Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.22.134.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.22.134.106.			IN	A

;; AUTHORITY SECTION:
.			490	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:38:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 106.134.22.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.134.22.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.93.104.167 attackbots
Trying ports that it shouldn't be.
2019-06-24 11:44:08
191.53.59.67 attackspam
failed_logins
2019-06-24 10:57:45
49.67.69.156 attackspam
2019-06-23T18:29:02.088874 X postfix/smtpd[14240]: warning: unknown[49.67.69.156]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:51:07.384453 X postfix/smtpd[41059]: warning: unknown[49.67.69.156]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:51:26.041862 X postfix/smtpd[41059]: warning: unknown[49.67.69.156]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 10:57:13
41.249.137.131 attackspam
SSH/22 MH Probe, BF, Hack -
2019-06-24 11:34:05
199.249.230.77 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.77  user=root
Failed password for root from 199.249.230.77 port 52968 ssh2
Failed password for root from 199.249.230.77 port 52968 ssh2
Failed password for root from 199.249.230.77 port 52968 ssh2
Failed password for root from 199.249.230.77 port 52968 ssh2
2019-06-24 11:34:57
157.230.214.222 attack
port scan and connect, tcp 22 (ssh)
2019-06-24 11:26:17
13.232.11.224 attackbots
20 attempts against mh-ssh on pluto.magehost.pro
2019-06-24 11:27:22
122.228.19.80 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-24 11:14:37
177.66.237.242 attack
failed_logins
2019-06-24 10:52:13
2601:cd:c000:400:4c77:b176:5985:acbc attack
PHI,WP GET /wp-login.php
2019-06-24 11:34:38
186.31.37.202 attackspambots
Jun 24 04:02:42 [munged] sshd[2846]: Invalid user steam from 186.31.37.202 port 45011
Jun 24 04:02:42 [munged] sshd[2846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.37.202
2019-06-24 11:10:55
210.17.195.138 attackspambots
Jun 23 21:49:34 atlassian sshd[1702]: Failed password for invalid user amy from 210.17.195.138 port 58998 ssh2
Jun 23 21:49:32 atlassian sshd[1702]: Invalid user amy from 210.17.195.138 port 58998
Jun 23 21:49:32 atlassian sshd[1702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.17.195.138
Jun 23 21:49:32 atlassian sshd[1702]: Invalid user amy from 210.17.195.138 port 58998
Jun 23 21:49:34 atlassian sshd[1702]: Failed password for invalid user amy from 210.17.195.138 port 58998 ssh2
2019-06-24 11:37:57
114.232.218.108 attack
2019-06-23T21:34:34.195635 X postfix/smtpd[39204]: warning: unknown[114.232.218.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:35:18.230450 X postfix/smtpd[39204]: warning: unknown[114.232.218.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:51:04.381629 X postfix/smtpd[41059]: warning: unknown[114.232.218.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 11:02:50
159.65.148.91 attack
Unauthorized SSH login attempts
2019-06-24 11:04:11
106.58.213.77 attackspam
Trying ports that it shouldn't be.
2019-06-24 11:05:08

Recently Reported IPs

116.203.138.66 2.102.4.212 76.218.126.211 131.108.53.33
151.251.80.105 187.149.57.179 223.138.209.216 190.92.103.20
122.238.180.87 114.86.220.94 58.121.8.168 39.101.75.204
83.66.193.213 45.124.96.34 94.228.17.4 200.46.56.60
49.74.205.28 187.178.159.136 91.35.192.4 188.75.220.117