Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Beijing

Country: China

Internet Service Provider: China Tietong

Hostname: unknown

Organization: China Tietong Telecommunication Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.3.40.99 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-19 23:40:51
106.3.40.182 attackspambots
port scan and connect, tcp 22 (ssh)
2020-05-06 20:30:27
106.3.40.182 attackspam
$f2bV_matches
2020-05-05 21:50:04
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.3.40.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18130
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.3.40.166.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 06 00:54:13 +08 2019
;; MSG SIZE  rcvd: 116

Host info
166.40.3.106.in-addr.arpa domain name pointer undefine.inidc.com.cn.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
166.40.3.106.in-addr.arpa	name = undefine.inidc.com.cn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
106.13.6.116 attack
Nov 25 14:00:30 nextcloud sshd\[4804\]: Invalid user shepard from 106.13.6.116
Nov 25 14:00:30 nextcloud sshd\[4804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
Nov 25 14:00:31 nextcloud sshd\[4804\]: Failed password for invalid user shepard from 106.13.6.116 port 60708 ssh2
...
2019-11-25 21:06:39
115.148.80.93 attackbotsspam
Unauthorised access (Nov 25) SRC=115.148.80.93 LEN=40 TTL=49 ID=5693 TCP DPT=8080 WINDOW=34244 SYN 
Unauthorised access (Nov 25) SRC=115.148.80.93 LEN=40 TTL=49 ID=51934 TCP DPT=8080 WINDOW=13715 SYN
2019-11-25 21:40:16
27.199.70.48 attackbots
amazon phishing mail
2019-11-25 21:07:13
206.81.29.166 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-11-25 21:11:03
219.85.159.132 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:33.
2019-11-25 21:22:50
192.81.210.176 attack
Automatic report - XMLRPC Attack
2019-11-25 21:43:18
106.54.185.14 attackbots
Port scan detected on ports: 65530[TCP], 65530[TCP], 65530[TCP]
2019-11-25 21:17:38
220.143.25.171 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:34.
2019-11-25 21:21:54
182.253.114.43 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:33.
2019-11-25 21:23:15
212.47.246.150 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/212.47.246.150/ 
 
 FR - 1H : (42)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN12876 
 
 IP : 212.47.246.150 
 
 CIDR : 212.47.224.0/19 
 
 PREFIX COUNT : 18 
 
 UNIQUE IP COUNT : 507904 
 
 
 ATTACKS DETECTED ASN12876 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 7 
 24H - 10 
 
 DateTime : 2019-11-25 07:20:33 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-11-25 21:16:36
113.172.223.186 attackbotsspam
Nov 25 00:20:26 mailman postfix/smtpd[566]: warning: unknown[113.172.223.186]: SASL PLAIN authentication failed: authentication failure
2019-11-25 21:32:39
168.228.165.227 attackspam
Automatic report - Port Scan Attack
2019-11-25 21:19:57
14.231.16.114 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:30.
2019-11-25 21:29:26
117.20.69.88 attack
117.20.69.88 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 21:06:18
106.75.10.4 attack
Fail2Ban Ban Triggered
2019-11-25 21:50:51

Recently Reported IPs

150.129.110.91 46.26.86.220 122.224.9.192 103.63.135.190
85.90.206.228 118.68.170.172 195.231.68.161 181.166.210.119
81.28.163.215 118.68.35.72 113.22.223.113 206.189.228.107
177.81.228.23 121.122.109.97 119.10.115.36 13.58.119.165
31.163.150.89 14.17.81.19 41.77.146.98 69.165.222.88