Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.169.114.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.169.114.161.		IN	A

;; AUTHORITY SECTION:
.			381	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:39:08 CST 2023
;; MSG SIZE  rcvd: 108
Host info
161.114.169.106.in-addr.arpa domain name pointer KD106169114161.au-net.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.114.169.106.in-addr.arpa	name = KD106169114161.au-net.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.176.220 attackbots
Unauthorized connection attempt detected from IP address 182.61.176.220 to port 2220 [J]
2020-01-19 01:37:47
93.40.7.20 attackspam
Invalid user xray from 93.40.7.20 port 59466
2020-01-19 01:57:45
188.252.31.162 attackbots
Unauthorized connection attempt detected from IP address 188.252.31.162 to port 2220 [J]
2020-01-19 01:34:14
138.197.143.221 attack
Unauthorized connection attempt detected from IP address 138.197.143.221 to port 2220 [J]
2020-01-19 01:44:47
5.29.191.195 attackspam
Unauthorized connection attempt detected from IP address 5.29.191.195 to port 2220 [J]
2020-01-19 01:27:43
178.32.121.111 attackspam
Invalid user ochsner from 178.32.121.111 port 42194
2020-01-19 01:39:48
117.102.68.188 attackbots
Jan 18 17:16:05 MK-Soft-VM7 sshd[7163]: Failed password for root from 117.102.68.188 port 50368 ssh2
Jan 18 17:18:42 MK-Soft-VM7 sshd[7176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.68.188 
...
2020-01-19 01:49:27
164.132.54.215 attackspambots
Unauthorized connection attempt detected from IP address 164.132.54.215 to port 2220 [J]
2020-01-19 01:40:58
94.23.212.137 attackbotsspam
Jan 18 18:37:29 SilenceServices sshd[10431]: Failed password for root from 94.23.212.137 port 47392 ssh2
Jan 18 18:44:33 SilenceServices sshd[16278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.212.137
Jan 18 18:44:35 SilenceServices sshd[16278]: Failed password for invalid user plano from 94.23.212.137 port 43898 ssh2
2020-01-19 01:57:17
14.161.5.70 attack
Autoban   14.161.5.70 AUTH/CONNECT
2020-01-19 01:25:55
34.242.99.103 attackbots
Invalid user gv from 34.242.99.103 port 41756
2020-01-19 02:06:32
157.245.86.176 attackspam
Invalid user zy from 157.245.86.176 port 47804
2020-01-19 01:41:10
222.223.32.228 attackbots
$f2bV_matches
2020-01-19 01:28:24
62.234.139.150 attack
Invalid user openerp from 62.234.139.150 port 40754
2020-01-19 02:01:13
49.235.72.168 attackspambots
Invalid user mqm from 49.235.72.168 port 44076
2020-01-19 02:03:35

Recently Reported IPs

106.168.8.112 106.169.230.73 106.169.213.24 106.169.2.5
106.169.216.168 106.169.134.229 106.169.187.14 106.169.101.112
106.169.184.192 106.17.143.161 106.169.21.191 106.168.98.219
106.169.31.253 106.169.119.100 106.169.116.146 106.169.159.124
106.169.203.160 106.169.205.114 106.168.80.62 106.169.157.80