Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.221.144.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.221.144.89.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 01:24:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 89.144.221.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.144.221.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.220.102.6 attackbots
Sep  5 15:32:58 shivevps sshd[31215]: Failed password for root from 185.220.102.6 port 41931 ssh2
Sep  5 15:33:01 shivevps sshd[31215]: Failed password for root from 185.220.102.6 port 41931 ssh2
Sep  5 15:33:03 shivevps sshd[31215]: Failed password for root from 185.220.102.6 port 41931 ssh2
...
2020-09-05 22:37:02
101.255.65.138 attackbotsspam
Sep  5 06:56:52 marvibiene sshd[19891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.65.138 
Sep  5 06:56:53 marvibiene sshd[19891]: Failed password for invalid user abcs from 101.255.65.138 port 48914 ssh2
2020-09-05 22:33:31
159.89.139.110 attackspam
159.89.139.110 - - [05/Sep/2020:15:10:24 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.139.110 - - [05/Sep/2020:15:10:25 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.139.110 - - [05/Sep/2020:15:10:26 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-05 22:31:57
180.166.117.254 attackbotsspam
2020-09-04 22:23:19.833673-0500  localhost sshd[78489]: Failed password for invalid user villa from 180.166.117.254 port 47381 ssh2
2020-09-05 23:02:56
103.95.83.184 attackspam
103.95.83.184 - - [04/Sep/2020:18:44:31 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
103.95.83.184 - - [04/Sep/2020:18:44:32 +0100] "POST /wp-login.php HTTP/1.1" 200 7644 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
103.95.83.184 - - [04/Sep/2020:18:48:27 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
...
2020-09-05 22:20:43
80.232.241.122 attack
Port Scan detected!
...
2020-09-05 23:01:30
222.186.173.201 attackspambots
Sep  5 15:54:05 ns308116 sshd[14412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Sep  5 15:54:07 ns308116 sshd[14412]: Failed password for root from 222.186.173.201 port 5812 ssh2
Sep  5 15:54:10 ns308116 sshd[14412]: Failed password for root from 222.186.173.201 port 5812 ssh2
Sep  5 15:54:14 ns308116 sshd[14412]: Failed password for root from 222.186.173.201 port 5812 ssh2
Sep  5 15:54:17 ns308116 sshd[14412]: Failed password for root from 222.186.173.201 port 5812 ssh2
...
2020-09-05 23:00:22
45.142.120.89 attackspam
2020-09-05T08:51:25.618911linuxbox-skyline auth[96928]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=planet rhost=45.142.120.89
...
2020-09-05 22:59:30
198.23.250.38 attackbots
(From eric@talkwithwebvisitor.com) Cool website!

My name’s Eric, and I just found your site - myvenicechiropractor.com - while surfing the net. You showed up at the top of the search results, so I checked you out. Looks like what you’re doing is pretty cool.
 
But if you don’t mind me asking – after someone like me stumbles across myvenicechiropractor.com, what usually happens?

Is your site generating leads for your business? 
 
I’m guessing some, but I also bet you’d like more… studies show that 7 out 10 who land on a site wind up leaving without a trace.

Not good.

Here’s a thought – what if there was an easy way for every visitor to “raise their hand” to get a phone call from you INSTANTLY… the second they hit your site and said, “call me now.”

You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It lets you know IMMEDIATELY – so that you can talk to that lead while they’re literally look
2020-09-05 22:46:20
51.38.37.89 attack
Invalid user flood from 51.38.37.89 port 48082
2020-09-05 22:29:47
112.85.42.67 attackbotsspam
Sep  5 10:21:12 plusreed sshd[5986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.67  user=root
Sep  5 10:21:14 plusreed sshd[5986]: Failed password for root from 112.85.42.67 port 19311 ssh2
...
2020-09-05 22:21:59
114.119.147.129 attackspambots
[Sat Sep 05 21:06:55.770565 2020] [:error] [pid 11283:tid 140327545448192] [client 114.119.147.129:65182] [client 114.119.147.129] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/agroklimatologi/kalender-tanam/1430-kalender-tanam-katam-terpadu-pulau-jawa/kalender-tanam-katam-terpadu-provinsi-jawa-timur/kalender-tanam-katam-terpadu-kabupaten-probolinggo/kalender-tanam-katam-terpadu-kecamatan-sumberasih
...
2020-09-05 22:53:45
170.245.92.22 attackspambots
Honeypot attack, port: 445, PTR: host-22.voob.net.br.92.245.170.in-addr.arpa.
2020-09-05 22:57:10
202.152.21.213 attack
SSH Brute-force
2020-09-05 22:55:57
61.161.250.202 attackbotsspam
SSH Brute-Force. Ports scanning.
2020-09-05 22:33:15

Recently Reported IPs

76.143.92.254 172.158.136.135 176.182.164.148 145.203.204.143
246.128.143.228 123.146.152.44 172.133.117.173 189.79.210.78
172.236.2.135 215.101.120.246 101.116.134.39 110.66.124.223
137.154.193.208 189.51.192.237 170.91.165.210 142.81.100.85
119.169.214.9 121.210.119.210 100.63.52.39 173.98.121.45