Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.12.124.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.12.124.55.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100203 1800 900 604800 86400

;; Query time: 404 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 03 04:48:51 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 55.124.12.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.124.12.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.230.7.48 attackbots
Sep 25 17:01:03 vmd17057 sshd[19603]: Failed password for root from 52.230.7.48 port 42920 ssh2
...
2020-09-25 23:38:21
112.27.31.54 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 155 - Tue Sep  4 11:20:14 2018
2020-09-25 23:33:25
37.49.227.180 attackbotsspam
Brute force blocker - service: dovecot1 - aantal: 25 - Tue Sep  4 07:50:11 2018
2020-09-25 23:36:50
185.245.85.25 attack
Unauthorized connection attempt detected, IP banned.
2020-09-25 23:15:08
117.81.59.153 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 26 - Mon Sep  3 12:20:15 2018
2020-09-25 23:42:47
141.98.80.191 attack
Sep 25 17:15:07 cho postfix/smtpd[3654943]: warning: unknown[141.98.80.191]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 17:15:27 cho postfix/smtpd[3654997]: warning: unknown[141.98.80.191]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 17:15:58 cho postfix/smtpd[3655000]: warning: unknown[141.98.80.191]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 17:16:17 cho postfix/smtpd[3655043]: warning: unknown[141.98.80.191]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 17:16:18 cho postfix/smtpd[3655000]: warning: unknown[141.98.80.191]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-25 23:18:08
139.162.116.22 attackspam
TCP port : 1755
2020-09-25 23:22:16
121.227.36.147 attack
Brute force blocker - service: proftpd1 - aantal: 96 - Tue Sep  4 21:00:15 2018
2020-09-25 23:29:25
123.188.23.190 attack
Brute force blocker - service: proftpd1 - aantal: 43 - Tue Sep  4 12:30:16 2018
2020-09-25 23:32:33
221.225.215.237 attackspam
Brute force blocker - service: proftpd1 - aantal: 118 - Sun Sep  2 23:45:17 2018
2020-09-25 23:46:45
114.34.26.98 attackbots
81/tcp
[2020-09-24]1pkt
2020-09-25 23:37:51
119.123.216.122 attackbots
Brute force blocker - service: proftpd1 - aantal: 146 - Tue Sep  4 14:55:14 2018
2020-09-25 23:32:52
190.64.68.178 attack
Sep 25 16:32:43 santamaria sshd\[15927\]: Invalid user test from 190.64.68.178
Sep 25 16:32:43 santamaria sshd\[15927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178
Sep 25 16:32:45 santamaria sshd\[15927\]: Failed password for invalid user test from 190.64.68.178 port 5644 ssh2
...
2020-09-25 23:12:52
192.241.228.251 attackbotsspam
vps:sshd-InvalidUser
2020-09-25 23:45:24
116.255.215.25 attackspambots
(mod_security) mod_security (id:210492) triggered by 116.255.215.25 (CN/China/-): 5 in the last 3600 secs
2020-09-25 23:55:02

Recently Reported IPs

44.9.155.156 14.52.103.73 212.236.100.163 208.10.169.112
241.241.91.34 247.211.120.51 187.102.66.133 212.30.202.64
13.98.13.242 10.81.113.108 76.40.93.192 9.208.161.16
223.206.236.58 104.180.8.28 232.169.43.241 65.49.20.113
41.75.4.103 4.143.181.100 176.9.221.118 83.165.123.108