Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.194.12.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.194.12.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 00:24:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 106.12.194.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.12.194.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.100.74.71 attackbotsspam
C1,WP GET /wp-login.php
2020-09-15 22:13:27
187.60.183.4 attackbots
trying to access non-authorized port
2020-09-15 22:11:23
171.25.193.78 attackspam
$f2bV_matches
2020-09-15 22:25:02
139.59.129.45 attack
SSH Login Bruteforce
2020-09-15 22:19:06
62.28.222.221 attackbotsspam
Sep 15 15:59:58 vpn01 sshd[5344]: Failed password for root from 62.28.222.221 port 36710 ssh2
...
2020-09-15 22:11:36
51.79.84.48 attack
Sep 15 15:28:45 marvibiene sshd[15673]: Failed password for root from 51.79.84.48 port 40218 ssh2
2020-09-15 22:04:44
179.212.136.198 attack
Brute%20Force%20SSH
2020-09-15 22:20:08
194.53.185.202 attackbotsspam
Attempts against non-existent wp-login
2020-09-15 22:20:41
64.227.45.215 attackspam
web-1 [ssh_2] SSH Attack
2020-09-15 22:10:06
137.216.185.151 attack
Brute forcing email accounts
2020-09-15 21:46:27
38.109.219.159 attackbots
Invalid user bimba from 38.109.219.159 port 35802
2020-09-15 21:48:18
103.48.190.32 attackbots
(sshd) Failed SSH login from 103.48.190.32 (VN/Vietnam/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 14 21:41:05 amsweb01 sshd[7610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.190.32  user=root
Sep 14 21:41:06 amsweb01 sshd[7610]: Failed password for root from 103.48.190.32 port 40210 ssh2
Sep 14 21:54:51 amsweb01 sshd[9504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.190.32  user=root
Sep 14 21:54:53 amsweb01 sshd[9504]: Failed password for root from 103.48.190.32 port 51154 ssh2
Sep 14 22:03:12 amsweb01 sshd[11057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.190.32  user=root
2020-09-15 21:46:43
162.247.74.201 attackspam
2020-09-15T15:42:44.170233centos sshd[11544]: Failed password for root from 162.247.74.201 port 36592 ssh2
2020-09-15T15:42:46.552037centos sshd[11544]: Failed password for root from 162.247.74.201 port 36592 ssh2
2020-09-15T15:42:49.520021centos sshd[11544]: Failed password for root from 162.247.74.201 port 36592 ssh2
...
2020-09-15 21:50:27
89.1.66.100 attackspam
Sep 15 13:13:40 datenbank sshd[95418]: Failed password for root from 89.1.66.100 port 55418 ssh2
Sep 15 13:18:20 datenbank sshd[95428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.1.66.100  user=root
Sep 15 13:18:22 datenbank sshd[95428]: Failed password for root from 89.1.66.100 port 60402 ssh2
...
2020-09-15 22:18:05
95.169.22.100 attackspambots
Automatic Fail2ban report - Trying login SSH
2020-09-15 21:53:33

Recently Reported IPs

60.104.100.146 137.239.57.16 22.202.92.160 161.199.59.173
182.21.35.133 223.240.35.155 7.138.198.231 145.222.119.16
123.99.73.185 45.84.16.187 168.61.37.166 196.17.127.30
193.30.59.85 253.197.159.193 150.197.99.231 23.186.24.186
191.85.101.43 93.82.134.137 55.146.151.31 218.69.27.212