Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Onitsha

Region: Anambra

Country: Nigeria

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.112.212.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.112.212.134.		IN	A

;; AUTHORITY SECTION:
.			528	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023060201 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 03 12:45:12 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 134.212.112.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.212.112.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.245.63.94 attackspam
Invalid user backup from 198.245.63.94 port 42086
2019-08-02 14:06:30
185.106.29.70 attack
3389BruteforceIDS
2019-08-02 14:39:49
206.189.222.181 attackspam
Invalid user nexus from 206.189.222.181 port 43432
2019-08-02 14:13:28
162.243.142.193 attack
Aug  2 06:01:05 mout sshd[16845]: Invalid user fowler from 162.243.142.193 port 38582
2019-08-02 14:18:37
143.137.127.46 attackbots
proto=tcp  .  spt=48615  .  dpt=25  .     (listed on Blocklist de  Aug 01)     (27)
2019-08-02 14:38:58
189.84.76.6 attack
Unauthorised access (Aug  2) SRC=189.84.76.6 LEN=44 TTL=47 ID=34857 TCP DPT=23 WINDOW=37636 SYN
2019-08-02 13:51:33
218.92.1.156 attackspam
Aug  2 07:40:08 s64-1 sshd[17124]: Failed password for root from 218.92.1.156 port 52289 ssh2
Aug  2 07:40:10 s64-1 sshd[17124]: Failed password for root from 218.92.1.156 port 52289 ssh2
Aug  2 07:40:12 s64-1 sshd[17124]: Failed password for root from 218.92.1.156 port 52289 ssh2
...
2019-08-02 14:05:52
185.173.35.41 attack
993/tcp 21/tcp 5632/udp...
[2019-06-01/08-02]57pkt,39pt.(tcp),7pt.(udp)
2019-08-02 14:14:58
45.82.33.61 attackbots
$f2bV_matches
2019-08-02 14:42:18
179.60.155.42 attack
Automatic report - Port Scan Attack
2019-08-02 14:17:48
157.55.39.132 attackspam
Automatic report - Banned IP Access
2019-08-02 14:24:19
60.174.164.45 attackspambots
SSH invalid-user multiple login try
2019-08-02 14:43:37
209.141.56.234 attack
Aug  2 05:48:15 ip-172-31-62-245 sshd\[18139\]: Invalid user admin from 209.141.56.234\
Aug  2 05:48:17 ip-172-31-62-245 sshd\[18139\]: Failed password for invalid user admin from 209.141.56.234 port 56250 ssh2\
Aug  2 05:48:20 ip-172-31-62-245 sshd\[18141\]: Failed password for root from 209.141.56.234 port 58474 ssh2\
Aug  2 05:48:21 ip-172-31-62-245 sshd\[18145\]: Invalid user guest from 209.141.56.234\
Aug  2 05:48:23 ip-172-31-62-245 sshd\[18145\]: Failed password for invalid user guest from 209.141.56.234 port 60292 ssh2\
2019-08-02 14:05:20
14.198.6.164 attackspam
2019-08-02T05:27:57.848885abusebot-2.cloudsearch.cf sshd\[21799\]: Invalid user ashley from 14.198.6.164 port 57598
2019-08-02 13:58:18
106.242.20.219 attackbotsspam
email spam
2019-08-02 14:21:44

Recently Reported IPs

103.14.48.40 105.112.61.49 105.112.37.87 101.100.206.33
52.97.28.178 144.111.238.61 165.254.191.201 39.40.201.117
39.40.201.93 184.82.129.165 54.184.114.4 54.203.220.18
44.225.27.249 113.17.16.12 113.166.212.58 193.188.113.157
91.143.220.206 200.189.240.116 183.181.85.48 3.80.9.116