Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.20.57.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.20.57.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:03:12 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 91.57.20.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.57.20.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.201.60.150 attack
Dec 14 07:50:30 Ubuntu-1404-trusty-64-minimal sshd\[26842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.201.60.150  user=root
Dec 14 07:50:32 Ubuntu-1404-trusty-64-minimal sshd\[26842\]: Failed password for root from 81.201.60.150 port 48073 ssh2
Dec 14 07:56:41 Ubuntu-1404-trusty-64-minimal sshd\[29833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.201.60.150  user=lp
Dec 14 07:56:43 Ubuntu-1404-trusty-64-minimal sshd\[29833\]: Failed password for lp from 81.201.60.150 port 58104 ssh2
Dec 14 08:02:29 Ubuntu-1404-trusty-64-minimal sshd\[5767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.201.60.150  user=root
2019-12-14 15:26:47
176.27.231.1 attackspambots
Dec 14 01:41:36 ny01 sshd[6108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.27.231.1
Dec 14 01:41:38 ny01 sshd[6108]: Failed password for invalid user jerome from 176.27.231.1 port 24460 ssh2
Dec 14 01:47:34 ny01 sshd[6769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.27.231.1
2019-12-14 14:54:08
137.116.229.134 attackbotsspam
C1,WP GET /suche/wp-login.php
2019-12-14 15:10:21
193.70.0.93 attackbots
Dec 14 09:23:49 server sshd\[18267\]: Invalid user trolu from 193.70.0.93
Dec 14 09:23:49 server sshd\[18267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-193-70-0.eu 
Dec 14 09:23:51 server sshd\[18267\]: Failed password for invalid user trolu from 193.70.0.93 port 59984 ssh2
Dec 14 09:29:22 server sshd\[19800\]: Invalid user caunday from 193.70.0.93
Dec 14 09:29:22 server sshd\[19800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-193-70-0.eu 
...
2019-12-14 15:18:57
187.149.13.116 attackspambots
1576304953 - 12/14/2019 07:29:13 Host: 187.149.13.116/187.149.13.116 Port: 445 TCP Blocked
2019-12-14 15:27:34
134.175.39.246 attack
Dec 14 07:29:35 MK-Soft-VM3 sshd[2845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.246 
Dec 14 07:29:37 MK-Soft-VM3 sshd[2845]: Failed password for invalid user pedro from 134.175.39.246 port 45072 ssh2
...
2019-12-14 15:07:13
111.68.46.68 attackbots
Dec 14 06:22:46 localhost sshd\[52119\]: Invalid user admin123321 from 111.68.46.68 port 45480
Dec 14 06:22:46 localhost sshd\[52119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.46.68
Dec 14 06:22:47 localhost sshd\[52119\]: Failed password for invalid user admin123321 from 111.68.46.68 port 45480 ssh2
Dec 14 06:29:47 localhost sshd\[52415\]: Invalid user qq520520--++ from 111.68.46.68 port 48972
Dec 14 06:29:47 localhost sshd\[52415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.46.68
...
2019-12-14 14:57:35
222.186.173.238 attackspam
Dec 14 08:02:21 nextcloud sshd\[26024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Dec 14 08:02:23 nextcloud sshd\[26024\]: Failed password for root from 222.186.173.238 port 43896 ssh2
Dec 14 08:02:26 nextcloud sshd\[26024\]: Failed password for root from 222.186.173.238 port 43896 ssh2
...
2019-12-14 15:05:40
61.157.142.246 attackbots
Dec 14 07:40:19 ns41 sshd[17574]: Failed password for root from 61.157.142.246 port 22508 ssh2
Dec 14 07:40:19 ns41 sshd[17574]: Failed password for root from 61.157.142.246 port 22508 ssh2
2019-12-14 14:58:02
106.12.114.173 attackbotsspam
Dec 14 07:29:15 MK-Soft-VM5 sshd[10216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.173 
Dec 14 07:29:17 MK-Soft-VM5 sshd[10216]: Failed password for invalid user aheston from 106.12.114.173 port 11612 ssh2
...
2019-12-14 15:25:22
46.175.243.9 attackspambots
Dec 14 12:40:24 vibhu-HP-Z238-Microtower-Workstation sshd\[2540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.175.243.9  user=daemon
Dec 14 12:40:26 vibhu-HP-Z238-Microtower-Workstation sshd\[2540\]: Failed password for daemon from 46.175.243.9 port 49572 ssh2
Dec 14 12:46:17 vibhu-HP-Z238-Microtower-Workstation sshd\[2965\]: Invalid user annette from 46.175.243.9
Dec 14 12:46:17 vibhu-HP-Z238-Microtower-Workstation sshd\[2965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.175.243.9
Dec 14 12:46:19 vibhu-HP-Z238-Microtower-Workstation sshd\[2965\]: Failed password for invalid user annette from 46.175.243.9 port 58112 ssh2
...
2019-12-14 15:29:44
106.13.83.251 attack
Dec 14 07:22:16 OPSO sshd\[14119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251  user=root
Dec 14 07:22:18 OPSO sshd\[14119\]: Failed password for root from 106.13.83.251 port 37120 ssh2
Dec 14 07:29:50 OPSO sshd\[15082\]: Invalid user ton from 106.13.83.251 port 36976
Dec 14 07:29:50 OPSO sshd\[15082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251
Dec 14 07:29:51 OPSO sshd\[15082\]: Failed password for invalid user ton from 106.13.83.251 port 36976 ssh2
2019-12-14 14:51:52
123.108.35.186 attackbots
Dec 13 20:42:05 eddieflores sshd\[11825\]: Invalid user test from 123.108.35.186
Dec 13 20:42:05 eddieflores sshd\[11825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186
Dec 13 20:42:07 eddieflores sshd\[11825\]: Failed password for invalid user test from 123.108.35.186 port 39274 ssh2
Dec 13 20:48:21 eddieflores sshd\[12419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186  user=root
Dec 13 20:48:23 eddieflores sshd\[12419\]: Failed password for root from 123.108.35.186 port 52440 ssh2
2019-12-14 15:01:22
35.199.154.128 attackbotsspam
2019-12-14T08:07:03.631741scmdmz1 sshd\[32134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.154.199.35.bc.googleusercontent.com  user=root
2019-12-14T08:07:06.029646scmdmz1 sshd\[32134\]: Failed password for root from 35.199.154.128 port 41984 ssh2
2019-12-14T08:12:31.888493scmdmz1 sshd\[32715\]: Invalid user oshinski from 35.199.154.128 port 46880
...
2019-12-14 15:20:53
218.241.134.34 attackspam
Dec 14 07:49:00 eventyay sshd[19970]: Failed password for news from 218.241.134.34 port 43593 ssh2
Dec 14 07:55:22 eventyay sshd[20222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34
Dec 14 07:55:24 eventyay sshd[20222]: Failed password for invalid user ursuline from 218.241.134.34 port 19075 ssh2
...
2019-12-14 15:15:54

Recently Reported IPs

83.187.191.51 185.125.171.89 174.129.31.189 233.146.193.174
138.31.23.193 166.79.175.37 163.45.89.142 151.182.32.155
134.228.134.216 90.60.172.113 14.218.107.166 167.133.251.78
217.59.12.136 250.125.110.119 163.75.17.237 244.70.12.18
107.220.40.6 32.50.168.81 163.56.226.91 135.81.188.60