Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.233.69.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.233.69.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 16 21:44:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 121.69.233.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.69.233.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.230.22 attackbotsspam
SIPVicious Scanner Detection
2020-02-26 11:20:14
222.186.175.150 attack
Feb 26 00:17:01 firewall sshd[9571]: Failed password for root from 222.186.175.150 port 26778 ssh2
Feb 26 00:17:05 firewall sshd[9571]: Failed password for root from 222.186.175.150 port 26778 ssh2
Feb 26 00:17:08 firewall sshd[9571]: Failed password for root from 222.186.175.150 port 26778 ssh2
...
2020-02-26 11:32:45
80.211.139.159 attackbotsspam
Feb 26 04:14:31 ns381471 sshd[23787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.139.159
Feb 26 04:14:33 ns381471 sshd[23787]: Failed password for invalid user samba from 80.211.139.159 port 45690 ssh2
2020-02-26 11:22:34
79.139.83.5 attack
unauthorized connection attempt
2020-02-26 13:20:15
14.99.40.6 normal
Normal ip
2020-02-26 12:50:07
142.93.140.242 attackbotsspam
Feb 26 02:02:22 v22018076622670303 sshd\[398\]: Invalid user libuuid from 142.93.140.242 port 36442
Feb 26 02:02:22 v22018076622670303 sshd\[398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
Feb 26 02:02:24 v22018076622670303 sshd\[398\]: Failed password for invalid user libuuid from 142.93.140.242 port 36442 ssh2
...
2020-02-26 11:33:31
174.250.144.173 spambotsattackproxynormal
People can stay of my Facebook
2020-02-26 11:21:58
186.233.178.254 attack
unauthorized connection attempt
2020-02-26 13:00:29
124.156.55.67 attackbotsspam
unauthorized connection attempt
2020-02-26 13:09:35
37.71.138.29 attack
Feb 25 23:47:26 vps46666688 sshd[15064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.71.138.29
Feb 25 23:47:28 vps46666688 sshd[15064]: Failed password for invalid user sb from 37.71.138.29 port 57140 ssh2
...
2020-02-26 11:21:40
180.109.198.210 spamattack
[2020/02/26 11:32:00] [180.109.198.210:2095-0] User postmaster@luxnetcorp.com.tw AUTH fails.
[2020/02/26 11:32:00] [180.109.198.210:2100-0] User postmaster@luxnetcorp.com.tw AUTH fails.
[2020/02/26 11:32:01] [180.109.198.210:2103-0] User postmaster@luxnetcorp.com.tw AUTH fails.
2020-02-26 13:16:46
187.163.117.254 attackspambots
unauthorized connection attempt
2020-02-26 13:04:34
49.196.30.171 normal
theyre a goddamn hacker. they be hacking my shizz
2020-02-26 12:02:09
116.98.138.130 attackspam
port scan and connect, tcp 23 (telnet)
2020-02-26 11:34:34
203.81.69.164 attackbots
4243/tcp
[2020-02-26]1pkt
2020-02-26 11:33:57

Recently Reported IPs

156.23.5.160 68.211.116.24 82.166.155.84 195.156.23.75
154.228.66.147 201.206.119.134 8.72.191.118 151.118.213.202
168.120.116.92 181.68.205.40 243.39.123.113 32.184.205.184
235.157.68.24 196.143.124.93 44.137.115.149 44.106.183.250
79.86.24.214 157.195.107.5 191.192.192.161 220.221.248.96