Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.105.55.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.105.55.89.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 02:30:13 CST 2022
;; MSG SIZE  rcvd: 106
Host info
89.55.105.103.in-addr.arpa domain name pointer 103-105-55-89.megadata.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.55.105.103.in-addr.arpa	name = 103-105-55-89.megadata.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.216.208.109 attackbotsspam
Unauthorized connection attempt from IP address 186.216.208.109 on Port 445(SMB)
2020-03-06 03:22:06
37.224.15.207 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-06 03:34:48
125.164.44.98 attack
Unauthorized connection attempt from IP address 125.164.44.98 on Port 445(SMB)
2020-03-06 03:04:34
188.14.12.16 attackbots
Feb 15 11:08:00 odroid64 sshd\[29558\]: User backup from 188.14.12.16 not allowed because not listed in AllowUsers
Feb 15 11:08:00 odroid64 sshd\[29558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.14.12.16  user=backup
...
2020-03-06 03:25:24
163.172.204.185 attack
(sshd) Failed SSH login from 163.172.204.185 (FR/France/163-172-204-185.rev.poneytelecom.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  5 19:28:04 amsweb01 sshd[10649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185  user=root
Mar  5 19:28:06 amsweb01 sshd[10649]: Failed password for root from 163.172.204.185 port 48097 ssh2
Mar  5 19:32:08 amsweb01 sshd[10978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185  user=root
Mar  5 19:32:10 amsweb01 sshd[10978]: Failed password for root from 163.172.204.185 port 55989 ssh2
Mar  5 19:35:32 amsweb01 sshd[11258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185  user=root
2020-03-06 03:23:53
106.75.4.19 attackspambots
465/tcp 4730/tcp 4786/tcp...
[2020-01-05/03-05]46pkt,17pt.(tcp)
2020-03-06 03:38:39
125.167.253.83 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-06 03:04:17
109.64.71.64 attackspambots
FTP
2020-03-06 03:05:04
217.38.162.8 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-06 03:19:28
190.96.172.101 attackspambots
Mar  6 00:36:36 areeb-Workstation sshd[2783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.172.101 
Mar  6 00:36:38 areeb-Workstation sshd[2783]: Failed password for invalid user ts3bot from 190.96.172.101 port 59752 ssh2
...
2020-03-06 03:14:24
197.44.28.35 attack
Honeypot attack, port: 445, PTR: host-197.44.28.35-static.tedata.net.
2020-03-06 03:09:19
115.85.128.185 attackbotsspam
Email rejected due to spam filtering
2020-03-06 03:47:35
51.254.59.113 attack
Fail2Ban Ban Triggered
2020-03-06 03:16:57
183.193.234.142 attack
port scan and connect, tcp 23 (telnet)
2020-03-06 03:40:04
190.211.240.227 attack
20/3/5@10:38:42: FAIL: Alarm-Network address from=190.211.240.227
...
2020-03-06 03:17:23

Recently Reported IPs

103.105.55.69 103.105.65.162 103.105.77.49 103.105.78.208
103.105.81.49 103.105.82.192 103.105.82.198 103.105.82.205
103.106.100.25 103.106.100.27 103.106.103.180 103.106.114.19
103.106.158.225 103.106.158.237 103.106.168.54 103.106.195.122
103.106.195.205 103.106.202.146 103.106.219.160 103.106.219.205