Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.46.36.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23245
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.46.36.139.			IN	A

;; AUTHORITY SECTION:
.			312	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:47:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
server can't find 106.46.36.139.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
114.40.191.212 attackspam
UTC: 2019-11-26 port: 23/tcp
2019-11-28 01:36:43
221.182.96.207 attackspambots
Port scan detected on ports: 40390[UDP], 40390[UDP], 40390[UDP]
2019-11-28 01:45:40
160.16.111.215 attackspambots
Nov 27 15:45:29 OPSO sshd\[24628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.111.215  user=root
Nov 27 15:45:31 OPSO sshd\[24628\]: Failed password for root from 160.16.111.215 port 36365 ssh2
Nov 27 15:52:16 OPSO sshd\[25957\]: Invalid user kaphammer from 160.16.111.215 port 54178
Nov 27 15:52:16 OPSO sshd\[25957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.111.215
Nov 27 15:52:17 OPSO sshd\[25957\]: Failed password for invalid user kaphammer from 160.16.111.215 port 54178 ssh2
2019-11-28 01:40:10
87.236.20.167 attack
[munged]::443 87.236.20.167 - - [27/Nov/2019:15:58:30 +0100] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 87.236.20.167 - - [27/Nov/2019:15:58:31 +0100] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 87.236.20.167 - - [27/Nov/2019:15:58:32 +0100] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 87.236.20.167 - - [27/Nov/2019:15:58:33 +0100] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 87.236.20.167 - - [27/Nov/2019:15:58:34 +0100] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 87.236.20.167 - - [27/Nov/2019:15:58:35 +0100] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubun
2019-11-28 01:15:07
176.31.200.121 attackbots
Nov 27 16:50:53 OPSO sshd\[4360\]: Invalid user chao9914924 from 176.31.200.121 port 37542
Nov 27 16:50:53 OPSO sshd\[4360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.200.121
Nov 27 16:50:55 OPSO sshd\[4360\]: Failed password for invalid user chao9914924 from 176.31.200.121 port 37542 ssh2
Nov 27 16:54:08 OPSO sshd\[4688\]: Invalid user xchat from 176.31.200.121 port 44016
Nov 27 16:54:08 OPSO sshd\[4688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.200.121
2019-11-28 01:46:44
175.23.35.153 attackspam
UTC: 2019-11-26 port: 23/tcp
2019-11-28 01:27:38
189.125.2.234 attackspam
Nov 27 18:05:54 icinga sshd[20784]: Failed password for root from 189.125.2.234 port 9175 ssh2
...
2019-11-28 01:48:26
80.82.64.127 attackspam
Unauthorised traffic from IP address - Firewall rule hit (suspected port-scanning)
2019-11-28 01:23:11
180.165.1.44 attackbots
Nov 27 11:22:25 mail sshd\[1224\]: Invalid user yutanim from 180.165.1.44
Nov 27 11:22:25 mail sshd\[1224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.165.1.44
...
2019-11-28 01:29:40
46.229.168.163 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 53c26976abbcf0b5 | WAF_Rule_ID: asn | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: unknown | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (compatible; SemrushBot/6~bl; +http://www.semrush.com/bot.html) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-11-28 01:18:05
92.188.124.228 attackbots
Nov 27 17:14:49 localhost sshd\[48816\]: Invalid user peh from 92.188.124.228 port 46020
Nov 27 17:14:49 localhost sshd\[48816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228
Nov 27 17:14:52 localhost sshd\[48816\]: Failed password for invalid user peh from 92.188.124.228 port 46020 ssh2
Nov 27 17:17:49 localhost sshd\[48938\]: Invalid user alena from 92.188.124.228 port 51572
Nov 27 17:17:49 localhost sshd\[48938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228
...
2019-11-28 01:46:07
134.175.123.16 attack
2019-11-27T17:14:02.183052abusebot-7.cloudsearch.cf sshd\[28966\]: Invalid user sonar from 134.175.123.16 port 21903
2019-11-27T17:14:02.187345abusebot-7.cloudsearch.cf sshd\[28966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.123.16
2019-11-28 01:27:57
27.254.63.38 attackbots
Nov 27 13:41:50 ldap01vmsma01 sshd[41151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.63.38
Nov 27 13:41:52 ldap01vmsma01 sshd[41151]: Failed password for invalid user berhanu from 27.254.63.38 port 47466 ssh2
...
2019-11-28 01:35:22
79.137.34.248 attackspam
Nov 27 15:52:19 icinga sshd[7731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248
Nov 27 15:52:21 icinga sshd[7731]: Failed password for invalid user rpm from 79.137.34.248 port 40367 ssh2
...
2019-11-28 01:39:03
202.52.14.74 attack
SS5,DEF GET /MyAdmin/scripts/setup.php
2019-11-28 01:15:32

Recently Reported IPs

106.46.36.116 106.46.36.236 128.231.202.74 106.46.36.209
101.31.32.15 106.46.35.31 106.46.36.28 106.46.36.72
106.46.36.131 106.46.36.84 106.46.36.86 106.46.37.156
106.46.37.71 106.46.38.115 101.31.59.195 106.46.37.104
106.46.37.165 106.46.37.80 106.46.38.211 106.46.38.243