Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.83.46.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.83.46.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:08:48 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 13.46.83.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.46.83.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.2 attack
2020-05-13T16:03:44.824121  sshd[15761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-05-13T16:03:46.547344  sshd[15761]: Failed password for root from 222.186.190.2 port 59650 ssh2
2020-05-13T16:03:52.493955  sshd[15761]: Failed password for root from 222.186.190.2 port 59650 ssh2
2020-05-13T16:03:44.824121  sshd[15761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-05-13T16:03:46.547344  sshd[15761]: Failed password for root from 222.186.190.2 port 59650 ssh2
2020-05-13T16:03:52.493955  sshd[15761]: Failed password for root from 222.186.190.2 port 59650 ssh2
...
2020-05-13 22:11:57
140.143.136.89 attack
5x Failed Password
2020-05-13 22:15:43
211.145.49.253 attack
May 13 18:23:07 gw1 sshd[4934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.145.49.253
May 13 18:23:09 gw1 sshd[4934]: Failed password for invalid user leyton from 211.145.49.253 port 59625 ssh2
...
2020-05-13 22:15:27
162.243.144.245 attack
Attack from so-called security researcher.
2020-05-13 22:47:51
87.251.74.198 attackspambots
May 13 16:10:48 debian-2gb-nbg1-2 kernel: \[11637906.467186\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.198 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=9135 PROTO=TCP SPT=42967 DPT=12021 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-13 22:18:01
185.53.168.96 attackbots
May 13 16:18:53 DAAP sshd[28275]: Invalid user admin from 185.53.168.96 port 60182
May 13 16:18:53 DAAP sshd[28275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.53.168.96
May 13 16:18:53 DAAP sshd[28275]: Invalid user admin from 185.53.168.96 port 60182
May 13 16:18:55 DAAP sshd[28275]: Failed password for invalid user admin from 185.53.168.96 port 60182 ssh2
May 13 16:28:25 DAAP sshd[28327]: Invalid user libuuid from 185.53.168.96 port 36418
...
2020-05-13 22:57:05
82.99.206.18 attackbots
(sshd) Failed SSH login from 82.99.206.18 (IR/Iran/82.99.206.18.parsonline.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 13 15:42:04 s1 sshd[29807]: Invalid user pyramide from 82.99.206.18 port 50894
May 13 15:42:06 s1 sshd[29807]: Failed password for invalid user pyramide from 82.99.206.18 port 50894 ssh2
May 13 15:58:14 s1 sshd[30394]: Invalid user sb from 82.99.206.18 port 43356
May 13 15:58:16 s1 sshd[30394]: Failed password for invalid user sb from 82.99.206.18 port 43356 ssh2
May 13 16:01:55 s1 sshd[30617]: Invalid user johan from 82.99.206.18 port 41732
2020-05-13 22:15:03
51.89.40.99 attackspam
May 13 14:37:25 vps647732 sshd[28938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.40.99
May 13 14:37:27 vps647732 sshd[28938]: Failed password for invalid user user1 from 51.89.40.99 port 43188 ssh2
...
2020-05-13 22:54:41
222.99.84.121 attackbotsspam
2020-05-13T14:54:05.608989shield sshd\[16801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.99.84.121  user=root
2020-05-13T14:54:07.395844shield sshd\[16801\]: Failed password for root from 222.99.84.121 port 42804 ssh2
2020-05-13T15:00:16.982843shield sshd\[18265\]: Invalid user max from 222.99.84.121 port 60422
2020-05-13T15:00:16.986503shield sshd\[18265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.99.84.121
2020-05-13T15:00:18.708505shield sshd\[18265\]: Failed password for invalid user max from 222.99.84.121 port 60422 ssh2
2020-05-13 23:01:36
109.194.54.94 attack
Many RDP attempts : 4 packets 62Bytes 13/05/2020 16:18:44:426 sniffing :

00000000 03 00 00 2B 26 E0 00 00 00 00 00 43 6F 6F 6B 69 ...+&... ...Cooki
00000010 65 3A 20 6D 73 74 73 68 61 73 68 3D 68 65 6C 6C e: mstsh ash=hell
00000020 6F 0D 0A 01 00 08 00 03 00 00 00 o....... ...

00000000 03 00 00 13 0E D0 00 00 12 34 00 03 00 08 00 02 ........ .4......
00000010 00 00 00 ...
2020-05-13 22:51:38
114.67.83.42 attackbots
May 13 16:44:51 vps687878 sshd\[2930\]: Invalid user gt from 114.67.83.42 port 58412
May 13 16:44:51 vps687878 sshd\[2930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.83.42
May 13 16:44:53 vps687878 sshd\[2930\]: Failed password for invalid user gt from 114.67.83.42 port 58412 ssh2
May 13 16:49:18 vps687878 sshd\[3250\]: Invalid user kellsie from 114.67.83.42 port 52552
May 13 16:49:18 vps687878 sshd\[3250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.83.42
...
2020-05-13 23:00:31
111.26.172.222 attack
nft/Honeypot/22/73e86
2020-05-13 22:09:32
41.80.40.160 attackspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-13 22:49:14
165.227.26.69 attack
May 13 14:00:48 game-panel sshd[22499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69
May 13 14:00:51 game-panel sshd[22499]: Failed password for invalid user mahamudul from 165.227.26.69 port 38572 ssh2
May 13 14:04:34 game-panel sshd[22676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69
2020-05-13 22:58:47
66.176.210.163 attackbots
scans
2020-05-13 22:51:46

Recently Reported IPs

159.215.234.194 208.105.206.168 120.171.242.24 122.146.178.139
185.201.63.52 206.10.49.239 239.5.104.208 153.73.191.211
81.69.212.59 223.200.213.108 63.188.228.129 25.64.88.36
239.46.37.53 232.9.110.85 63.80.139.28 210.182.16.141
150.223.101.126 192.111.199.130 217.102.37.112 73.137.112.133