Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.106.45.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 474
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.106.45.136.			IN	A

;; AUTHORITY SECTION:
.			164	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090600 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 06 19:44:01 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 136.45.106.199.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.136, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 136.45.106.199.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
182.124.221.247 attackspambots
9000/tcp
[2019-11-13]1pkt
2019-11-14 07:24:11
123.58.33.18 attack
Nov 14 04:30:31 gw1 sshd[32756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.33.18
Nov 14 04:30:33 gw1 sshd[32756]: Failed password for invalid user coauthor from 123.58.33.18 port 60088 ssh2
...
2019-11-14 07:31:48
114.38.46.162 attack
23/tcp
[2019-11-13]1pkt
2019-11-14 07:22:39
45.160.173.163 attack
Nov 14 01:16:02 master sshd[28374]: Failed password for invalid user admin from 45.160.173.163 port 51571 ssh2
2019-11-14 07:46:28
91.188.188.154 attackspambots
Automatic report - Port Scan Attack
2019-11-14 07:20:39
119.29.135.216 attackspambots
Nov 14 01:42:32 server sshd\[20289\]: Invalid user livshits from 119.29.135.216
Nov 14 01:42:32 server sshd\[20289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.135.216 
Nov 14 01:42:34 server sshd\[20289\]: Failed password for invalid user livshits from 119.29.135.216 port 47008 ssh2
Nov 14 01:58:24 server sshd\[24234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.135.216  user=root
Nov 14 01:58:26 server sshd\[24234\]: Failed password for root from 119.29.135.216 port 56564 ssh2
...
2019-11-14 07:45:16
219.154.146.167 attackspam
23/tcp
[2019-11-13]1pkt
2019-11-14 07:33:35
165.227.46.221 attackspambots
Nov 13 22:58:02 web8 sshd\[28635\]: Invalid user lansonneur from 165.227.46.221
Nov 13 22:58:02 web8 sshd\[28635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.46.221
Nov 13 22:58:04 web8 sshd\[28635\]: Failed password for invalid user lansonneur from 165.227.46.221 port 40940 ssh2
Nov 13 23:01:17 web8 sshd\[30233\]: Invalid user leilani from 165.227.46.221
Nov 13 23:01:17 web8 sshd\[30233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.46.221
2019-11-14 07:25:50
113.184.185.78 attackspambots
Nov 14 01:52:44 master sshd[28412]: Failed password for invalid user admin from 113.184.185.78 port 38593 ssh2
2019-11-14 07:42:35
157.34.174.223 attackbots
445/tcp
[2019-11-13]1pkt
2019-11-14 07:33:00
81.171.85.101 attack
\[2019-11-13 18:19:05\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.101:61852' - Wrong password
\[2019-11-13 18:19:05\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-13T18:19:05.403-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="9866",SessionID="0x7fdf2ccecc48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85.101/61852",Challenge="77d3ac17",ReceivedChallenge="77d3ac17",ReceivedHash="e38bf28ee3c82a2de52944471a82d8ba"
\[2019-11-13 18:19:14\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.101:65341' - Wrong password
\[2019-11-13 18:19:14\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-13T18:19:14.446-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="7368",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85
2019-11-14 07:26:25
122.226.189.74 attack
445/tcp
[2019-11-13]1pkt
2019-11-14 07:30:44
63.88.23.173 attackspambots
63.88.23.173 was recorded 8 times by 3 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 8, 29, 59
2019-11-14 07:10:02
192.162.68.244 attack
192.162.68.244 - - \[13/Nov/2019:22:59:07 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
192.162.68.244 - - \[13/Nov/2019:22:59:08 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-14 07:13:53
167.71.201.16 attackbots
xmlrpc attack
2019-11-14 07:19:39

Recently Reported IPs

115.29.96.249 117.240.89.18 243.208.202.181 178.67.193.255
76.110.80.21 237.31.10.197 72.187.67.166 232.151.237.28
29.187.156.222 103.191.232.157 75.134.150.171 118.125.98.143
209.182.23.24 253.181.209.127 57.90.72.140 172.213.164.196
233.4.156.167 149.201.224.155 66.115.173.74 77.200.199.19