Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Telkom SA Ltd.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Automatic report - Port Scan Attack
2020-02-20 07:19:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.225.130.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.225.130.220.		IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021901 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 07:19:35 CST 2020
;; MSG SIZE  rcvd: 119
Host info
220.130.225.105.in-addr.arpa domain name pointer 105-225-130-220.south.dsl.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.130.225.105.in-addr.arpa	name = 105-225-130-220.south.dsl.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.242.200.222 attackbotsspam
Attempted connection to port 23.
2020-05-30 19:22:02
13.209.68.44 attackbotsspam
May 30 09:35:12 localhost sshd\[31220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.68.44  user=root
May 30 09:35:14 localhost sshd\[31220\]: Failed password for root from 13.209.68.44 port 50238 ssh2
May 30 10:06:47 localhost sshd\[31754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.68.44  user=root
...
2020-05-30 19:15:35
112.168.130.14 attack
Attempted connection to port 1433.
2020-05-30 19:20:57
211.205.95.1 attack
Unauthorized connection attempt from IP address 211.205.95.1 on Port 445(SMB)
2020-05-30 19:33:46
125.224.94.6 attack
Telnet Server BruteForce Attack
2020-05-30 19:06:44
79.45.55.138 attackspambots
Attempted connection to port 23.
2020-05-30 19:03:10
103.145.13.23 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-30 19:14:06
94.99.99.60 attack
Unauthorized connection attempt from IP address 94.99.99.60 on Port 445(SMB)
2020-05-30 19:01:35
118.179.203.250 attack
Unauthorized connection attempt from IP address 118.179.203.250 on Port 445(SMB)
2020-05-30 19:23:14
77.158.71.118 attackbotsspam
Invalid user sammy from 77.158.71.118 port 45400
2020-05-30 19:17:46
181.115.182.130 attack
Attempted connection to port 445.
2020-05-30 19:12:43
94.227.15.86 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-30 19:08:51
23.129.64.194 attack
$lgm
2020-05-30 18:54:53
14.187.124.131 attackspam
Unauthorized connection attempt from IP address 14.187.124.131 on Port 445(SMB)
2020-05-30 19:26:02
197.214.12.4 attack
Port probing on unauthorized port 445
2020-05-30 19:30:06

Recently Reported IPs

194.26.29.11 34.83.180.241 162.243.135.126 234.184.68.120
138.197.223.160 204.114.98.7 110.77.196.2 80.121.102.100
13.115.102.230 8.185.110.145 123.122.179.148 45.10.232.44
37.44.68.2 129.226.53.203 201.209.100.199 3.8.151.73
8.45.55.215 82.114.162.218 62.47.253.235 59.126.63.19