Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.55.169.74 attack
Invalid user katie from 106.55.169.74 port 60478
2020-10-13 23:56:25
106.55.169.74 attackspambots
Invalid user katie from 106.55.169.74 port 60478
2020-10-13 15:11:55
106.55.169.74 attackspambots
4x Failed Password
2020-10-13 07:49:00
106.55.163.249 attackbotsspam
Invalid user chang from 106.55.163.249 port 39790
2020-10-12 23:36:37
106.55.163.249 attack
Invalid user chang from 106.55.163.249 port 39790
2020-10-12 15:00:12
106.55.161.202 attack
Oct  7 15:36:03 ift sshd\[27461\]: Failed password for root from 106.55.161.202 port 35246 ssh2Oct  7 15:38:18 ift sshd\[27687\]: Failed password for root from 106.55.161.202 port 59964 ssh2Oct  7 15:40:34 ift sshd\[28308\]: Failed password for root from 106.55.161.202 port 56450 ssh2Oct  7 15:42:56 ift sshd\[28530\]: Failed password for root from 106.55.161.202 port 52934 ssh2Oct  7 15:45:18 ift sshd\[29012\]: Failed password for root from 106.55.161.202 port 49422 ssh2
...
2020-10-08 01:45:24
106.55.161.202 attackbots
SSH login attempts.
2020-10-07 17:53:27
106.55.161.202 attackspam
Oct  6 02:21:55 localhost sshd[1703513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.161.202  user=root
Oct  6 02:21:57 localhost sshd[1703513]: Failed password for root from 106.55.161.202 port 43724 ssh2
...
2020-10-06 01:06:51
106.55.163.16 attackspam
Oct  4 01:51:18 pkdns2 sshd\[49200\]: Invalid user leo from 106.55.163.16Oct  4 01:51:20 pkdns2 sshd\[49200\]: Failed password for invalid user leo from 106.55.163.16 port 35442 ssh2Oct  4 01:56:08 pkdns2 sshd\[49365\]: Invalid user klaus from 106.55.163.16Oct  4 01:56:09 pkdns2 sshd\[49365\]: Failed password for invalid user klaus from 106.55.163.16 port 34586 ssh2Oct  4 02:00:53 pkdns2 sshd\[49579\]: Invalid user robin from 106.55.163.16Oct  4 02:00:55 pkdns2 sshd\[49579\]: Failed password for invalid user robin from 106.55.163.16 port 33740 ssh2
...
2020-10-04 09:16:54
106.55.163.16 attackspambots
Invalid user pcguest from 106.55.163.16 port 41384
2020-10-04 01:53:44
106.55.167.58 attack
sshd: Failed password for invalid user .... from 106.55.167.58 port 54504 ssh2 (7 attempts)
2020-10-03 19:47:35
106.55.163.16 attackspambots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-10-03 17:39:17
106.55.169.74 attack
2020-10-01T23:52:50.697689ollin.zadara.org sshd[1791911]: User root from 106.55.169.74 not allowed because not listed in AllowUsers
2020-10-01T23:52:52.883338ollin.zadara.org sshd[1791911]: Failed password for invalid user root from 106.55.169.74 port 57162 ssh2
...
2020-10-02 06:10:31
106.55.169.74 attackspam
Invalid user ceph from 106.55.169.74 port 47998
2020-10-01 22:33:31
106.55.162.86 attackspam
Invalid user unix from 106.55.162.86 port 60074
2020-09-28 02:56:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.55.16.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.55.16.89.			IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:57:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 89.16.55.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.16.55.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.37.32.79 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-25 00:24:21
35.192.57.37 attack
Jul 24 18:25:07 ip106 sshd[30739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.192.57.37 
Jul 24 18:25:09 ip106 sshd[30739]: Failed password for invalid user vhp from 35.192.57.37 port 48018 ssh2
...
2020-07-25 00:58:48
190.94.149.17 attack
port scan and connect, tcp 80 (http)
2020-07-25 00:46:55
161.35.104.35 attackspambots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-25 00:58:06
85.172.11.101 attackbots
2020-07-24T17:01:25+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-07-25 00:49:06
222.252.21.40 attackbotsspam
Unauthorized connection attempt from IP address 222.252.21.40 on Port 445(SMB)
2020-07-25 01:02:33
139.226.35.190 attack
Invalid user gj from 139.226.35.190 port 59426
2020-07-25 00:57:22
150.136.21.93 attack
Invalid user dan from 150.136.21.93 port 33934
2020-07-25 00:48:18
51.79.84.101 attack
Jul 24 10:30:14 server1 sshd\[4373\]: Failed password for invalid user admin from 51.79.84.101 port 45718 ssh2
Jul 24 10:34:57 server1 sshd\[5697\]: Invalid user testserver from 51.79.84.101
Jul 24 10:34:57 server1 sshd\[5697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.84.101 
Jul 24 10:34:59 server1 sshd\[5697\]: Failed password for invalid user testserver from 51.79.84.101 port 58446 ssh2
Jul 24 10:39:34 server1 sshd\[7137\]: Invalid user bdn from 51.79.84.101
...
2020-07-25 00:49:34
192.42.116.19 attackspam
Invalid user admin from 192.42.116.19 port 57858
2020-07-25 00:36:46
194.26.29.80 attackspam
[MK-VM2] Blocked by UFW
2020-07-25 00:32:04
182.155.44.17 attack
1595598379 - 07/24/2020 15:46:19 Host: 182.155.44.17/182.155.44.17 Port: 445 TCP Blocked
2020-07-25 00:56:21
176.237.189.163 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-07-25 00:50:38
136.61.209.73 attack
Jul 24 13:47:42 vlre-nyc-1 sshd\[6992\]: Invalid user project from 136.61.209.73
Jul 24 13:47:42 vlre-nyc-1 sshd\[6992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.61.209.73
Jul 24 13:47:44 vlre-nyc-1 sshd\[6992\]: Failed password for invalid user project from 136.61.209.73 port 43450 ssh2
Jul 24 13:51:56 vlre-nyc-1 sshd\[7109\]: Invalid user wq from 136.61.209.73
Jul 24 13:51:56 vlre-nyc-1 sshd\[7109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.61.209.73
...
2020-07-25 00:34:02
179.126.138.155 attackspam
Port probing on unauthorized port 23
2020-07-25 00:52:15

Recently Reported IPs

110.165.23.162 164.155.89.2 91.236.155.14 183.209.64.246
222.129.46.208 13.87.70.110 190.53.45.166 118.117.64.229
72.76.75.33 186.236.25.188 123.20.149.239 112.3.144.114
183.228.216.114 181.115.191.98 177.105.68.35 123.205.58.116
120.226.117.91 213.16.244.244 82.157.179.94 88.119.136.41