Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.75.72.100 attack
May  7 06:10:57 124388 sshd[13048]: Invalid user testftp from 106.75.72.100 port 39726
May  7 06:10:57 124388 sshd[13048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.72.100
May  7 06:10:57 124388 sshd[13048]: Invalid user testftp from 106.75.72.100 port 39726
May  7 06:10:58 124388 sshd[13048]: Failed password for invalid user testftp from 106.75.72.100 port 39726 ssh2
May  7 06:15:46 124388 sshd[13072]: Invalid user theis from 106.75.72.100 port 56960
2020-05-07 15:26:47
106.75.72.100 attackspam
k+ssh-bruteforce
2020-04-01 03:46:58
106.75.72.100 attackbotsspam
$f2bV_matches
2020-03-30 06:00:05
106.75.72.100 attackbots
Invalid user alex from 106.75.72.100 port 44058
2020-03-28 16:57:29
106.75.72.100 attack
Invalid user alex from 106.75.72.100 port 44058
2020-03-27 22:25:03
106.75.72.100 attack
Mar 25 22:39:44 xeon sshd[57365]: Failed password for invalid user masmokhtar from 106.75.72.100 port 50814 ssh2
2020-03-26 06:43:35
106.75.72.100 attackbots
Invalid user trung from 106.75.72.100 port 47568
2020-03-22 01:12:31
106.75.72.100 attackbots
Mar 19 22:48:45 vps58358 sshd\[20048\]: Failed password for root from 106.75.72.100 port 33612 ssh2Mar 19 22:50:58 vps58358 sshd\[20061\]: Invalid user gitlab-runner from 106.75.72.100Mar 19 22:51:00 vps58358 sshd\[20061\]: Failed password for invalid user gitlab-runner from 106.75.72.100 port 51106 ssh2Mar 19 22:52:36 vps58358 sshd\[20075\]: Invalid user administrador from 106.75.72.100Mar 19 22:52:38 vps58358 sshd\[20075\]: Failed password for invalid user administrador from 106.75.72.100 port 38310 ssh2Mar 19 22:54:07 vps58358 sshd\[20090\]: Failed password for root from 106.75.72.100 port 53744 ssh2
...
2020-03-20 06:26:31
106.75.72.100 attackspambots
Unauthorized connection attempt detected from IP address 106.75.72.100 to port 2220 [J]
2020-01-24 22:55:16
106.75.72.100 attackspam
Jan  1 18:08:32 server sshd[26993]: Failed password for invalid user bulent from 106.75.72.100 port 54912 ssh2
Jan  1 18:20:28 server sshd[27440]: Failed password for invalid user seamark from 106.75.72.100 port 35056 ssh2
Jan  1 18:29:48 server sshd[27742]: Failed password for invalid user admin from 106.75.72.100 port 33678 ssh2
2020-01-02 03:15:23
106.75.72.100 attack
Dec 31 08:09:28 localhost sshd\[32326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.72.100  user=news
Dec 31 08:09:30 localhost sshd\[32326\]: Failed password for news from 106.75.72.100 port 53770 ssh2
Dec 31 08:12:53 localhost sshd\[543\]: Invalid user info from 106.75.72.100 port 51804
2019-12-31 16:34:20
106.75.72.100 attackspambots
Dec 27 05:12:42 raspberrypi sshd\[6938\]: Invalid user robrish from 106.75.72.100Dec 27 05:12:44 raspberrypi sshd\[6938\]: Failed password for invalid user robrish from 106.75.72.100 port 56998 ssh2Dec 27 05:23:07 raspberrypi sshd\[7856\]: Failed password for root from 106.75.72.100 port 53738 ssh2
...
2019-12-27 13:42:35
106.75.72.164 attack
The IP has triggered Cloudflare WAF. CF-Ray: 543243994af8eb79 | WAF_Rule_ID: a75424b44a1e4f27881d03344a122815 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: skk.moe | User-Agent: Python/3.7 aiohttp/3.6.2 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 01:08:32
106.75.72.100 attack
SSH Brute Force
2019-12-11 04:36:26
106.75.72.100 attack
2019-12-03T07:40:46.808189abusebot-2.cloudsearch.cf sshd\[2533\]: Invalid user mmillan from 106.75.72.100 port 32840
2019-12-03 19:46:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.75.72.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12845
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.75.72.63.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032000 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 20 16:45:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
63.72.75.106.in-addr.arpa domain name pointer am0n8.shop.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
63.72.75.106.in-addr.arpa	name = am0n8.shop.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.106.191.5 attack
$f2bV_matches
2019-08-07 18:21:38
150.136.193.165 attack
Aug  7 11:36:38 pornomens sshd\[32575\]: Invalid user sit from 150.136.193.165 port 25409
Aug  7 11:36:38 pornomens sshd\[32575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.193.165
Aug  7 11:36:41 pornomens sshd\[32575\]: Failed password for invalid user sit from 150.136.193.165 port 25409 ssh2
...
2019-08-07 18:15:08
107.172.46.50 attackbots
Aug  7 13:57:30 lcl-usvr-01 sshd[1439]: Invalid user user5 from 107.172.46.50
Aug  7 13:57:30 lcl-usvr-01 sshd[1439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.46.50 
Aug  7 13:57:30 lcl-usvr-01 sshd[1439]: Invalid user user5 from 107.172.46.50
Aug  7 13:57:32 lcl-usvr-01 sshd[1439]: Failed password for invalid user user5 from 107.172.46.50 port 42436 ssh2
Aug  7 14:01:48 lcl-usvr-01 sshd[3101]: Invalid user ccp from 107.172.46.50
2019-08-07 17:12:30
157.230.153.75 attack
Aug  7 11:19:39 localhost sshd\[8038\]: Invalid user adam from 157.230.153.75 port 45212
Aug  7 11:19:39 localhost sshd\[8038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.153.75
Aug  7 11:19:41 localhost sshd\[8038\]: Failed password for invalid user adam from 157.230.153.75 port 45212 ssh2
2019-08-07 17:35:38
124.207.68.210 attackspam
20 attempts against mh-ssh on pine.magehost.pro
2019-08-07 17:10:45
66.249.64.23 attackbotsspam
port scan and connect, tcp 443 (https)
2019-08-07 17:27:26
218.92.1.142 attackspam
Aug  7 05:12:52 TORMINT sshd\[22497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
Aug  7 05:12:54 TORMINT sshd\[22497\]: Failed password for root from 218.92.1.142 port 27972 ssh2
Aug  7 05:19:17 TORMINT sshd\[22714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
...
2019-08-07 17:19:37
175.16.14.50 attackspam
[portscan] Port scan
2019-08-07 17:50:37
23.129.64.169 attackbots
Aug  7 11:48:54 h2177944 sshd\[15304\]: Invalid user netscreen from 23.129.64.169 port 43649
Aug  7 11:48:54 h2177944 sshd\[15304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.169
Aug  7 11:48:56 h2177944 sshd\[15304\]: Failed password for invalid user netscreen from 23.129.64.169 port 43649 ssh2
Aug  7 11:48:59 h2177944 sshd\[15306\]: Invalid user admin from 23.129.64.169 port 56177
...
2019-08-07 18:28:02
54.255.201.28 attackbotsspam
GET /manager/html
2019-08-07 17:28:06
112.85.42.194 attackspambots
Aug  7 02:58:47 debian sshd[16793]: Unable to negotiate with 112.85.42.194 port 10082: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug  7 03:01:45 debian sshd[16963]: Unable to negotiate with 112.85.42.194 port 57200: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2019-08-07 17:11:37
197.247.19.42 attackspam
Aug  7 08:50:26 tux-35-217 sshd\[16488\]: Invalid user build from 197.247.19.42 port 54440
Aug  7 08:50:26 tux-35-217 sshd\[16488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.247.19.42
Aug  7 08:50:29 tux-35-217 sshd\[16488\]: Failed password for invalid user build from 197.247.19.42 port 54440 ssh2
Aug  7 08:59:27 tux-35-217 sshd\[16494\]: Invalid user skan from 197.247.19.42 port 36642
Aug  7 08:59:27 tux-35-217 sshd\[16494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.247.19.42
...
2019-08-07 18:09:47
168.90.117.164 attackbotsspam
Automatic report - Port Scan Attack
2019-08-07 17:47:00
182.148.253.174 attack
FTP/21 MH Probe, BF, Hack -
2019-08-07 17:21:18
72.11.140.155 attackbotsspam
Port Scan: TCP/80
2019-08-07 17:57:12

Recently Reported IPs

106.75.245.55 106.8.29.219 107.154.158.142 107.154.158.224
107.154.158.34 107.154.159.150 107.154.159.225 107.154.159.93
242.74.246.198 107.154.160.130 107.154.160.183 107.154.161.241
237.253.120.253 107.154.165.150 107.154.167.130 107.154.167.184
107.154.170.145 107.154.170.227 107.154.170.42 107.154.171.4