Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bowling Green

Region: Kentucky

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Western Kentucky University

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.6.83.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21540
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;161.6.83.106.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 30 00:23:34 CST 2019
;; MSG SIZE  rcvd: 116
Host info
106.83.6.161.in-addr.arpa domain name pointer ip106-83.dhcp-pool.wku.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
106.83.6.161.in-addr.arpa	name = ip106-83.dhcp-pool.wku.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.167.89.139 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:59:53
159.203.201.127 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 4331 proto: TCP cat: Misc Attack
2019-11-03 07:50:10
168.167.79.130 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:47:05
139.162.109.43 attack
111/tcp 111/tcp 111/tcp...
[2019-09-02/11-02]88pkt,1pt.(tcp)
2019-11-03 07:56:00
125.166.164.169 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-11-03 08:00:07
123.30.169.85 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 08:04:49
122.176.123.236 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 08:05:55
156.0.239.102 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:52:01
159.203.193.252 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:51:42
118.71.5.21 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-11-03 08:10:40
117.6.160.24 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 08:15:19
116.208.15.99 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 08:17:00
115.74.156.121 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 08:21:46
139.28.218.34 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:56:18
147.50.15.14 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:54:29

Recently Reported IPs

111.106.173.78 223.154.139.133 155.230.28.249 4.5.164.167
172.101.141.138 2607:f298:6:a016::285:d400 160.16.119.99 111.66.218.69
145.255.163.126 68.22.105.195 188.221.44.76 220.153.52.181
165.22.207.135 130.136.148.16 110.243.222.253 40.137.146.234
219.206.216.96 111.135.96.58 119.84.8.43 211.167.207.32