Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.45.104.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.45.104.6.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:43:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 6.104.45.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.104.45.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.37.226.173 attackspam
Sep 30 23:55:12 SilenceServices sshd[578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.226.173
Sep 30 23:55:13 SilenceServices sshd[578]: Failed password for invalid user mcadmin from 54.37.226.173 port 50064 ssh2
Sep 30 23:59:21 SilenceServices sshd[1696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.226.173
2019-10-01 06:18:15
139.155.33.169 attack
Sep 30 19:34:40 vtv3 sshd\[6766\]: Invalid user admin from 139.155.33.169 port 50398
Sep 30 19:34:40 vtv3 sshd\[6766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.33.169
Sep 30 19:34:41 vtv3 sshd\[6766\]: Failed password for invalid user admin from 139.155.33.169 port 50398 ssh2
Sep 30 19:41:15 vtv3 sshd\[10316\]: Invalid user ax400 from 139.155.33.169 port 60014
Sep 30 19:41:15 vtv3 sshd\[10316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.33.169
Sep 30 19:52:45 vtv3 sshd\[15943\]: Invalid user gast3 from 139.155.33.169 port 42564
Sep 30 19:52:45 vtv3 sshd\[15943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.33.169
Sep 30 19:52:48 vtv3 sshd\[15943\]: Failed password for invalid user gast3 from 139.155.33.169 port 42564 ssh2
Sep 30 19:58:33 vtv3 sshd\[18626\]: Invalid user overruled from 139.155.33.169 port 47952
Sep 30 19:58:33 vtv3 sshd\[1862
2019-10-01 06:04:29
114.32.230.189 attackbotsspam
Sep 30 12:06:00 hpm sshd\[4744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-32-230-189.hinet-ip.hinet.net  user=root
Sep 30 12:06:01 hpm sshd\[4744\]: Failed password for root from 114.32.230.189 port 37418 ssh2
Sep 30 12:10:32 hpm sshd\[5261\]: Invalid user 123456789 from 114.32.230.189
Sep 30 12:10:32 hpm sshd\[5261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-32-230-189.hinet-ip.hinet.net
Sep 30 12:10:34 hpm sshd\[5261\]: Failed password for invalid user 123456789 from 114.32.230.189 port 57823 ssh2
2019-10-01 06:14:28
18.218.96.131 attack
fail2ban honeypot
2019-10-01 05:39:39
27.134.248.131 attack
RDP Brute-Force (Grieskirchen RZ2)
2019-10-01 05:50:06
148.64.56.113 attackbots
Automatic report - Banned IP Access
2019-10-01 05:48:49
24.4.128.213 attackspam
Oct  1 04:31:46 webhost01 sshd[18052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.4.128.213
Oct  1 04:31:47 webhost01 sshd[18052]: Failed password for invalid user user1 from 24.4.128.213 port 41176 ssh2
...
2019-10-01 05:36:03
222.186.180.9 attackbots
Sep 30 12:08:29 auw2 sshd\[16095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Sep 30 12:08:31 auw2 sshd\[16095\]: Failed password for root from 222.186.180.9 port 15244 ssh2
Sep 30 12:08:47 auw2 sshd\[16095\]: Failed password for root from 222.186.180.9 port 15244 ssh2
Sep 30 12:08:58 auw2 sshd\[16125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Sep 30 12:09:00 auw2 sshd\[16125\]: Failed password for root from 222.186.180.9 port 34204 ssh2
2019-10-01 06:09:18
37.252.78.38 attackbotsspam
09/30/2019-16:58:43.332103 37.252.78.38 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 33
2019-10-01 05:59:56
221.162.255.74 attack
Automatic report - Banned IP Access
2019-10-01 05:36:52
222.186.180.17 attackspambots
Oct  1 00:11:12 tuxlinux sshd[49013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
...
2019-10-01 06:16:53
51.75.17.228 attackbotsspam
Sep 30 11:45:19 wbs sshd\[15056\]: Invalid user iroda from 51.75.17.228
Sep 30 11:45:19 wbs sshd\[15056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=228.ip-51-75-17.eu
Sep 30 11:45:21 wbs sshd\[15056\]: Failed password for invalid user iroda from 51.75.17.228 port 57011 ssh2
Sep 30 11:55:02 wbs sshd\[15886\]: Invalid user ipe from 51.75.17.228
Sep 30 11:55:02 wbs sshd\[15886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=228.ip-51-75-17.eu
2019-10-01 06:10:11
52.36.53.169 attackspambots
09/30/2019-23:35:02.245903 52.36.53.169 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-01 05:49:21
95.84.134.5 attackbots
Sep 30 23:26:59 eventyay sshd[26084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.84.134.5
Sep 30 23:27:01 eventyay sshd[26084]: Failed password for invalid user rennie from 95.84.134.5 port 36086 ssh2
Sep 30 23:30:58 eventyay sshd[26187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.84.134.5
...
2019-10-01 05:54:08
54.37.154.254 attackbots
2019-09-30T17:06:26.5419291495-001 sshd\[9643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=254.ip-54-37-154.eu
2019-09-30T17:06:28.7277771495-001 sshd\[9643\]: Failed password for invalid user openfire from 54.37.154.254 port 47625 ssh2
2019-09-30T17:19:21.6394771495-001 sshd\[10601\]: Invalid user ubuntu from 54.37.154.254 port 40428
2019-09-30T17:19:21.6507861495-001 sshd\[10601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=254.ip-54-37-154.eu
2019-09-30T17:19:23.3346731495-001 sshd\[10601\]: Failed password for invalid user ubuntu from 54.37.154.254 port 40428 ssh2
2019-09-30T17:22:41.4249041495-001 sshd\[10785\]: Invalid user ple from 54.37.154.254 port 59809
...
2019-10-01 05:37:17

Recently Reported IPs

106.45.104.62 106.45.104.48 106.45.104.72 106.45.104.64
106.45.104.68 106.45.104.79 101.255.9.170 106.45.104.82
106.45.104.80 106.45.104.56 106.45.104.8 106.45.104.76
106.45.104.85 106.45.104.70 106.45.104.86 201.44.117.157
106.45.104.94 106.45.104.90 106.45.104.88 106.45.104.92