Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.45.220.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.45.220.106.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:38:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 106.220.45.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.220.45.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.122.224.204 attackbotsspam
Unauthorized IMAP connection attempt
2020-06-28 07:47:29
185.143.75.153 attackspambots
Jun 28 08:52:05 ns1 postfix/smtpd\[755\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: authentication failure
Jun 28 08:52:54 ns1 postfix/smtpd\[755\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: authentication failure
Jun 28 08:53:45 ns1 postfix/smtpd\[755\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: authentication failure
Jun 28 08:54:35 ns1 postfix/smtpd\[755\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: authentication failure
Jun 28 08:55:27 ns1 postfix/smtpd\[755\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: authentication failure
...
2020-06-28 07:56:20
192.35.169.42 attackbots
 TCP (SYN) 192.35.169.42:31108 -> port 2549, len 44
2020-06-28 07:32:13
106.75.7.92 attack
Jun 28 00:15:33 server sshd[24424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.7.92
Jun 28 00:15:35 server sshd[24424]: Failed password for invalid user admin from 106.75.7.92 port 47136 ssh2
Jun 28 00:34:54 server sshd[25242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.7.92  user=root
Jun 28 00:34:56 server sshd[25242]: Failed password for invalid user root from 106.75.7.92 port 43322 ssh2
2020-06-28 07:34:02
185.4.135.27 attack
GET /?q=user
2020-06-28 07:46:20
106.12.159.148 attack
SSH Invalid Login
2020-06-28 07:19:12
159.203.45.210 attackspambots
159.203.45.210 - - [28/Jun/2020:00:18:41 +0100] "POST /wp-login.php HTTP/1.1" 200 1968 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.45.210 - - [28/Jun/2020:00:18:43 +0100] "POST /wp-login.php HTTP/1.1" 200 1972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.45.210 - - [28/Jun/2020:00:18:43 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-28 07:25:03
189.135.197.7 attack
Lines containing failures of 189.135.197.7 (max 1000)
Jun 27 00:20:55 archiv sshd[28640]: Address 189.135.197.7 maps to dsl-189-135-197-7-dyn.prod-infinhostnameum.com.mx, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 27 00:20:55 archiv sshd[28640]: Invalid user boss from 189.135.197.7 port 53766
Jun 27 00:20:55 archiv sshd[28640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.135.197.7
Jun 27 00:20:57 archiv sshd[28640]: Failed password for invalid user boss from 189.135.197.7 port 53766 ssh2
Jun 27 00:20:57 archiv sshd[28640]: Received disconnect from 189.135.197.7 port 53766:11: Bye Bye [preauth]
Jun 27 00:20:57 archiv sshd[28640]: Disconnected from 189.135.197.7 port 53766 [preauth]
Jun 27 00:28:46 archiv sshd[29006]: Address 189.135.197.7 maps to dsl-189-135-197-7-dyn.prod-infinhostnameum.com.mx, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 27 00:28:46 archiv sshd........
------------------------------
2020-06-28 07:30:54
51.158.154.44 attackbotsspam
GET /?q=user
2020-06-28 07:48:27
129.226.138.179 attackspambots
Jun 28 00:54:35 ns37 sshd[9925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.138.179
Jun 28 00:54:35 ns37 sshd[9925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.138.179
2020-06-28 07:36:01
192.99.4.63 attackbots
192.99.4.63 - - [28/Jun/2020:00:19:51 +0100] "POST /wp-login.php HTTP/1.1" 200 6066 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.4.63 - - [28/Jun/2020:00:21:18 +0100] "POST /wp-login.php HTTP/1.1" 200 6066 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.4.63 - - [28/Jun/2020:00:22:24 +0100] "POST /wp-login.php HTTP/1.1" 200 6067 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-06-28 07:22:38
189.68.145.6 attackbots
Automatic report - Banned IP Access
2020-06-28 07:20:28
193.112.109.108 attackspambots
Jun 28 00:20:13 vps687878 sshd\[13233\]: Invalid user syp from 193.112.109.108 port 35220
Jun 28 00:20:13 vps687878 sshd\[13233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.109.108
Jun 28 00:20:15 vps687878 sshd\[13233\]: Failed password for invalid user syp from 193.112.109.108 port 35220 ssh2
Jun 28 00:24:20 vps687878 sshd\[13668\]: Invalid user content from 193.112.109.108 port 56810
Jun 28 00:24:20 vps687878 sshd\[13668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.109.108
...
2020-06-28 07:39:17
113.89.12.184 attackbots
Port scan: Attack repeated for 24 hours
2020-06-28 07:46:50
61.7.147.29 attackspambots
Jun 28 03:19:43 gw1 sshd[30597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.29
Jun 28 03:19:45 gw1 sshd[30597]: Failed password for invalid user serge from 61.7.147.29 port 59718 ssh2
...
2020-06-28 07:37:53

Recently Reported IPs

106.40.240.254 106.45.220.116 106.45.220.110 106.45.220.108
106.45.220.112 106.40.240.26 106.45.220.115 106.45.220.124
106.45.220.122 106.45.220.104 106.45.220.118 106.45.220.12
106.45.220.120 106.45.220.126 106.45.220.136 106.45.220.134
106.45.220.128 106.45.220.138 106.45.220.147 106.45.220.132