Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.16.132.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15257
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.16.132.55.			IN	A

;; AUTHORITY SECTION:
.			3086	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051701 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 11:30:14 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 55.132.16.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 55.132.16.106.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
159.147.54.183 attackspam
SSH/22 MH Probe, BF, Hack -
2020-06-13 22:38:07
198.71.239.41 attackbots
wp-login.php
2020-06-13 22:54:17
5.39.77.117 attack
Jun 13 14:53:40 OPSO sshd\[6596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.117  user=admin
Jun 13 14:53:41 OPSO sshd\[6596\]: Failed password for admin from 5.39.77.117 port 53248 ssh2
Jun 13 14:59:07 OPSO sshd\[7919\]: Invalid user oracle from 5.39.77.117 port 54749
Jun 13 14:59:07 OPSO sshd\[7919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.117
Jun 13 14:59:09 OPSO sshd\[7919\]: Failed password for invalid user oracle from 5.39.77.117 port 54749 ssh2
2020-06-13 22:29:51
46.101.224.184 attackspam
Jun 13 14:28:20 cdc sshd[19983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184 
Jun 13 14:28:22 cdc sshd[19983]: Failed password for invalid user adm from 46.101.224.184 port 56338 ssh2
2020-06-13 22:54:01
161.35.152.81 attack
Honeypot hit.
2020-06-13 22:31:43
193.122.172.254 attackbotsspam
Jun 13 14:38:01 ip-172-31-61-156 sshd[20719]: Failed password for invalid user nxautomation from 193.122.172.254 port 40242 ssh2
Jun 13 14:37:59 ip-172-31-61-156 sshd[20719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.172.254
Jun 13 14:37:59 ip-172-31-61-156 sshd[20719]: Invalid user nxautomation from 193.122.172.254
Jun 13 14:38:01 ip-172-31-61-156 sshd[20719]: Failed password for invalid user nxautomation from 193.122.172.254 port 40242 ssh2
Jun 13 14:42:16 ip-172-31-61-156 sshd[21181]: Invalid user admin from 193.122.172.254
...
2020-06-13 22:59:08
43.225.181.48 attack
Jun 13 14:31:07 IngegnereFirenze sshd[5473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.181.48  user=root
...
2020-06-13 23:09:54
138.197.179.111 attack
sshd
2020-06-13 22:24:13
34.82.119.95 attackspam
10 attempts against mh-misc-ban on heat
2020-06-13 22:51:29
27.29.79.139 attackbotsspam
[Sat Jun 13 06:17:03 2020 GMT] ecxznluf  [URIBL_INV,RDNS_NONE], Subject: Industrial Automation Part
2020-06-13 23:03:38
1.173.244.225 attackspam
1592051193 - 06/13/2020 14:26:33 Host: 1.173.244.225/1.173.244.225 Port: 445 TCP Blocked
2020-06-13 22:49:25
178.33.12.237 attackspambots
Jun 13 19:19:38 gw1 sshd[3891]: Failed password for root from 178.33.12.237 port 42917 ssh2
...
2020-06-13 22:32:36
49.235.58.253 attack
2020-06-13T16:24:51.140829lavrinenko.info sshd[8925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.58.253  user=root
2020-06-13T16:24:52.921163lavrinenko.info sshd[8925]: Failed password for root from 49.235.58.253 port 43032 ssh2
2020-06-13T16:28:00.327445lavrinenko.info sshd[9108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.58.253  user=root
2020-06-13T16:28:02.388451lavrinenko.info sshd[9108]: Failed password for root from 49.235.58.253 port 50442 ssh2
2020-06-13T16:31:06.982632lavrinenko.info sshd[9253]: Invalid user rawman from 49.235.58.253 port 57750
...
2020-06-13 22:41:36
103.225.138.70 attackbots
Icarus honeypot on github
2020-06-13 22:58:51
221.2.144.76 attackspam
Jun 13 15:31:14 vps639187 sshd\[20626\]: Invalid user user13 from 221.2.144.76 port 38730
Jun 13 15:31:14 vps639187 sshd\[20626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.2.144.76
Jun 13 15:31:16 vps639187 sshd\[20626\]: Failed password for invalid user user13 from 221.2.144.76 port 38730 ssh2
...
2020-06-13 23:01:02

Recently Reported IPs

176.213.131.67 124.107.103.51 113.160.97.56 91.221.174.122
85.248.227.165 23.129.64.151 91.205.216.38 153.92.10.201
191.102.199.81 60.173.114.254 182.50.135.63 77.236.64.250
148.70.128.2 119.195.161.232 199.249.230.103 91.185.50.51
106.75.103.35 107.190.131.50 55.29.170.113 113.240.237.10