Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.164.21.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.164.21.248.			IN	A

;; AUTHORITY SECTION:
.			184	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:40:33 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 248.21.164.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.21.164.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
3.84.115.189 attackbots
5x Failed Password
2020-04-13 15:41:09
194.55.132.250 attack
[2020-04-13 03:42:35] NOTICE[12114][C-0000511c] chan_sip.c: Call from '' (194.55.132.250:57146) to extension '46842002301' rejected because extension not found in context 'public'.
[2020-04-13 03:42:35] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-13T03:42:35.257-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46842002301",SessionID="0x7f020c167898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/194.55.132.250/57146",ACLName="no_extension_match"
[2020-04-13 03:43:57] NOTICE[12114][C-0000511e] chan_sip.c: Call from '' (194.55.132.250:55176) to extension '01146842002301' rejected because extension not found in context 'public'.
[2020-04-13 03:43:57] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-13T03:43:57.826-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146842002301",SessionID="0x7f020c088288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/194
...
2020-04-13 16:00:45
92.118.38.67 attack
2020-04-13 10:52:56 dovecot_login authenticator failed for \(User\) \[92.118.38.67\]: 535 Incorrect authentication data \(set_id=sanjiv@org.ua\)2020-04-13 10:53:42 dovecot_login authenticator failed for \(User\) \[92.118.38.67\]: 535 Incorrect authentication data \(set_id=sanjna@org.ua\)2020-04-13 10:54:02 dovecot_login authenticator failed for \(User\) \[92.118.38.67\]: 535 Incorrect authentication data \(set_id=sanjog@org.ua\)
...
2020-04-13 15:55:39
222.252.156.31 attackbots
1586750058 - 04/13/2020 05:54:18 Host: 222.252.156.31/222.252.156.31 Port: 445 TCP Blocked
2020-04-13 16:13:12
112.85.42.187 attack
Apr 13 09:24:45 vmd38886 sshd\[16677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.187  user=root
Apr 13 09:24:47 vmd38886 sshd\[16677\]: Failed password for root from 112.85.42.187 port 49148 ssh2
Apr 13 09:24:48 vmd38886 sshd\[16677\]: Failed password for root from 112.85.42.187 port 49148 ssh2
2020-04-13 15:42:40
36.22.187.34 attack
Unauthorized SSH login attempts
2020-04-13 15:32:03
1.202.117.25 attack
Apr 13 06:26:53 Ubuntu-1404-trusty-64-minimal sshd\[17344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.117.25  user=root
Apr 13 06:26:55 Ubuntu-1404-trusty-64-minimal sshd\[17344\]: Failed password for root from 1.202.117.25 port 16513 ssh2
Apr 13 06:41:23 Ubuntu-1404-trusty-64-minimal sshd\[28316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.117.25  user=root
Apr 13 06:41:25 Ubuntu-1404-trusty-64-minimal sshd\[28316\]: Failed password for root from 1.202.117.25 port 54370 ssh2
Apr 13 06:45:08 Ubuntu-1404-trusty-64-minimal sshd\[29299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.117.25  user=root
2020-04-13 15:58:41
14.186.51.18 attack
(smtpauth) Failed SMTP AUTH login from 14.186.51.18 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-13 08:24:34 plain authenticator failed for ([127.0.0.1]) [14.186.51.18]: 535 Incorrect authentication data (set_id=info@sbp-pasar.com)
2020-04-13 16:02:42
49.74.219.26 attack
Apr 13 06:36:53 eventyay sshd[6203]: Failed password for root from 49.74.219.26 port 20387 ssh2
Apr 13 06:40:56 eventyay sshd[6346]: Failed password for root from 49.74.219.26 port 14114 ssh2
...
2020-04-13 16:04:52
183.167.217.46 attackspam
Unauthorised access (Apr 13) SRC=183.167.217.46 LEN=44 TTL=52 ID=29833 TCP DPT=8080 WINDOW=32921 SYN
2020-04-13 15:32:58
35.220.137.226 attackspam
Apr 13 05:54:48  sshd\[30737\]: Invalid user dspace from 35.220.137.226Apr 13 05:54:51  sshd\[30737\]: Failed password for invalid user dspace from 35.220.137.226 port 47588 ssh2
...
2020-04-13 15:54:20
14.230.52.66 attackbotsspam
1586750101 - 04/13/2020 05:55:01 Host: 14.230.52.66/14.230.52.66 Port: 445 TCP Blocked
2020-04-13 15:47:27
95.85.38.127 attackbotsspam
Apr 13 09:06:34 vpn01 sshd[30300]: Failed password for root from 95.85.38.127 port 53428 ssh2
...
2020-04-13 15:50:32
91.182.3.50 attackbots
Unauthorised access (Apr 13) SRC=91.182.3.50 LEN=48 TOS=0x18 TTL=120 ID=596 DF TCP DPT=445 WINDOW=64240 SYN
2020-04-13 15:34:46
182.74.25.246 attackbots
Apr 13 06:40:51 ns382633 sshd\[7732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246  user=root
Apr 13 06:40:54 ns382633 sshd\[7732\]: Failed password for root from 182.74.25.246 port 29786 ssh2
Apr 13 06:49:44 ns382633 sshd\[8967\]: Invalid user chile from 182.74.25.246 port 8213
Apr 13 06:49:44 ns382633 sshd\[8967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246
Apr 13 06:49:45 ns382633 sshd\[8967\]: Failed password for invalid user chile from 182.74.25.246 port 8213 ssh2
2020-04-13 15:55:15

Recently Reported IPs

106.163.60.238 106.164.135.108 106.164.20.59 106.164.128.101
106.164.115.12 106.164.6.188 106.164.102.255 106.164.48.227
106.163.26.58 106.164.139.14 106.163.64.41 106.165.32.172
106.163.99.78 106.164.137.200 106.164.113.117 106.164.237.72
106.163.216.137 106.163.7.178 106.163.62.51 106.164.117.126