Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: Safaricom

Hostname: unknown

Organization: SAFARICOM-LIMITED

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.106.163.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42656
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.106.163.56.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 22 01:59:20 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 56.163.106.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 56.163.106.196.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
193.70.36.161 attackbotsspam
Mar 26 15:37:28 ArkNodeAT sshd\[5223\]: Invalid user test from 193.70.36.161
Mar 26 15:37:28 ArkNodeAT sshd\[5223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.36.161
Mar 26 15:37:30 ArkNodeAT sshd\[5223\]: Failed password for invalid user test from 193.70.36.161 port 35967 ssh2
2020-03-27 03:18:23
196.219.235.84 attackspambots
Unauthorized connection attempt detected from IP address 196.219.235.84 to port 23
2020-03-27 03:45:58
134.175.161.251 attack
SSH Brute-Force Attack
2020-03-27 03:17:26
96.114.71.147 attackbots
$f2bV_matches
2020-03-27 03:20:29
35.222.83.101 attack
Mar 25 17:33:11 host sshd[18274]: Invalid user lacy from 35.222.83.101 port 51942
Mar 25 17:33:11 host sshd[18274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.222.83.101
Mar 25 17:33:13 host sshd[18274]: Failed password for invalid user lacy from 35.222.83.101 port 51942 ssh2
Mar 25 17:33:13 host sshd[18274]: Received disconnect from 35.222.83.101 port 51942:11: Bye Bye [preauth]
Mar 25 17:33:13 host sshd[18274]: Disconnected from invalid user lacy 35.222.83.101 port 51942 [preauth]
Mar 25 17:43:07 host sshd[18567]: Invalid user yangweifei from 35.222.83.101 port 38066
Mar 25 17:43:07 host sshd[18567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.222.83.101
Mar 25 17:43:09 host sshd[18567]: Failed password for invalid user yangweifei from 35.222.83.101 port 38066 ssh2
Mar 25 17:43:09 host sshd[18567]: Received disconnect from 35.222.83.101 port 38066:11: Bye Bye [preauth]
Mar 2........
-------------------------------
2020-03-27 03:10:38
103.25.36.194 attack
Mar 26 13:21:23 serwer sshd\[15633\]: Invalid user backuppc from 103.25.36.194 port 8876
Mar 26 13:21:23 serwer sshd\[15633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.25.36.194
Mar 26 13:21:25 serwer sshd\[15633\]: Failed password for invalid user backuppc from 103.25.36.194 port 8876 ssh2
...
2020-03-27 03:23:39
113.79.161.136 attackspambots
CN China - Failures: 20 ftpd
2020-03-27 03:37:36
106.54.114.143 attackbots
Mar 26 10:34:40 lanister sshd[28967]: Invalid user webftp from 106.54.114.143
Mar 26 10:34:40 lanister sshd[28967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.143
Mar 26 10:34:40 lanister sshd[28967]: Invalid user webftp from 106.54.114.143
Mar 26 10:34:42 lanister sshd[28967]: Failed password for invalid user webftp from 106.54.114.143 port 60870 ssh2
2020-03-27 03:47:40
198.20.99.130 attackspambots
Mar 26 19:36:03 debian-2gb-nbg1-2 kernel: \[7506837.566230\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.20.99.130 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=115 ID=45419 PROTO=TCP SPT=26200 DPT=9089 WINDOW=46270 RES=0x00 SYN URGP=0
2020-03-27 03:23:24
103.3.226.230 attackspam
2020-03-26T11:50:00.336161linuxbox-skyline sshd[46956]: Invalid user uucp from 103.3.226.230 port 40534
...
2020-03-27 03:48:25
186.4.188.3 attack
web-1 [ssh] SSH Attack
2020-03-27 03:28:14
183.82.100.141 attackspam
Mar 26 19:39:36 server sshd[30109]: Failed password for invalid user server from 183.82.100.141 port 64093 ssh2
Mar 26 19:50:13 server sshd[32833]: Failed password for invalid user ad from 183.82.100.141 port 28153 ssh2
Mar 26 20:00:46 server sshd[35691]: Failed password for invalid user svn from 183.82.100.141 port 60443 ssh2
2020-03-27 03:09:39
95.172.68.62 attackspam
ICMP MH Probe, Scan /Distributed -
2020-03-27 03:10:09
104.236.33.155 attack
Mar 26 16:11:19 hosting sshd[27678]: Invalid user unsub from 104.236.33.155 port 57426
...
2020-03-27 03:28:43
54.39.190.99 attack
Mar 25 11:46:57 host sshd[29838]: Invalid user prayner from 54.39.190.99
Mar 25 11:46:57 host sshd[29838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.190.99 
Mar 25 11:46:59 host sshd[29838]: Failed password for invalid user prayner from 54.39.190.99 port 44808 ssh2
Mar 25 11:46:59 host sshd[29838]: Received disconnect from 54.39.190.99: 11: Bye Bye [preauth]
Mar 25 11:56:19 host sshd[25642]: Invalid user elga from 54.39.190.99
Mar 25 11:56:19 host sshd[25642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.190.99 
Mar 25 11:56:20 host sshd[25642]: Failed password for invalid user elga from 54.39.190.99 port 53834 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=54.39.190.99
2020-03-27 03:24:39

Recently Reported IPs

219.49.194.188 117.3.207.74 109.153.76.200 164.14.192.152
219.146.118.238 200.171.71.206 95.28.235.239 49.0.173.110
90.44.81.88 46.209.216.233 104.104.119.226 175.253.234.251
45.55.200.184 18.225.35.111 142.93.9.47 2001:4c4c:2226:5900:3926:ed69:207f:3f8e
222.88.122.108 114.32.235.195 93.115.27.158 3.171.158.86