Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.106.194.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.106.194.55.			IN	A

;; AUTHORITY SECTION:
.			280	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 10:56:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 55.194.106.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.194.106.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.247.74.74 attackbots
Aug 17 00:41:25 MK-Soft-Root2 sshd\[7290\]: Invalid user ftp from 162.247.74.74 port 33226
Aug 17 00:41:25 MK-Soft-Root2 sshd\[7290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.74
Aug 17 00:41:27 MK-Soft-Root2 sshd\[7290\]: Failed password for invalid user ftp from 162.247.74.74 port 33226 ssh2
...
2019-08-17 06:44:30
138.68.146.186 attackspam
Aug 16 22:20:44 MK-Soft-VM6 sshd\[6848\]: Invalid user ubuntu from 138.68.146.186 port 60982
Aug 16 22:20:44 MK-Soft-VM6 sshd\[6848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.146.186
Aug 16 22:20:46 MK-Soft-VM6 sshd\[6848\]: Failed password for invalid user ubuntu from 138.68.146.186 port 60982 ssh2
...
2019-08-17 06:57:26
49.88.112.62 attack
$f2bV_matches
2019-08-17 06:58:45
163.172.106.114 attack
Automatic report - Banned IP Access
2019-08-17 07:07:02
195.209.104.27 attackbotsspam
Unauthorized connection attempt from IP address 195.209.104.27 on Port 445(SMB)
2019-08-17 07:02:13
189.110.34.63 attackspam
Unauthorized connection attempt from IP address 189.110.34.63 on Port 445(SMB)
2019-08-17 06:55:22
118.70.13.36 attack
Unauthorized connection attempt from IP address 118.70.13.36 on Port 445(SMB)
2019-08-17 07:03:45
216.155.93.77 attack
2019-08-16T22:07:26.894183abusebot-7.cloudsearch.cf sshd\[28452\]: Invalid user teamspeak from 216.155.93.77 port 33514
2019-08-17 06:41:20
51.38.150.104 attackspam
Aug 17 00:25:49 MK-Soft-Root2 sshd\[4931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.150.104  user=root
Aug 17 00:25:51 MK-Soft-Root2 sshd\[4931\]: Failed password for root from 51.38.150.104 port 35784 ssh2
Aug 17 00:25:53 MK-Soft-Root2 sshd\[4931\]: Failed password for root from 51.38.150.104 port 35784 ssh2
...
2019-08-17 06:40:06
74.82.47.194 attack
Aug 16 20:03:48 MK-Soft-VM5 sshd\[9401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.82.47.194  user=root
Aug 16 20:03:50 MK-Soft-VM5 sshd\[9401\]: Failed password for root from 74.82.47.194 port 51334 ssh2
Aug 16 20:03:52 MK-Soft-VM5 sshd\[9401\]: Failed password for root from 74.82.47.194 port 51334 ssh2
...
2019-08-17 06:47:59
91.92.125.187 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-16 19:49:49,575 INFO [amun_request_handler] PortScan Detected on Port: 445 (91.92.125.187)
2019-08-17 06:30:55
162.247.72.199 attack
Aug 17 00:53:57 heissa sshd\[7194\]: Invalid user admin from 162.247.72.199 port 52164
Aug 17 00:53:57 heissa sshd\[7194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199
Aug 17 00:53:59 heissa sshd\[7194\]: Failed password for invalid user admin from 162.247.72.199 port 52164 ssh2
Aug 17 00:54:02 heissa sshd\[7194\]: Failed password for invalid user admin from 162.247.72.199 port 52164 ssh2
Aug 17 00:54:04 heissa sshd\[7194\]: Failed password for invalid user admin from 162.247.72.199 port 52164 ssh2
2019-08-17 06:59:34
167.71.194.222 attack
2019-08-16T22:12:26.622408abusebot-7.cloudsearch.cf sshd\[28468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.194.222  user=root
2019-08-17 06:28:50
61.191.252.74 attack
Aug 16 22:01:50 xeon cyrus/imap[50789]: badlogin: [61.191.252.74] plain [SASL(-13): authentication failure: Password verification failed]
2019-08-17 06:35:21
208.102.113.11 attack
Aug 17 00:43:03 tuxlinux sshd[59662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.102.113.11  user=root
Aug 17 00:43:05 tuxlinux sshd[59662]: Failed password for root from 208.102.113.11 port 51202 ssh2
Aug 17 00:43:03 tuxlinux sshd[59662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.102.113.11  user=root
Aug 17 00:43:05 tuxlinux sshd[59662]: Failed password for root from 208.102.113.11 port 51202 ssh2
...
2019-08-17 07:02:00

Recently Reported IPs

114.106.194.57 114.101.98.140 114.106.194.80 114.106.194.7
114.106.194.88 114.106.194.99 114.106.194.39 114.106.195.0
114.106.195.108 114.106.195.12 114.106.195.159 114.106.195.199
114.106.195.196 114.106.195.228 114.102.40.253 253.143.215.176
114.106.73.139 114.106.73.16 114.106.73.194 114.106.73.180