Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.59.14.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.59.14.140.			IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:16:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
server can't find 106.59.14.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
132.232.68.26 attackspam
2020-06-22T16:11:31.2731181495-001 sshd[19913]: Failed password for root from 132.232.68.26 port 45964 ssh2
2020-06-22T16:14:11.4547171495-001 sshd[19983]: Invalid user odoo from 132.232.68.26 port 55792
2020-06-22T16:14:11.4628501495-001 sshd[19983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.26
2020-06-22T16:14:11.4547171495-001 sshd[19983]: Invalid user odoo from 132.232.68.26 port 55792
2020-06-22T16:14:13.8435141495-001 sshd[19983]: Failed password for invalid user odoo from 132.232.68.26 port 55792 ssh2
2020-06-22T16:16:44.2581841495-001 sshd[20068]: Invalid user mo from 132.232.68.26 port 37416
...
2020-06-23 06:10:09
172.105.217.71 attackspambots
" "
2020-06-23 06:09:52
46.185.162.242 attackspam
445/tcp
[2020-06-22]1pkt
2020-06-23 06:38:28
163.172.9.85 attackbotsspam
 UDP 163.172.9.85:5651 -> port 5060, len 430
2020-06-23 06:47:20
206.189.132.130 attackspambots
Invalid user user1 from 206.189.132.130 port 47550
2020-06-23 06:09:35
203.115.113.93 attack
445/tcp 445/tcp 445/tcp
[2020-06-22]3pkt
2020-06-23 06:18:42
68.201.239.63 attackspam
8443/tcp
[2020-06-22]1pkt
2020-06-23 06:34:36
51.77.137.67 attackbots
Tried to find a page that does not exist on our site, repeated failed attempts.
2020-06-23 06:16:24
195.62.14.4 attack
$f2bV_matches
2020-06-23 06:20:38
87.251.74.44 attack
Multiport scan : 65 ports scanned 11 60 65 80 92 100 115 132 145 152 184 291 311 312 322 335 430 474 476 490 501 506 516 524 541 561 570 586 607 706 743 745 760 839 894 906 983 987 1005 1025 1027 1049 1052 1060 1069 1083 1103 1114 1142 1167 1214 1222 1356 1396 1438 1448 1454 1461 1468 1478 1481 1482 1488 1494 1498
2020-06-23 06:46:24
83.4.144.52 attack
23/tcp
[2020-06-22]1pkt
2020-06-23 06:42:26
118.25.155.233 attack
8332/tcp
[2020-06-22]1pkt
2020-06-23 06:21:48
129.177.123.132 attack
trying to access non-authorized port
2020-06-23 06:18:02
35.194.64.202 attackspambots
$f2bV_matches
2020-06-23 06:43:09
185.85.190.132 attack
Automatic report - Banned IP Access
2020-06-23 06:41:10

Recently Reported IPs

106.58.145.90 106.57.230.222 106.59.219.51 106.59.14.227
106.59.214.127 106.59.214.204 106.59.230.209 106.6.123.189
106.6.97.198 106.66.29.167 106.6.159.149 106.66.230.241
106.69.250.111 106.68.186.44 106.7.153.207 106.75.117.173
106.59.245.199 106.75.211.172 106.75.152.84 106.75.164.156