Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.42.248.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43621
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.42.248.20.			IN	A

;; AUTHORITY SECTION:
.			177	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 19:26:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 20.248.42.106.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 106.42.248.20.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
91.121.101.159 attackbotsspam
Mar  1 01:37:59 motanud sshd\[10083\]: Invalid user lai from 91.121.101.159 port 45732
Mar  1 01:37:59 motanud sshd\[10083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.101.159
Mar  1 01:38:01 motanud sshd\[10083\]: Failed password for invalid user lai from 91.121.101.159 port 45732 ssh2
2019-07-03 09:55:06
139.59.94.192 attack
Jul  3 01:15:12 srv03 sshd\[23638\]: Invalid user git from 139.59.94.192 port 50929
Jul  3 01:15:12 srv03 sshd\[23638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.94.192
Jul  3 01:15:14 srv03 sshd\[23638\]: Failed password for invalid user git from 139.59.94.192 port 50929 ssh2
2019-07-03 09:43:20
66.97.41.148 attackbotsspam
proto=tcp  .  spt=56650  .  dpt=25  .     (listed on Blocklist de  Jul 02)     (37)
2019-07-03 09:59:41
186.84.172.62 attackspam
Jul  3 01:12:31 vps691689 sshd[25758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.62
Jul  3 01:12:33 vps691689 sshd[25758]: Failed password for invalid user teamspeak from 186.84.172.62 port 43994 ssh2
...
2019-07-03 09:50:35
218.62.81.94 attack
Brute force attempt
2019-07-03 09:24:31
159.203.183.119 attackspambots
utm - spam
2019-07-03 09:23:56
158.69.162.111 attackspambots
Sql/code injection probe
2019-07-03 09:22:25
88.169.228.5 attackspambots
Feb 26 14:24:21 motanud sshd\[2092\]: Invalid user qa from 88.169.228.5 port 51704
Feb 26 14:24:21 motanud sshd\[2092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.169.228.5
Feb 26 14:24:23 motanud sshd\[2092\]: Failed password for invalid user qa from 88.169.228.5 port 51704 ssh2
2019-07-03 09:29:54
45.55.232.106 attackbotsspam
Jul  3 01:15:21 ns41 sshd[5193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.232.106
2019-07-03 09:42:13
45.2.193.139 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-07-03 09:50:17
37.59.116.10 attackbotsspam
Jul  3 01:21:55 MK-Soft-VM3 sshd\[14526\]: Invalid user tanya from 37.59.116.10 port 41491
Jul  3 01:21:55 MK-Soft-VM3 sshd\[14526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.116.10
Jul  3 01:21:57 MK-Soft-VM3 sshd\[14526\]: Failed password for invalid user tanya from 37.59.116.10 port 41491 ssh2
...
2019-07-03 10:00:55
146.185.25.177 attackspambots
1562109356 - 07/03/2019 01:15:56 Host: scanners.labs.rapid7.com/146.185.25.177 Port: 47808 UDP Blocked
2019-07-03 09:31:07
13.75.45.53 attack
Jul  3 01:50:33 server sshd[52240]: Failed password for invalid user edu from 13.75.45.53 port 43476 ssh2
Jul  3 01:57:48 server sshd[53786]: Failed password for invalid user minigames from 13.75.45.53 port 58480 ssh2
Jul  3 02:03:02 server sshd[54958]: Failed password for invalid user libsys from 13.75.45.53 port 56542 ssh2
2019-07-03 09:24:51
189.7.129.60 attack
Jul  3 01:14:39 rpi sshd[17347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.129.60 
Jul  3 01:14:41 rpi sshd[17347]: Failed password for invalid user node from 189.7.129.60 port 59641 ssh2
2019-07-03 09:58:24
132.232.4.33 attackspam
Jul  1 22:31:35 josie sshd[22793]: Invalid user spark from 132.232.4.33
Jul  1 22:31:35 josie sshd[22793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33 
Jul  1 22:31:37 josie sshd[22793]: Failed password for invalid user spark from 132.232.4.33 port 55502 ssh2
Jul  1 22:31:37 josie sshd[22794]: Received disconnect from 132.232.4.33: 11: Bye Bye
Jul  1 22:36:53 josie sshd[25984]: Invalid user redhat from 132.232.4.33
Jul  1 22:36:53 josie sshd[25984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33 
Jul  1 22:36:55 josie sshd[25984]: Failed password for invalid user redhat from 132.232.4.33 port 49278 ssh2
Jul  1 22:36:56 josie sshd[25991]: Received disconnect from 132.232.4.33: 11: Bye Bye
Jul  1 22:39:42 josie sshd[27481]: Invalid user test from 132.232.4.33
Jul  1 22:39:42 josie sshd[27481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty........
-------------------------------
2019-07-03 10:02:22

Recently Reported IPs

106.42.169.247 106.42.39.196 106.44.246.2 106.45.11.178
106.45.8.102 106.45.8.153 106.45.8.168 106.45.8.178
106.45.8.219 106.45.8.220 106.45.8.231 106.45.8.58
106.45.8.8 106.45.9.1 106.45.9.101 106.45.9.111
106.45.9.248 106.45.9.72 30.59.221.219 106.46.168.160