysql from 163.172.191.192 port 33086 ssh2
Dec  6 19:27:14 lnxweb61 sshd[32224]: Failed password for mysql from 163.172.191.192 port 33086 ssh2
2019-12-07 02:50:37
115.57.127.137 attack
2019-12-06T18:35:48.516264abusebot.cloudsearch.cf sshd\[13243\]: Invalid user test03 from 115.57.127.137 port 34907
2019-12-07 03:11:27

Recently Reported IPs

106.14.64.187 106.14.64.47 106.14.64.57 106.14.64.171
106.14.64.48 106.14.65.68 106.15.224.211 106.15.224.33
106.15.224.214 106.15.224.74 106.15.224.87 106.15.225.113
106.15.225.12 106.15.225.105 106.15.225.144 106.15.225.138
106.15.225.172 106.15.225.198 106.15.225.215 106.15.227.182