Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.4.161.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57237
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.4.161.113.			IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:15:23 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 113.161.4.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.161.4.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.163 attack
Sep  2 13:59:00 auw2 sshd\[17199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
Sep  2 13:59:02 auw2 sshd\[17199\]: Failed password for root from 222.186.42.163 port 60490 ssh2
Sep  2 13:59:07 auw2 sshd\[17221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
Sep  2 13:59:09 auw2 sshd\[17221\]: Failed password for root from 222.186.42.163 port 38712 ssh2
Sep  2 13:59:15 auw2 sshd\[17234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
2019-09-03 08:04:03
201.48.206.146 attack
Sep  3 02:49:08 server sshd\[2991\]: Invalid user spider from 201.48.206.146 port 52496
Sep  3 02:49:08 server sshd\[2991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.206.146
Sep  3 02:49:10 server sshd\[2991\]: Failed password for invalid user spider from 201.48.206.146 port 52496 ssh2
Sep  3 02:54:56 server sshd\[21888\]: Invalid user minecraft from 201.48.206.146 port 46366
Sep  3 02:54:56 server sshd\[21888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.206.146
2019-09-03 08:06:51
157.230.140.180 attack
Sep  2 14:07:38 kapalua sshd\[17994\]: Invalid user dario from 157.230.140.180
Sep  2 14:07:38 kapalua sshd\[17994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.140.180
Sep  2 14:07:40 kapalua sshd\[17994\]: Failed password for invalid user dario from 157.230.140.180 port 60478 ssh2
Sep  2 14:11:46 kapalua sshd\[16617\]: Invalid user tweety from 157.230.140.180
Sep  2 14:11:46 kapalua sshd\[16617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.140.180
2019-09-03 08:14:28
200.139.82.37 attack
" "
2019-09-03 08:21:23
42.104.97.227 attackspam
Sep  3 03:33:35 www4 sshd\[48598\]: Invalid user server from 42.104.97.227
Sep  3 03:33:35 www4 sshd\[48598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.227
Sep  3 03:33:37 www4 sshd\[48598\]: Failed password for invalid user server from 42.104.97.227 port 58261 ssh2
...
2019-09-03 08:46:05
171.244.129.66 attack
[munged]::443 171.244.129.66 - - [03/Sep/2019:01:07:32 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 171.244.129.66 - - [03/Sep/2019:01:07:38 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 171.244.129.66 - - [03/Sep/2019:01:07:38 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 171.244.129.66 - - [03/Sep/2019:01:07:43 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 171.244.129.66 - - [03/Sep/2019:01:07:43 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 171.244.129.66 - - [03/Sep/2019:01:07:49 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11
2019-09-03 08:46:24
165.22.123.146 attackbots
Sep  2 13:52:38 lcdev sshd\[15348\]: Invalid user pace from 165.22.123.146
Sep  2 13:52:38 lcdev sshd\[15348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.123.146
Sep  2 13:52:41 lcdev sshd\[15348\]: Failed password for invalid user pace from 165.22.123.146 port 38490 ssh2
Sep  2 13:56:39 lcdev sshd\[16359\]: Invalid user nexus from 165.22.123.146
Sep  2 13:56:39 lcdev sshd\[16359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.123.146
2019-09-03 08:11:00
51.75.24.200 attackspam
Sep  3 02:14:23 SilenceServices sshd[5333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.24.200
Sep  3 02:14:24 SilenceServices sshd[5333]: Failed password for invalid user alain from 51.75.24.200 port 53944 ssh2
Sep  3 02:18:21 SilenceServices sshd[8383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.24.200
2019-09-03 08:28:16
106.75.216.98 attack
Sep  2 14:35:17 web1 sshd\[17380\]: Invalid user psrao from 106.75.216.98
Sep  2 14:35:17 web1 sshd\[17380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.216.98
Sep  2 14:35:19 web1 sshd\[17380\]: Failed password for invalid user psrao from 106.75.216.98 port 57552 ssh2
Sep  2 14:40:03 web1 sshd\[17963\]: Invalid user odbc from 106.75.216.98
Sep  2 14:40:03 web1 sshd\[17963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.216.98
2019-09-03 08:40:20
175.211.116.226 attackbotsspam
Sep  3 06:08:31 webhost01 sshd[5613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.116.226
Sep  3 06:08:33 webhost01 sshd[5613]: Failed password for invalid user jule from 175.211.116.226 port 60132 ssh2
...
2019-09-03 08:36:58
106.13.6.116 attackbots
Sep  2 14:10:00 aiointranet sshd\[7795\]: Invalid user cmd from 106.13.6.116
Sep  2 14:10:00 aiointranet sshd\[7795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
Sep  2 14:10:02 aiointranet sshd\[7795\]: Failed password for invalid user cmd from 106.13.6.116 port 39238 ssh2
Sep  2 14:14:11 aiointranet sshd\[8114\]: Invalid user khelms from 106.13.6.116
Sep  2 14:14:11 aiointranet sshd\[8114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
2019-09-03 08:20:12
198.245.49.37 attackbotsspam
Sep  3 01:50:54 localhost sshd\[17547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.49.37  user=root
Sep  3 01:50:57 localhost sshd\[17547\]: Failed password for root from 198.245.49.37 port 43834 ssh2
Sep  3 01:54:46 localhost sshd\[17961\]: Invalid user test from 198.245.49.37 port 60500
Sep  3 01:54:46 localhost sshd\[17961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.49.37
2019-09-03 08:52:04
75.157.242.104 attackspambots
xmlrpc attack
2019-09-03 08:16:19
159.89.225.82 attack
Sep  3 01:42:22 lnxmysql61 sshd[16421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.225.82
Sep  3 01:42:22 lnxmysql61 sshd[16421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.225.82
2019-09-03 08:07:16
79.126.100.38 attack
fell into ViewStateTrap:wien2018
2019-09-03 08:11:42

Recently Reported IPs

106.39.26.18 106.33.168.42 106.4.161.12 106.4.161.14
106.38.145.163 106.4.161.136 106.4.161.108 106.33.162.78
106.41.134.102 106.4.161.26 106.41.18.118 106.41.23.104
106.41.22.189 106.41.19.31 106.45.8.103 106.41.18.76
106.42.167.242 106.45.109.253 106.45.8.11 106.42.254.225