Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Durban

Region: KwaZulu-Natal

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: Telkom-Internet

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.225.171.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18614
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.225.171.18.			IN	A

;; AUTHORITY SECTION:
.			3151	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050700 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue May 07 19:49:18 +08 2019
;; MSG SIZE  rcvd: 118

Host info
18.171.225.105.in-addr.arpa domain name pointer 105-225-171-18.east.dsl.telkomsa.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
18.171.225.105.in-addr.arpa	name = 105-225-171-18.east.dsl.telkomsa.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
64.227.86.104 attackbotsspam
Unauthorized connection attempt detected, IP banned.
2020-08-11 12:48:11
167.99.155.36 attackspam
$f2bV_matches
2020-08-11 13:07:02
163.172.161.31 attack
Bruteforce detected by fail2ban
2020-08-11 13:03:47
106.12.215.244 attackbots
Aug 11 06:14:40 cho sshd[425886]: Invalid user universe from 106.12.215.244 port 60168
Aug 11 06:14:40 cho sshd[425886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.244 
Aug 11 06:14:40 cho sshd[425886]: Invalid user universe from 106.12.215.244 port 60168
Aug 11 06:14:42 cho sshd[425886]: Failed password for invalid user universe from 106.12.215.244 port 60168 ssh2
Aug 11 06:19:00 cho sshd[426112]: Invalid user roots from 106.12.215.244 port 60290
...
2020-08-11 12:33:15
209.160.97.69 attack
SpamScore above: 10.0
2020-08-11 12:54:59
78.128.113.18 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-11 13:02:01
191.235.96.76 attackspambots
Aug 11 03:49:28 game-panel sshd[24636]: Failed password for root from 191.235.96.76 port 39732 ssh2
Aug 11 03:53:24 game-panel sshd[24797]: Failed password for root from 191.235.96.76 port 36344 ssh2
2020-08-11 12:49:24
218.92.0.185 attackbots
Aug 11 06:52:31 jane sshd[13437]: Failed password for root from 218.92.0.185 port 10376 ssh2
Aug 11 06:52:35 jane sshd[13437]: Failed password for root from 218.92.0.185 port 10376 ssh2
...
2020-08-11 13:05:45
77.247.178.200 attack
[2020-08-11 00:18:38] NOTICE[1185][C-00000b94] chan_sip.c: Call from '' (77.247.178.200:63134) to extension '011442037693601' rejected because extension not found in context 'public'.
[2020-08-11 00:18:38] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-11T00:18:38.661-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037693601",SessionID="0x7f10c40edb38",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.178.200/63134",ACLName="no_extension_match"
[2020-08-11 00:18:54] NOTICE[1185][C-00000b95] chan_sip.c: Call from '' (77.247.178.200:50013) to extension '011442037693601' rejected because extension not found in context 'public'.
[2020-08-11 00:18:54] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-11T00:18:54.112-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037693601",SessionID="0x7f10c40627c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
...
2020-08-11 12:32:04
87.251.74.6 attack
$f2bV_matches
2020-08-11 12:27:39
195.190.115.142 attack
1597118233 - 08/11/2020 05:57:13 Host: 195.190.115.142/195.190.115.142 Port: 23 TCP Blocked
...
2020-08-11 12:56:22
181.115.156.59 attack
Brute force attempt
2020-08-11 12:35:53
163.172.136.227 attackbots
Aug 11 06:31:10 buvik sshd[21155]: Failed password for root from 163.172.136.227 port 54562 ssh2
Aug 11 06:34:51 buvik sshd[21618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.136.227  user=root
Aug 11 06:34:53 buvik sshd[21618]: Failed password for root from 163.172.136.227 port 36918 ssh2
...
2020-08-11 12:36:13
187.167.204.248 attack
Automatic report - Port Scan Attack
2020-08-11 12:43:27
177.180.92.99 attackspambots
Port Scan detected!
...
2020-08-11 13:06:48

Recently Reported IPs

151.34.224.248 68.183.37.189 217.112.128.23 93.158.161.26
203.186.158.178 189.216.59.137 152.251.21.103 121.77.210.179
177.13.10.183 159.89.171.160 97.67.202.208 229.231.52.238
77.40.62.81 106.228.17.187 220.83.91.26 77.40.62.237
157.132.125.41 211.50.12.13 77.40.29.67 108.12.109.245