Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.113.214.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.113.214.2.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 01:21:40 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 2.214.113.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.214.113.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.183 attackbotsspam
2020-04-03T07:40:22.330112abusebot-7.cloudsearch.cf sshd[14650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2020-04-03T07:40:24.674652abusebot-7.cloudsearch.cf sshd[14650]: Failed password for root from 222.186.173.183 port 9798 ssh2
2020-04-03T07:40:27.988490abusebot-7.cloudsearch.cf sshd[14650]: Failed password for root from 222.186.173.183 port 9798 ssh2
2020-04-03T07:40:22.330112abusebot-7.cloudsearch.cf sshd[14650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2020-04-03T07:40:24.674652abusebot-7.cloudsearch.cf sshd[14650]: Failed password for root from 222.186.173.183 port 9798 ssh2
2020-04-03T07:40:27.988490abusebot-7.cloudsearch.cf sshd[14650]: Failed password for root from 222.186.173.183 port 9798 ssh2
2020-04-03T07:40:22.330112abusebot-7.cloudsearch.cf sshd[14650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=
...
2020-04-03 15:42:05
136.53.67.174 attack
(sshd) Failed SSH login from 136.53.67.174 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 07:13:02 ubnt-55d23 sshd[8100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.53.67.174  user=root
Apr  3 07:13:04 ubnt-55d23 sshd[8100]: Failed password for root from 136.53.67.174 port 38602 ssh2
2020-04-03 15:46:48
222.186.173.154 attackbots
Apr  3 09:32:26 server sshd[1027]: Failed none for root from 222.186.173.154 port 14324 ssh2
Apr  3 09:32:28 server sshd[1027]: Failed password for root from 222.186.173.154 port 14324 ssh2
Apr  3 09:32:32 server sshd[1027]: Failed password for root from 222.186.173.154 port 14324 ssh2
2020-04-03 15:35:38
221.8.155.83 attackbotsspam
CN China 83.155.8.221.adsl-pool.jlccptt.net.cn Failures: 20 ftpd
2020-04-03 15:27:54
150.129.238.143 attackspam
20/4/2@23:52:11: FAIL: Alarm-Network address from=150.129.238.143
...
2020-04-03 15:57:08
45.55.6.42 attack
Invalid user cailin from 45.55.6.42 port 55990
2020-04-03 15:28:54
1.0.246.203 attackbotsspam
1585885968 - 04/03/2020 05:52:48 Host: 1.0.246.203/1.0.246.203 Port: 445 TCP Blocked
2020-04-03 15:27:12
49.206.210.200 attackbotsspam
Unauthorized connection attempt detected from IP address 49.206.210.200 to port 445
2020-04-03 15:48:40
50.252.114.117 attack
Unauthorized connection attempt detected from IP address 50.252.114.117 to port 80
2020-04-03 15:59:28
93.207.108.143 attack
Invalid user drw from 93.207.108.143 port 52100
2020-04-03 15:25:08
203.122.21.26 attackspam
Apr  3 05:49:06 h1745522 sshd[11733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.122.21.26  user=root
Apr  3 05:49:08 h1745522 sshd[11733]: Failed password for root from 203.122.21.26 port 52564 ssh2
Apr  3 05:49:51 h1745522 sshd[11766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.122.21.26  user=root
Apr  3 05:49:53 h1745522 sshd[11766]: Failed password for root from 203.122.21.26 port 58376 ssh2
Apr  3 05:50:36 h1745522 sshd[11843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.122.21.26  user=root
Apr  3 05:50:38 h1745522 sshd[11843]: Failed password for root from 203.122.21.26 port 35968 ssh2
Apr  3 05:51:20 h1745522 sshd[11883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.122.21.26  user=root
Apr  3 05:51:23 h1745522 sshd[11883]: Failed password for root from 203.122.21.26 port 41788 ssh2
Apr 
...
2020-04-03 15:59:00
119.29.161.236 attackbotsspam
(sshd) Failed SSH login from 119.29.161.236 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 05:38:37 amsweb01 sshd[30790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.161.236  user=root
Apr  3 05:38:39 amsweb01 sshd[30790]: Failed password for root from 119.29.161.236 port 57926 ssh2
Apr  3 05:48:16 amsweb01 sshd[31956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.161.236  user=root
Apr  3 05:48:18 amsweb01 sshd[31956]: Failed password for root from 119.29.161.236 port 57628 ssh2
Apr  3 05:51:51 amsweb01 sshd[32306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.161.236  user=root
2020-04-03 16:06:10
185.220.101.26 attackbotsspam
fail2ban
2020-04-03 15:43:21
148.70.40.218 attackbots
Apr  2 21:35:55 web9 sshd\[23819\]: Invalid user lvxiangning from 148.70.40.218
Apr  2 21:35:55 web9 sshd\[23819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.40.218
Apr  2 21:35:57 web9 sshd\[23819\]: Failed password for invalid user lvxiangning from 148.70.40.218 port 47636 ssh2
Apr  2 21:43:16 web9 sshd\[24906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.40.218  user=root
Apr  2 21:43:18 web9 sshd\[24906\]: Failed password for root from 148.70.40.218 port 58538 ssh2
2020-04-03 16:00:26
206.189.87.214 attackspambots
Apr  3 09:55:59 silence02 sshd[7416]: Failed password for root from 206.189.87.214 port 26001 ssh2
Apr  3 09:59:32 silence02 sshd[7617]: Failed password for root from 206.189.87.214 port 18462 ssh2
Apr  3 10:03:15 silence02 sshd[7882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.214
2020-04-03 16:13:52

Recently Reported IPs

197.24.60.107 25.91.153.98 236.23.166.171 246.208.91.43
134.27.226.167 78.248.126.63 26.116.104.33 152.230.137.213
155.31.25.8 155.165.183.63 161.5.207.88 148.240.66.28
137.54.134.117 101.241.252.94 153.130.188.73 241.145.23.84
100.34.190.99 100.42.145.202 120.105.219.64 212.156.185.46