Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.55.156.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57925
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.55.156.140.			IN	A

;; AUTHORITY SECTION:
.			101	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 05:15:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 140.156.55.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.156.55.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.2.143.33 attack
20/6/16@05:49:25: FAIL: Alarm-Network address from=117.2.143.33
...
2020-06-16 18:14:29
167.172.103.224 attack
SSH login attempts.
2020-06-16 18:05:34
106.13.232.193 attackbotsspam
2020-06-15T23:26:06.7653941495-001 sshd[36051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.193  user=root
2020-06-15T23:26:08.6500931495-001 sshd[36051]: Failed password for root from 106.13.232.193 port 41694 ssh2
2020-06-15T23:29:51.1113631495-001 sshd[36195]: Invalid user bharat from 106.13.232.193 port 56964
2020-06-15T23:29:51.1146761495-001 sshd[36195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.193
2020-06-15T23:29:51.1113631495-001 sshd[36195]: Invalid user bharat from 106.13.232.193 port 56964
2020-06-15T23:29:52.8884041495-001 sshd[36195]: Failed password for invalid user bharat from 106.13.232.193 port 56964 ssh2
...
2020-06-16 18:36:48
165.22.193.235 attackbots
2020-06-16T08:31:22.252672mail.broermann.family sshd[9988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.193.235
2020-06-16T08:31:22.247855mail.broermann.family sshd[9988]: Invalid user griffin from 165.22.193.235 port 58226
2020-06-16T08:31:24.170684mail.broermann.family sshd[9988]: Failed password for invalid user griffin from 165.22.193.235 port 58226 ssh2
2020-06-16T08:34:21.405432mail.broermann.family sshd[10241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.193.235  user=root
2020-06-16T08:34:23.228483mail.broermann.family sshd[10241]: Failed password for root from 165.22.193.235 port 58742 ssh2
...
2020-06-16 18:13:03
38.121.77.226 attack
Automatic report - XMLRPC Attack
2020-06-16 18:03:56
125.19.16.199 attackspambots
 TCP (SYN) 125.19.16.199:49739 -> port 1433, len 44
2020-06-16 18:21:05
162.243.145.48 attack
9160/tcp 8998/tcp 8443/tcp...
[2020-04-30/06-15]48pkt,41pt.(tcp),4pt.(udp)
2020-06-16 18:28:09
46.239.34.161 attackbotsspam
Hits on port : 445
2020-06-16 18:33:54
5.185.95.70 attack
(eximsyntax) Exim syntax errors from 5.185.95.70 (PL/Poland/public718853.centertel.pl): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-16 08:19:24 SMTP call from public718853.centertel.pl [5.185.95.70] dropped: too many syntax or protocol errors (last command was "?ÿ\001??Q?\v?\004\003?\001\002?")
2020-06-16 18:12:44
96.2.79.105 attackspam
Brute forcing email accounts
2020-06-16 18:13:29
222.186.169.192 attackspam
2020-06-16T10:08:39.206700server.espacesoutien.com sshd[21874]: Failed password for root from 222.186.169.192 port 25758 ssh2
2020-06-16T10:08:42.290116server.espacesoutien.com sshd[21874]: Failed password for root from 222.186.169.192 port 25758 ssh2
2020-06-16T10:08:45.455676server.espacesoutien.com sshd[21874]: Failed password for root from 222.186.169.192 port 25758 ssh2
2020-06-16T10:08:49.035653server.espacesoutien.com sshd[21874]: Failed password for root from 222.186.169.192 port 25758 ssh2
...
2020-06-16 18:27:36
116.22.196.188 attack
Jun 16 06:10:38 vps647732 sshd[25123]: Failed password for root from 116.22.196.188 port 42430 ssh2
...
2020-06-16 18:01:33
148.70.31.188 attack
Jun 16 03:49:54 scw-6657dc sshd[26069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.31.188
Jun 16 03:49:54 scw-6657dc sshd[26069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.31.188
Jun 16 03:49:56 scw-6657dc sshd[26069]: Failed password for invalid user mql from 148.70.31.188 port 60852 ssh2
...
2020-06-16 17:59:38
212.52.131.9 attackbotsspam
Invalid user ftpuser from 212.52.131.9 port 59858
2020-06-16 18:19:23
46.38.150.142 attackspambots
Jun 16 11:27:41 websrv1.derweidener.de postfix/smtpd[2758718]: warning: unknown[46.38.150.142]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 16 11:28:41 websrv1.derweidener.de postfix/smtpd[2758332]: warning: unknown[46.38.150.142]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 16 11:29:30 websrv1.derweidener.de postfix/smtpd[2758332]: warning: unknown[46.38.150.142]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 16 11:30:19 websrv1.derweidener.de postfix/smtpd[2770793]: warning: unknown[46.38.150.142]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 16 11:30:56 websrv1.derweidener.de postfix/smtpd[2770793]: warning: unknown[46.38.150.142]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-16 17:56:17

Recently Reported IPs

106.55.131.29 106.55.138.38 106.55.164.195 106.55.198.143
106.55.199.70 106.55.219.212 106.55.227.8 106.55.24.221
106.55.26.192 106.55.68.250 106.55.38.38 106.55.80.57
106.56.151.139 106.56.122.32 106.56.93.129 106.56.93.254
106.57.230.124 106.58.216.195 106.57.230.79 106.58.159.35