Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.107.106.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41522
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.107.106.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 19:37:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 20.106.107.161.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 161.107.106.20.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
212.145.231.149 attackspambots
Invalid user temp from 212.145.231.149 port 40506
2019-10-10 21:02:57
59.148.43.97 attackspambots
Invalid user admin from 59.148.43.97 port 38057
2019-10-10 21:07:02
37.139.21.75 attackbots
$f2bV_matches
2019-10-10 20:55:25
106.12.89.13 attack
Invalid user admin from 106.12.89.13 port 34786
2019-10-10 21:05:52
121.178.60.41 attackbotsspam
Invalid user pi from 121.178.60.41 port 36100
2019-10-10 20:32:51
124.207.193.119 attack
SSH invalid-user multiple login try
2019-10-10 21:14:00
54.37.205.162 attackbotsspam
Oct 10 13:07:05 anodpoucpklekan sshd[26812]: Invalid user ftp from 54.37.205.162 port 50038
Oct 10 13:07:07 anodpoucpklekan sshd[26812]: Failed password for invalid user ftp from 54.37.205.162 port 50038 ssh2
...
2019-10-10 21:07:50
206.189.166.172 attack
Invalid user setup from 206.189.166.172 port 39186
2019-10-10 20:48:07
124.128.97.146 attackbotsspam
Invalid user ftpuser from 124.128.97.146 port 4015
2019-10-10 20:32:12
45.114.244.56 attackspambots
Tried sshing with brute force.
2019-10-10 20:54:42
37.114.158.127 attack
Invalid user admin from 37.114.158.127 port 49105
2019-10-10 20:56:00
108.176.0.2 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2019-10-10 21:05:29
43.242.125.185 attackspambots
Invalid user usuario from 43.242.125.185 port 59516
2019-10-10 20:44:43
45.55.12.248 attack
2019-10-10T14:23:18.6790891240 sshd\[22356\]: Invalid user jboss from 45.55.12.248 port 52322
2019-10-10T14:23:18.6818101240 sshd\[22356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248
2019-10-10T14:23:20.3240721240 sshd\[22356\]: Failed password for invalid user jboss from 45.55.12.248 port 52322 ssh2
...
2019-10-10 20:43:49
104.131.113.106 attackspambots
Invalid user jboss from 104.131.113.106 port 56968
2019-10-10 20:38:12

Recently Reported IPs

225.115.93.46 64.155.132.34 221.131.79.39 92.218.207.223
109.155.5.13 129.102.23.204 221.199.115.243 34.236.38.215
107.108.196.114 48.180.150.107 21.22.64.64 229.59.88.65
149.49.50.119 181.59.112.44 83.16.135.81 24.153.232.71
152.226.164.20 37.111.76.247 93.136.41.213 52.87.224.159