Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.145.142.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.145.142.115.		IN	A

;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:51:18 CST 2023
;; MSG SIZE  rcvd: 108
Host info
115.142.145.106.in-addr.arpa domain name pointer KD106145142115.au-net.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
115.142.145.106.in-addr.arpa	name = KD106145142115.au-net.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.1.168.169 attack
445/tcp 445/tcp 445/tcp
[2019-08-06/23]3pkt
2019-08-24 03:17:12
200.75.221.98 attack
SSH invalid-user multiple login try
2019-08-24 03:25:31
112.85.42.189 attackbotsspam
2019-08-23T19:33:48.885510abusebot-4.cloudsearch.cf sshd\[1957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
2019-08-24 03:52:11
145.239.73.103 attackbots
Aug 23 21:52:27 SilenceServices sshd[6773]: Failed password for root from 145.239.73.103 port 55308 ssh2
Aug 23 21:56:18 SilenceServices sshd[10163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.73.103
Aug 23 21:56:21 SilenceServices sshd[10163]: Failed password for invalid user ping from 145.239.73.103 port 44566 ssh2
2019-08-24 04:00:45
24.54.211.91 attack
NAME : AS11992 CIDR : 24.54.192.0/18 | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack PR - block certain countries :) IP: 24.54.211.91  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-24 03:48:16
121.137.106.165 attackbotsspam
Aug 23 18:42:37 sshgateway sshd\[24056\]: Invalid user 123456 from 121.137.106.165
Aug 23 18:42:37 sshgateway sshd\[24056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.137.106.165
Aug 23 18:42:39 sshgateway sshd\[24056\]: Failed password for invalid user 123456 from 121.137.106.165 port 45280 ssh2
2019-08-24 03:24:53
144.217.5.73 attack
Aug 23 21:35:53 vps647732 sshd[6250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.5.73
Aug 23 21:35:55 vps647732 sshd[6250]: Failed password for invalid user hadoop from 144.217.5.73 port 52826 ssh2
...
2019-08-24 03:39:39
207.154.225.170 attackbots
2019-08-23T18:57:26.281969abusebot-6.cloudsearch.cf sshd\[1735\]: Invalid user jason1 from 207.154.225.170 port 53402
2019-08-24 03:31:27
144.217.242.111 attack
Aug 23 21:29:50 vps691689 sshd[25026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.242.111
Aug 23 21:29:52 vps691689 sshd[25026]: Failed password for invalid user hlds from 144.217.242.111 port 38810 ssh2
...
2019-08-24 03:42:33
95.35.186.130 attackspam
Automatic report - Port Scan Attack
2019-08-24 03:46:47
167.71.41.24 attackbotsspam
Aug 23 21:24:21 v22018076622670303 sshd\[22741\]: Invalid user berlin from 167.71.41.24 port 44476
Aug 23 21:24:21 v22018076622670303 sshd\[22741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.41.24
Aug 23 21:24:23 v22018076622670303 sshd\[22741\]: Failed password for invalid user berlin from 167.71.41.24 port 44476 ssh2
...
2019-08-24 03:39:59
142.11.248.229 attackspam
TCP Port: 25 _    invalid blocked zen-spamhaus truncate-gbudb _  _  _ _ (985)
2019-08-24 03:49:22
206.189.38.81 attackbots
Aug 23 19:22:33 hb sshd\[8674\]: Invalid user suport from 206.189.38.81
Aug 23 19:22:33 hb sshd\[8674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.38.81
Aug 23 19:22:35 hb sshd\[8674\]: Failed password for invalid user suport from 206.189.38.81 port 45058 ssh2
Aug 23 19:27:25 hb sshd\[9166\]: Invalid user lijy from 206.189.38.81
Aug 23 19:27:25 hb sshd\[9166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.38.81
2019-08-24 03:32:07
182.61.41.153 attack
Aug 23 18:13:30 apollo sshd\[4260\]: Invalid user bender from 182.61.41.153Aug 23 18:13:32 apollo sshd\[4260\]: Failed password for invalid user bender from 182.61.41.153 port 39832 ssh2Aug 23 18:19:38 apollo sshd\[4312\]: Invalid user blaze from 182.61.41.153
...
2019-08-24 03:43:17
103.60.137.111 attack
445/tcp 445/tcp 445/tcp...
[2019-06-29/08-23]13pkt,1pt.(tcp)
2019-08-24 03:52:42

Recently Reported IPs

106.145.15.97 106.145.26.246 106.145.149.202 106.145.170.171
106.145.228.108 106.144.250.123 106.145.152.155 106.146.249.250
106.145.220.158 106.145.125.56 106.145.218.4 106.144.97.88
106.144.247.151 106.145.116.208 106.144.246.168 106.144.29.253
106.144.181.38 106.145.13.186 106.145.139.200 106.144.221.184