Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.54.75.144 attackbots
Unauthorized SSH login attempts
2020-10-10 02:57:47
106.54.75.144 attackbots
2020-10-09 03:42:08.656668-0500  localhost sshd[60140]: Failed password for invalid user kay from 106.54.75.144 port 35084 ssh2
2020-10-09 18:44:25
106.54.75.144 attack
Aug  4 03:33:37 itv-usvr-01 sshd[21590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.75.144  user=root
Aug  4 03:33:39 itv-usvr-01 sshd[21590]: Failed password for root from 106.54.75.144 port 47002 ssh2
2020-08-04 07:48:24
106.54.75.144 attackspambots
Aug  2 21:17:46 ajax sshd[19254]: Failed password for root from 106.54.75.144 port 42690 ssh2
2020-08-03 07:49:52
106.54.75.144 attackspambots
Unauthorized SSH login attempts
2020-07-30 06:11:49
106.54.75.144 attackspambots
Jul 26 19:11:32 lukav-desktop sshd\[2678\]: Invalid user xdd from 106.54.75.144
Jul 26 19:11:32 lukav-desktop sshd\[2678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.75.144
Jul 26 19:11:34 lukav-desktop sshd\[2678\]: Failed password for invalid user xdd from 106.54.75.144 port 60874 ssh2
Jul 26 19:14:10 lukav-desktop sshd\[10549\]: Invalid user wangkang from 106.54.75.144
Jul 26 19:14:10 lukav-desktop sshd\[10549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.75.144
2020-07-27 01:08:07
106.54.75.144 attackbotsspam
Jul 12 06:53:09 lukav-desktop sshd\[4830\]: Invalid user sjguo from 106.54.75.144
Jul 12 06:53:09 lukav-desktop sshd\[4830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.75.144
Jul 12 06:53:11 lukav-desktop sshd\[4830\]: Failed password for invalid user sjguo from 106.54.75.144 port 36336 ssh2
Jul 12 06:56:48 lukav-desktop sshd\[4883\]: Invalid user liss from 106.54.75.144
Jul 12 06:56:48 lukav-desktop sshd\[4883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.75.144
2020-07-12 12:03:03
106.54.75.144 attackspambots
Jul 10 18:11:23 firewall sshd[21703]: Invalid user demon from 106.54.75.144
Jul 10 18:11:25 firewall sshd[21703]: Failed password for invalid user demon from 106.54.75.144 port 35142 ssh2
Jul 10 18:15:33 firewall sshd[21859]: Invalid user deployer from 106.54.75.144
...
2020-07-11 05:33:27
106.54.75.144 attack
Jul  9 14:02:43 abendstille sshd\[32716\]: Invalid user office from 106.54.75.144
Jul  9 14:02:43 abendstille sshd\[32716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.75.144
Jul  9 14:02:45 abendstille sshd\[32716\]: Failed password for invalid user office from 106.54.75.144 port 45306 ssh2
Jul  9 14:04:38 abendstille sshd\[2333\]: Invalid user xujing from 106.54.75.144
Jul  9 14:04:38 abendstille sshd\[2333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.75.144
...
2020-07-10 01:56:41
106.54.75.144 attackspam
Jun 17 20:34:15 onepixel sshd[1650330]: Failed password for invalid user admin from 106.54.75.144 port 36900 ssh2
Jun 17 20:38:49 onepixel sshd[1650932]: Invalid user jason from 106.54.75.144 port 59258
Jun 17 20:38:49 onepixel sshd[1650932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.75.144 
Jun 17 20:38:49 onepixel sshd[1650932]: Invalid user jason from 106.54.75.144 port 59258
Jun 17 20:38:50 onepixel sshd[1650932]: Failed password for invalid user jason from 106.54.75.144 port 59258 ssh2
2020-06-18 04:41:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.54.75.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.54.75.72.			IN	A

;; AUTHORITY SECTION:
.			203	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:16:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 72.75.54.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.75.54.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.158.117.227 attackspambots
Aug 30 06:49:45 cvbmail sshd\[20053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.117.227  user=root
Aug 30 06:49:47 cvbmail sshd\[20053\]: Failed password for root from 51.158.117.227 port 41008 ssh2
Aug 30 06:50:03 cvbmail sshd\[20055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.117.227  user=root
2019-08-30 13:00:33
180.168.198.142 attack
Aug 30 03:30:51 MK-Soft-Root2 sshd\[25687\]: Invalid user teamspeak from 180.168.198.142 port 56088
Aug 30 03:30:51 MK-Soft-Root2 sshd\[25687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.198.142
Aug 30 03:30:53 MK-Soft-Root2 sshd\[25687\]: Failed password for invalid user teamspeak from 180.168.198.142 port 56088 ssh2
...
2019-08-30 13:01:34
188.226.226.82 attackbotsspam
Aug 30 01:02:13 xtremcommunity sshd\[5099\]: Invalid user murp from 188.226.226.82 port 42930
Aug 30 01:02:13 xtremcommunity sshd\[5099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.226.82
Aug 30 01:02:15 xtremcommunity sshd\[5099\]: Failed password for invalid user murp from 188.226.226.82 port 42930 ssh2
Aug 30 01:08:33 xtremcommunity sshd\[5297\]: Invalid user tomcat4 from 188.226.226.82 port 47076
Aug 30 01:08:33 xtremcommunity sshd\[5297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.226.82
...
2019-08-30 13:10:11
81.12.111.2 attack
$f2bV_matches
2019-08-30 13:21:44
159.65.191.184 attack
Aug 30 05:56:53 MK-Soft-Root1 sshd\[10293\]: Invalid user chao from 159.65.191.184 port 56506
Aug 30 05:56:53 MK-Soft-Root1 sshd\[10293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.191.184
Aug 30 05:56:55 MK-Soft-Root1 sshd\[10293\]: Failed password for invalid user chao from 159.65.191.184 port 56506 ssh2
...
2019-08-30 12:50:33
82.186.144.163 attackbotsspam
23/tcp
[2019-08-30]1pkt
2019-08-30 13:21:22
104.14.37.43 attackbots
LGS,WP GET /wp-login.php
2019-08-30 12:53:14
222.170.168.106 attackspambots
(mod_security) mod_security (id:230011) triggered by 222.170.168.106 (CN/China/-): 5 in the last 3600 secs
2019-08-30 12:36:24
54.36.150.139 attack
Automatic report - Banned IP Access
2019-08-30 13:03:21
77.46.153.218 attackbotsspam
2019-08-29T20:19:07.398413abusebot-5.cloudsearch.cf sshd\[20283\]: Invalid user user from 77.46.153.218 port 11288
2019-08-30 12:53:48
81.28.111.156 attackspambots
Aug 29 22:18:53 server postfix/smtpd[24985]: NOQUEUE: reject: RCPT from garrulous.heptezu.com[81.28.111.156]: 554 5.7.1 Service unavailable; Client host [81.28.111.156] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2019-08-30 13:00:05
37.72.187.2 attack
Aug 29 18:17:19 eddieflores sshd\[3737\]: Invalid user support from 37.72.187.2
Aug 29 18:17:19 eddieflores sshd\[3737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.72.187.2
Aug 29 18:17:21 eddieflores sshd\[3737\]: Failed password for invalid user support from 37.72.187.2 port 59332 ssh2
Aug 29 18:21:26 eddieflores sshd\[4094\]: Invalid user jeanette from 37.72.187.2
Aug 29 18:21:26 eddieflores sshd\[4094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.72.187.2
2019-08-30 12:35:47
206.81.7.42 attack
Invalid user l from 206.81.7.42 port 55778
2019-08-30 12:34:39
152.136.171.14 attackspam
2019-08-30T02:47:13.714003abusebot.cloudsearch.cf sshd\[17871\]: Invalid user london from 152.136.171.14 port 57138
2019-08-30 12:50:58
176.214.81.217 attackspam
Aug 29 18:48:16 hcbb sshd\[20844\]: Invalid user support from 176.214.81.217
Aug 29 18:48:16 hcbb sshd\[20844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.81.217
Aug 29 18:48:18 hcbb sshd\[20844\]: Failed password for invalid user support from 176.214.81.217 port 38489 ssh2
Aug 29 18:52:16 hcbb sshd\[21157\]: Invalid user andre from 176.214.81.217
Aug 29 18:52:16 hcbb sshd\[21157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.81.217
2019-08-30 12:57:09

Recently Reported IPs

106.53.239.240 106.53.242.221 106.52.43.157 106.55.104.71
106.54.97.81 106.53.141.185 106.52.64.117 106.55.26.228
106.55.33.35 106.56.146.148 106.56.150.46 106.57.125.243
106.57.229.61 106.57.178.23 106.57.33.67 106.59.126.112
106.58.99.80 106.57.17.98 106.58.145.90 106.59.14.140