Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.149.234.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.149.234.103.		IN	A

;; AUTHORITY SECTION:
.			53	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040102 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 23:47:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 103.234.149.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.234.149.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.81.29.166 attackbots
WordPress brute force
2019-08-24 06:02:02
218.92.1.142 attackbotsspam
Aug 23 17:37:18 TORMINT sshd\[23086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
Aug 23 17:37:20 TORMINT sshd\[23086\]: Failed password for root from 218.92.1.142 port 58837 ssh2
Aug 23 17:38:15 TORMINT sshd\[23121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
...
2019-08-24 05:42:31
51.75.207.61 attack
Aug 23 22:57:30 meumeu sshd[12822]: Failed password for invalid user www from 51.75.207.61 port 45694 ssh2
Aug 23 23:01:19 meumeu sshd[13299]: Failed password for invalid user sharp from 51.75.207.61 port 33338 ssh2
Aug 23 23:05:03 meumeu sshd[13727]: Failed password for invalid user sikha from 51.75.207.61 port 49218 ssh2
...
2019-08-24 05:51:02
71.6.233.16 attackbotsspam
7100/tcp 9043/tcp 65535/tcp...
[2019-07-03/08-23]4pkt,3pt.(tcp),1pt.(udp)
2019-08-24 05:49:02
189.235.223.134 attackspambots
Splunk® : port scan detected:
Aug 23 12:16:56 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=189.235.223.134 DST=104.248.11.191 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=13605 DF PROTO=TCP SPT=49571 DPT=3389 WINDOW=8192 RES=0x00 SYN URGP=0
2019-08-24 06:07:38
138.219.228.96 attackspambots
*Port Scan* detected from 138.219.228.96 (CL/Chile/smtp2.taisaplus.com). 4 hits in the last 15 seconds
2019-08-24 06:04:23
140.143.228.18 attackbots
Aug 23 06:26:52 hiderm sshd\[23027\]: Invalid user debian-tor from 140.143.228.18
Aug 23 06:26:52 hiderm sshd\[23027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.228.18
Aug 23 06:26:53 hiderm sshd\[23027\]: Failed password for invalid user debian-tor from 140.143.228.18 port 57576 ssh2
Aug 23 06:31:54 hiderm sshd\[23490\]: Invalid user dustin from 140.143.228.18
Aug 23 06:31:54 hiderm sshd\[23490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.228.18
2019-08-24 06:23:27
117.0.35.153 attackbotsspam
Aug 23 11:35:11 kapalua sshd\[5268\]: Invalid user admin from 117.0.35.153
Aug 23 11:35:11 kapalua sshd\[5268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153
Aug 23 11:35:13 kapalua sshd\[5268\]: Failed password for invalid user admin from 117.0.35.153 port 54641 ssh2
Aug 23 11:35:17 kapalua sshd\[5272\]: Invalid user admin from 117.0.35.153
Aug 23 11:35:17 kapalua sshd\[5272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153
2019-08-24 05:40:56
2.38.186.191 attackspambots
37215/tcp 23/tcp 60001/tcp...
[2019-08-03/23]6pkt,3pt.(tcp)
2019-08-24 05:40:38
167.114.153.77 attack
" "
2019-08-24 06:12:34
146.185.25.174 attackspam
8002/tcp 7548/tcp 9060/tcp...
[2019-07-03/08-23]12pkt,6pt.(tcp)
2019-08-24 05:52:10
71.6.233.185 attackspam
2004/tcp 49152/tcp 1024/tcp...
[2019-07-13/08-23]4pkt,4pt.(tcp)
2019-08-24 05:50:16
24.46.51.38 attackspambots
scan z
2019-08-24 05:42:04
193.32.160.137 attackbots
Ban by Fail2Ban
2019-08-24 05:47:34
221.148.63.118 attackbots
Aug 23 20:49:25 hb sshd\[17019\]: Invalid user postgres from 221.148.63.118
Aug 23 20:49:25 hb sshd\[17019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.148.63.118
Aug 23 20:49:28 hb sshd\[17019\]: Failed password for invalid user postgres from 221.148.63.118 port 54302 ssh2
Aug 23 20:54:21 hb sshd\[17497\]: Invalid user temp from 221.148.63.118
Aug 23 20:54:21 hb sshd\[17497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.148.63.118
2019-08-24 05:49:36

Recently Reported IPs

105.139.166.112 177.223.158.164 105.154.205.116 105.154.235.181
105.154.246.161 105.155.166.22 105.155.217.34 105.155.238.34
105.213.92.196 105.216.128.148 105.22.36.6 105.22.47.198
105.22.73.146 111.150.90.116 105.224.111.39 105.224.163.176
105.224.163.198 105.224.192.113 105.224.193.92 105.224.217.177