Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.149.239.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.149.239.55.			IN	A

;; AUTHORITY SECTION:
.			383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:50:14 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 55.239.149.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.239.149.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
110.78.146.175 attackspam
Invalid user admin from 110.78.146.175 port 47597
2019-10-11 21:46:05
177.159.186.31 attack
Invalid user admin from 177.159.186.31 port 53492
2019-10-11 21:37:09
109.110.52.77 attack
Oct 11 12:20:06 XXX sshd[43127]: Invalid user sybase from 109.110.52.77 port 52116
2019-10-11 21:19:28
213.162.94.10 attack
Invalid user xbian from 213.162.94.10 port 36778
2019-10-11 21:31:38
49.48.14.238 attackspam
Invalid user admin from 49.48.14.238 port 50396
2019-10-11 21:50:10
203.142.42.76 attack
Invalid user admin from 203.142.42.76 port 46561
2019-10-11 21:33:50
51.75.248.251 attack
10/11/2019-09:23:44.408376 51.75.248.251 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-11 21:24:35
167.99.64.212 attackbots
Invalid user admin from 167.99.64.212 port 65065
2019-10-11 21:10:15
209.97.144.191 attackspam
[Thu Oct 10 12:28:26 2019] Failed password for invalid user support from 209.97.144.191 port 59756 ssh2
[Thu Oct 10 12:28:26 2019] Failed password for invalid user default from 209.97.144.191 port 59762 ssh2
[Thu Oct 10 12:28:26 2019] Failed password for r.r from 209.97.144.191 port 59766 ssh2
[Thu Oct 10 12:28:26 2019] Failed password for r.r from 209.97.144.191 port 59764 ssh2
[Thu Oct 10 12:28:26 2019] Failed password for invalid user e8ehome from 209.97.144.191 port 59742 ssh2
[Thu Oct 10 12:28:26 2019] Failed password for invalid user admin from 209.97.144.191 port 59768 ssh2
[Thu Oct 10 12:28:26 2019] Failed password for invalid user admin from 209.97.144.191 port 59730 ssh2
[Thu Oct 10 12:28:26 2019] Failed password for invalid user admin from 209.97.144.191 port 59728 ssh2
[Thu Oct 10 12:28:26 2019] Failed password for invalid user telecomadmin from 209.97.144.191 port 59752 ssh2
[Thu Oct 10 12:28:30 2019] Failed password for r.r from 209.97.144.191 port 59738 s........
-------------------------------
2019-10-11 21:05:27
123.24.108.61 attack
Invalid user admin from 123.24.108.61 port 32902
2019-10-11 21:14:30
46.101.163.220 attack
Invalid user nagios from 46.101.163.220 port 57539
2019-10-11 21:25:08
210.178.94.230 attack
Invalid user www from 210.178.94.230 port 53936
2019-10-11 21:32:19
123.20.2.109 attackbots
Invalid user admin from 123.20.2.109 port 53548
2019-10-11 21:44:09
156.208.213.111 attackbotsspam
Invalid user admin from 156.208.213.111 port 33054
2019-10-11 21:40:24
59.25.197.154 attackspambots
Invalid user cbs from 59.25.197.154 port 54506
2019-10-11 21:23:04

Recently Reported IPs

106.148.44.61 106.148.86.195 106.149.40.210 106.149.108.65
106.148.206.134 106.148.188.59 106.148.182.243 106.148.131.63
106.148.104.253 106.147.73.207 106.148.230.216 106.149.131.175
106.148.225.166 106.147.34.41 106.148.36.175 106.148.236.178
106.148.127.218 106.148.109.63 106.148.21.163 106.148.148.98