Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: KDDI CORPORATION

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.149.109.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20379
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.149.109.189.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 21:21:05 CST 2019
;; MSG SIZE  rcvd: 119

Host info
189.109.149.106.in-addr.arpa domain name pointer KD106149109189.au-net.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
189.109.149.106.in-addr.arpa	name = KD106149109189.au-net.ne.jp.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
18.191.229.13 attack
Feb 15 07:58:00 cp sshd[21702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.191.229.13
2020-02-15 17:58:11
82.194.17.40 attack
Login script scanning - /administrator/index.php
2020-02-15 18:29:10
167.114.251.164 attackbots
Automatic report - Banned IP Access
2020-02-15 18:01:38
216.172.65.242 attackbotsspam
1581742180 - 02/15/2020 05:49:40 Host: 216.172.65.242/216.172.65.242 Port: 445 TCP Blocked
2020-02-15 18:28:08
147.139.135.52 attackbots
20 attempts against mh-ssh on cloud
2020-02-15 18:04:39
193.31.40.36 attackbots
[portscan] udp/1900 [ssdp]
*(RWIN=-)(02151159)
2020-02-15 18:10:01
111.248.148.139 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 18:34:02
111.249.215.245 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 18:01:21
49.234.179.127 attackspambots
ssh failed login
2020-02-15 18:25:05
85.243.128.8 attackspambots
Feb 15 06:40:23 ws24vmsma01 sshd[168340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.243.128.8
Feb 15 06:40:25 ws24vmsma01 sshd[168340]: Failed password for invalid user daichuqu from 85.243.128.8 port 38980 ssh2
...
2020-02-15 18:26:33
139.59.135.84 attackspam
Feb 15 06:03:49 firewall sshd[23317]: Invalid user caleb from 139.59.135.84
Feb 15 06:03:51 firewall sshd[23317]: Failed password for invalid user caleb from 139.59.135.84 port 41796 ssh2
Feb 15 06:06:48 firewall sshd[23441]: Invalid user sudor from 139.59.135.84
...
2020-02-15 18:10:34
49.234.207.124 attackspambots
Feb 15 07:54:25 MK-Soft-VM3 sshd[23031]: Failed password for root from 49.234.207.124 port 52350 ssh2
...
2020-02-15 18:11:27
111.249.66.148 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 17:56:19
118.171.67.165 attackspambots
Fail2Ban Ban Triggered
2020-02-15 18:27:07
37.49.231.163 attack
firewall-block, port(s): 5038/tcp, 50802/tcp
2020-02-15 18:16:12

Recently Reported IPs

104.3.190.51 219.240.2.3 185.217.119.31 69.49.73.75
180.216.106.220 42.73.6.237 74.138.39.186 195.14.31.107
218.1.119.188 42.116.152.62 192.175.71.121 95.58.8.233
220.4.93.61 36.68.11.152 66.172.88.136 211.34.140.69
24.183.80.140 5.149.251.35 13.113.122.52 172.89.1.32