Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Algeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.104.242.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.104.242.146.		IN	A

;; AUTHORITY SECTION:
.			133	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:41:39 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 146.242.104.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.242.104.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.162.189 attackspam
SSH Login Bruteforce
2020-08-17 20:10:47
199.187.211.106 attackspambots
7,52-01/02 [bc00/m23] PostRequest-Spammer scoring: Lusaka01
2020-08-17 20:32:41
190.217.1.10 attackbotsspam
failed_logins
2020-08-17 20:37:44
104.211.167.49 attack
Aug 17 13:58:29 eventyay sshd[25602]: Failed password for root from 104.211.167.49 port 1024 ssh2
Aug 17 14:02:37 eventyay sshd[25718]: Failed password for root from 104.211.167.49 port 1024 ssh2
Aug 17 14:07:00 eventyay sshd[25888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.167.49
...
2020-08-17 20:13:50
222.186.180.6 attack
2020-08-17T08:15:02+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-08-17 20:05:02
106.12.113.204 attackspam
Invalid user ina from 106.12.113.204 port 60676
2020-08-17 20:04:40
159.65.138.161 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-17 20:14:58
123.16.32.207 attackbotsspam
SSH break in attempt
...
2020-08-17 20:04:02
81.169.185.29 attackspam
#6985 - [81.169.185.29] Error: 550 5.7.1 Forged HELO hostname detected
#6985 - [81.169.185.29] Error: 550 5.7.1 Forged HELO hostname detected
#6985 - [81.169.185.29] Error: 550 5.7.1 Forged HELO hostname detected
#6985 - [81.169.185.29] Error: 550 5.7.1 Forged HELO hostname detected

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.169.185.29
2020-08-17 20:21:46
222.186.175.23 attackbotsspam
Aug 17 05:27:33 dignus sshd[26235]: Failed password for root from 222.186.175.23 port 24074 ssh2
Aug 17 05:27:36 dignus sshd[26235]: Failed password for root from 222.186.175.23 port 24074 ssh2
Aug 17 05:27:40 dignus sshd[26254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Aug 17 05:27:42 dignus sshd[26254]: Failed password for root from 222.186.175.23 port 64669 ssh2
Aug 17 05:27:45 dignus sshd[26254]: Failed password for root from 222.186.175.23 port 64669 ssh2
...
2020-08-17 20:28:15
36.111.182.49 attack
 TCP (SYN) 36.111.182.49:47885 -> port 5240, len 44
2020-08-17 20:07:54
188.166.144.207 attack
Aug 17 12:02:34 124388 sshd[14274]: Invalid user deploy from 188.166.144.207 port 52082
Aug 17 12:02:34 124388 sshd[14274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207
Aug 17 12:02:34 124388 sshd[14274]: Invalid user deploy from 188.166.144.207 port 52082
Aug 17 12:02:36 124388 sshd[14274]: Failed password for invalid user deploy from 188.166.144.207 port 52082 ssh2
Aug 17 12:07:01 124388 sshd[14499]: Invalid user tech from 188.166.144.207 port 33384
2020-08-17 20:09:48
222.66.154.98 attack
20 attempts against mh-ssh on cloud
2020-08-17 20:06:08
54.38.75.42 attackspambots
Hacking
2020-08-17 20:03:33
51.68.123.198 attackspambots
Aug 17 13:59:20 eventyay sshd[25624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.198
Aug 17 13:59:22 eventyay sshd[25624]: Failed password for invalid user mo from 51.68.123.198 port 41648 ssh2
Aug 17 14:06:52 eventyay sshd[25877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.198
...
2020-08-17 20:19:39

Recently Reported IPs

105.104.216.58 105.104.225.155 105.104.3.92 105.104.37.170
105.104.40.48 105.104.31.0 105.104.28.188 105.104.30.67
105.104.64.117 105.104.60.97 105.104.73.195 105.104.215.54
105.104.93.145 105.104.7.43 105.104.248.182 105.105.102.103
105.105.110.154 105.105.110.15 105.105.132.120 105.105.110.167