Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Benin City

Region: Edo

Country: Nigeria

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
105.112.99.219 attackspambots
1594498069 - 07/11/2020 22:07:49 Host: 105.112.99.219/105.112.99.219 Port: 445 TCP Blocked
2020-07-12 05:02:14
105.112.99.53 attack
Unauthorized connection attempt from IP address 105.112.99.53 on Port 445(SMB)
2019-12-16 05:36:14
105.112.99.155 attackspam
Unauthorized connection attempt from IP address 105.112.99.155 on Port 445(SMB)
2019-10-26 01:52:35
105.112.99.158 attackbotsspam
Unauthorised access (Oct 11) SRC=105.112.99.158 LEN=52 TOS=0x10 TTL=116 ID=24220 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-11 22:12:17
105.112.99.159 attackbotsspam
Unauthorized connection attempt from IP address 105.112.99.159 on Port 445(SMB)
2019-07-02 03:38:49
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.112.99.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.112.99.218.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020122800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.82.98#53(183.60.82.98)
;; WHEN: Mon Dec 28 22:43:08 CST 2020
;; MSG SIZE  rcvd: 118

Host info
218.99.112.105.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 218.99.112.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.66.248.150 attack
Oct  3 18:30:17 php1 sshd\[5631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010600f28b41237d.gv.shawcable.net  user=root
Oct  3 18:30:19 php1 sshd\[5631\]: Failed password for root from 184.66.248.150 port 35032 ssh2
Oct  3 18:34:13 php1 sshd\[6010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010600f28b41237d.gv.shawcable.net  user=root
Oct  3 18:34:15 php1 sshd\[6010\]: Failed password for root from 184.66.248.150 port 47970 ssh2
Oct  3 18:38:08 php1 sshd\[6523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010600f28b41237d.gv.shawcable.net  user=root
2019-10-04 12:38:24
82.12.233.150 attack
Oct  4 05:59:31 localhost sshd\[15213\]: Invalid user Eiffel123 from 82.12.233.150 port 60136
Oct  4 05:59:31 localhost sshd\[15213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.12.233.150
Oct  4 05:59:33 localhost sshd\[15213\]: Failed password for invalid user Eiffel123 from 82.12.233.150 port 60136 ssh2
2019-10-04 12:15:29
154.8.164.214 attackspam
Oct  4 05:53:43 icinga sshd[7261]: Failed password for root from 154.8.164.214 port 54643 ssh2
...
2019-10-04 12:41:51
151.45.33.165 attack
" "
2019-10-04 12:11:05
36.66.56.234 attackbots
web-1 [ssh] SSH Attack
2019-10-04 12:23:07
202.83.17.89 attackspam
Oct  4 06:55:25 site3 sshd\[10316\]: Invalid user Fish@123 from 202.83.17.89
Oct  4 06:55:25 site3 sshd\[10316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.89
Oct  4 06:55:27 site3 sshd\[10316\]: Failed password for invalid user Fish@123 from 202.83.17.89 port 49826 ssh2
Oct  4 06:59:29 site3 sshd\[10408\]: Invalid user 6y5t4r3e2w1q from 202.83.17.89
Oct  4 06:59:29 site3 sshd\[10408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.89
...
2019-10-04 12:15:58
1.34.242.32 attackspam
port scan and connect, tcp 23 (telnet)
2019-10-04 12:34:09
79.6.229.236 attackbotsspam
Automatic report - Port Scan Attack
2019-10-04 12:23:28
142.112.115.160 attackbots
Oct  4 03:55:37 venus sshd\[1043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.112.115.160  user=root
Oct  4 03:55:40 venus sshd\[1043\]: Failed password for root from 142.112.115.160 port 49895 ssh2
Oct  4 03:59:36 venus sshd\[1096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.112.115.160  user=root
...
2019-10-04 12:11:32
188.173.80.134 attackspam
Oct  4 06:56:49 site3 sshd\[10348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.80.134  user=root
Oct  4 06:56:51 site3 sshd\[10348\]: Failed password for root from 188.173.80.134 port 45078 ssh2
Oct  4 07:00:55 site3 sshd\[10456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.80.134  user=root
Oct  4 07:00:57 site3 sshd\[10456\]: Failed password for root from 188.173.80.134 port 36941 ssh2
Oct  4 07:05:16 site3 sshd\[10578\]: Invalid user 123 from 188.173.80.134
Oct  4 07:05:16 site3 sshd\[10578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.80.134
...
2019-10-04 12:34:47
1.193.108.90 attackspambots
Oct  4 05:58:51 [host] sshd[5499]: Invalid user jose from 1.193.108.90
Oct  4 05:58:51 [host] sshd[5499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.108.90
Oct  4 05:58:52 [host] sshd[5499]: Failed password for invalid user jose from 1.193.108.90 port 38066 ssh2
2019-10-04 12:36:31
122.156.68.130 attackspambots
Unauthorised access (Oct  4) SRC=122.156.68.130 LEN=40 TTL=49 ID=58175 TCP DPT=8080 WINDOW=38951 SYN 
Unauthorised access (Oct  1) SRC=122.156.68.130 LEN=40 TTL=49 ID=54690 TCP DPT=8080 WINDOW=13975 SYN
2019-10-04 12:03:15
52.52.190.187 attackspambots
LGS,WP GET /blog/wp-login.php
GET /wp-login.php
GET /wp-login.php
GET /wordpress/wp-login.php
2019-10-04 12:09:40
51.91.10.217 attackspam
Oct  4 06:28:31 vps647732 sshd[2788]: Failed password for root from 51.91.10.217 port 58932 ssh2
...
2019-10-04 12:42:05
103.12.162.159 attack
[Aegis] @ 2019-10-04 04:58:47  0100 -> Sendmail rejected message.
2019-10-04 12:32:39

Recently Reported IPs

114.32.233.88 115.48.144.169 115.49.87.172 115.78.226.52
116.72.201.205 117.242.208.209 118.170.189.159 119.3.236.34
123.135.42.47 124.41.212.13 125.160.177.88 125.41.229.8
130.43.96.199 132.255.25.127 134.122.7.64 138.197.170.128
139.59.237.54 143.110.252.93 163.27.13.29 165.22.220.26