Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.45.220.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.45.220.2.			IN	A

;; AUTHORITY SECTION:
.			161	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:45:52 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 2.220.45.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.220.45.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.8.205.220 attackbots
Sep  3 10:41:02 php1 sshd\[29041\]: Invalid user test1 from 66.8.205.220
Sep  3 10:41:02 php1 sshd\[29041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.8.205.220
Sep  3 10:41:03 php1 sshd\[29041\]: Failed password for invalid user test1 from 66.8.205.220 port 35876 ssh2
Sep  3 10:45:44 php1 sshd\[29499\]: Invalid user master from 66.8.205.220
Sep  3 10:45:44 php1 sshd\[29499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.8.205.220
2019-09-04 05:01:05
92.63.194.90 attack
Sep  3 21:07:40 localhost sshd\[20876\]: Invalid user admin from 92.63.194.90 port 46588
Sep  3 21:07:40 localhost sshd\[20876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
Sep  3 21:07:42 localhost sshd\[20876\]: Failed password for invalid user admin from 92.63.194.90 port 46588 ssh2
2019-09-04 04:27:18
211.54.70.152 attackspambots
Sep  3 16:56:32 TORMINT sshd\[7542\]: Invalid user admin from 211.54.70.152
Sep  3 16:56:32 TORMINT sshd\[7542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.54.70.152
Sep  3 16:56:34 TORMINT sshd\[7542\]: Failed password for invalid user admin from 211.54.70.152 port 63408 ssh2
...
2019-09-04 05:01:36
187.19.49.73 attackspambots
Sep  3 21:03:21 hb sshd\[11231\]: Invalid user git from 187.19.49.73
Sep  3 21:03:22 hb sshd\[11231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.19.49.73
Sep  3 21:03:23 hb sshd\[11231\]: Failed password for invalid user git from 187.19.49.73 port 47754 ssh2
Sep  3 21:08:28 hb sshd\[11681\]: Invalid user gaurav from 187.19.49.73
Sep  3 21:08:28 hb sshd\[11681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.19.49.73
2019-09-04 05:11:57
218.92.0.133 attackspambots
Sep  3 20:21:19 debian sshd\[19815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Sep  3 20:21:21 debian sshd\[19815\]: Failed password for root from 218.92.0.133 port 37314 ssh2
...
2019-09-04 04:53:03
92.222.88.30 attackbotsspam
Sep  3 20:02:11 hcbbdb sshd\[31229\]: Invalid user zaky from 92.222.88.30
Sep  3 20:02:11 hcbbdb sshd\[31229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=6490.aguia.info
Sep  3 20:02:14 hcbbdb sshd\[31229\]: Failed password for invalid user zaky from 92.222.88.30 port 49990 ssh2
Sep  3 20:06:19 hcbbdb sshd\[31705\]: Invalid user eric from 92.222.88.30
Sep  3 20:06:19 hcbbdb sshd\[31705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=6490.aguia.info
2019-09-04 04:59:14
198.23.133.80 attackbotsspam
Sep  3 08:53:34 tdfoods sshd\[4931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.133.80  user=root
Sep  3 08:53:35 tdfoods sshd\[4931\]: Failed password for root from 198.23.133.80 port 51986 ssh2
Sep  3 08:58:35 tdfoods sshd\[5440\]: Invalid user grupo1 from 198.23.133.80
Sep  3 08:58:35 tdfoods sshd\[5440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.133.80
Sep  3 08:58:37 tdfoods sshd\[5440\]: Failed password for invalid user grupo1 from 198.23.133.80 port 41312 ssh2
2019-09-04 04:56:51
218.98.26.172 attackbots
2019-09-03T20:55:58.080168abusebot-7.cloudsearch.cf sshd\[29157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.172  user=root
2019-09-04 04:58:51
129.204.65.101 attack
Sep  3 10:26:09 web1 sshd\[30453\]: Invalid user oracle from 129.204.65.101
Sep  3 10:26:09 web1 sshd\[30453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.65.101
Sep  3 10:26:11 web1 sshd\[30453\]: Failed password for invalid user oracle from 129.204.65.101 port 54004 ssh2
Sep  3 10:31:02 web1 sshd\[30919\]: Invalid user unithkd from 129.204.65.101
Sep  3 10:31:02 web1 sshd\[30919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.65.101
2019-09-04 04:42:43
218.98.40.152 attackspambots
2019-09-03T21:07:31.914770abusebot-7.cloudsearch.cf sshd\[29222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.152  user=root
2019-09-04 05:15:33
5.196.137.213 attack
Sep  3 20:21:03 localhost sshd\[108706\]: Invalid user dixie from 5.196.137.213 port 47105
Sep  3 20:21:03 localhost sshd\[108706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.137.213
Sep  3 20:21:05 localhost sshd\[108706\]: Failed password for invalid user dixie from 5.196.137.213 port 47105 ssh2
Sep  3 20:25:20 localhost sshd\[108917\]: Invalid user dmin from 5.196.137.213 port 40906
Sep  3 20:25:20 localhost sshd\[108917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.137.213
...
2019-09-04 04:28:27
18.18.248.17 attackbots
Sep  3 20:26:52 sshgateway sshd\[29084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.18.248.17  user=root
Sep  3 20:26:54 sshgateway sshd\[29084\]: Failed password for root from 18.18.248.17 port 28629 ssh2
Sep  3 20:27:08 sshgateway sshd\[29084\]: error: maximum authentication attempts exceeded for root from 18.18.248.17 port 28629 ssh2 \[preauth\]
2019-09-04 04:47:45
142.93.1.100 attackspam
Sep  3 23:58:40 site2 sshd\[26833\]: Invalid user storm from 142.93.1.100Sep  3 23:58:42 site2 sshd\[26833\]: Failed password for invalid user storm from 142.93.1.100 port 42398 ssh2Sep  4 00:02:20 site2 sshd\[26967\]: Invalid user shan from 142.93.1.100Sep  4 00:02:22 site2 sshd\[26967\]: Failed password for invalid user shan from 142.93.1.100 port 55498 ssh2Sep  4 00:05:54 site2 sshd\[27013\]: Invalid user waredox from 142.93.1.100
...
2019-09-04 05:13:22
43.224.249.224 attackspam
Sep  3 10:32:38 auw2 sshd\[3703\]: Invalid user onie from 43.224.249.224
Sep  3 10:32:39 auw2 sshd\[3703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.224.249.224
Sep  3 10:32:40 auw2 sshd\[3703\]: Failed password for invalid user onie from 43.224.249.224 port 43841 ssh2
Sep  3 10:37:40 auw2 sshd\[4184\]: Invalid user avis from 43.224.249.224
Sep  3 10:37:40 auw2 sshd\[4184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.224.249.224
2019-09-04 04:39:11
104.248.58.71 attackspam
Sep  3 22:56:16 vps647732 sshd[28499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.58.71
Sep  3 22:56:18 vps647732 sshd[28499]: Failed password for invalid user tim from 104.248.58.71 port 47924 ssh2
...
2019-09-04 05:17:11

Recently Reported IPs

106.45.220.212 106.45.220.206 106.45.220.210 106.45.220.200
106.45.220.240 106.45.220.215 106.45.220.30 106.45.220.32
106.45.220.235 106.45.220.4 210.103.146.105 101.3.123.135
106.45.220.48 106.45.220.34 106.45.220.44 106.45.220.36
106.45.220.40 106.45.220.58 106.45.220.51 106.45.220.60