Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cape Town

Region: Western Cape

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
105.225.61.52 attackspambots
Unauthorized connection attempt detected from IP address 105.225.61.52 to port 23 [J]
2020-02-23 19:02:56
105.225.61.206 attack
Automatic report - Port Scan Attack
2019-11-18 23:41:12
105.225.62.204 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:17:15,791 INFO [amun_request_handler] PortScan Detected on Port: 445 (105.225.62.204)
2019-09-17 07:20:57
105.225.67.43 attack
2019-07-03 18:32:27 H=(105-225-67-43.south.dsl.telkomsa.net) [105.225.67.43]:29141 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=105.225.67.43)
2019-07-03 18:32:28 unexpected disconnection while reading SMTP command from (105-225-67-43.south.dsl.telkomsa.net) [105.225.67.43]:29141 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-07-03 18:48:00 H=(105-225-67-43.south.dsl.telkomsa.net) [105.225.67.43]:34443 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=105.225.67.43)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=105.225.67.43
2019-07-06 14:58:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.225.6.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.225.6.128.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012300 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 23 16:05:44 CST 2023
;; MSG SIZE  rcvd: 106
Host info
128.6.225.105.in-addr.arpa domain name pointer 105-225-6-128.north.dsl.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
128.6.225.105.in-addr.arpa	name = 105-225-6-128.north.dsl.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.89.166.45 attack
Mar  7 09:09:20 host sshd[28101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-89-166.eu  user=root
Mar  7 09:09:22 host sshd[28101]: Failed password for root from 51.89.166.45 port 44450 ssh2
...
2020-03-07 19:58:46
14.192.145.162 attackspam
Honeypot attack, port: 445, PTR: fn145-static162.fariya.com.
2020-03-07 20:07:19
188.177.57.214 attackspam
Honeypot attack, port: 445, PTR: 188-177-57-214-static.dk.customer.tdc.net.
2020-03-07 20:25:36
221.194.137.28 attack
Invalid user couchdb from 221.194.137.28 port 33278
2020-03-07 20:17:46
47.190.18.35 attack
2020-03-07T04:49:51.637742abusebot.cloudsearch.cf sshd[8487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.190.18.35  user=root
2020-03-07T04:49:53.632501abusebot.cloudsearch.cf sshd[8487]: Failed password for root from 47.190.18.35 port 57780 ssh2
2020-03-07T04:49:54.087999abusebot.cloudsearch.cf sshd[8491]: Invalid user DUP from 47.190.18.35 port 58478
2020-03-07T04:49:54.095233abusebot.cloudsearch.cf sshd[8491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.190.18.35
2020-03-07T04:49:54.087999abusebot.cloudsearch.cf sshd[8491]: Invalid user DUP from 47.190.18.35 port 58478
2020-03-07T04:49:55.834048abusebot.cloudsearch.cf sshd[8491]: Failed password for invalid user DUP from 47.190.18.35 port 58478 ssh2
2020-03-07T04:49:56.318672abusebot.cloudsearch.cf sshd[8495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.190.18.35  user=root
2020-03-07T04:49:57
...
2020-03-07 20:26:20
45.56.78.64 attackbots
trying to access non-authorized port
2020-03-07 20:20:24
118.201.138.94 attack
Mar  7 06:48:34 master sshd[11573]: Failed password for root from 118.201.138.94 port 56818 ssh2
2020-03-07 20:05:24
46.105.244.17 attackspambots
Mar  7 12:37:45 lnxded64 sshd[6711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.244.17
2020-03-07 20:36:44
121.187.37.35 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-07 20:16:09
176.31.252.148 attackspam
Mar  7 11:55:41 host sshd[57425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=infra01.linalis.com  user=root
Mar  7 11:55:43 host sshd[57425]: Failed password for root from 176.31.252.148 port 34822 ssh2
...
2020-03-07 20:11:46
200.194.18.144 attackbots
20/3/6@23:49:51: FAIL: Alarm-Telnet address from=200.194.18.144
...
2020-03-07 20:31:20
5.233.212.246 attack
Email rejected due to spam filtering
2020-03-07 20:06:55
46.101.184.111 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-03-07 20:16:23
41.76.8.12 attackspam
Mar  7 05:50:00 debian-2gb-nbg1-2 kernel: \[5815762.352598\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=41.76.8.12 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=28985 PROTO=TCP SPT=53361 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-07 20:23:48
62.210.70.138 attack
[2020-03-07 07:13:20] NOTICE[1148][C-0000f4a4] chan_sip.c: Call from '' (62.210.70.138:59266) to extension '400011972592277524' rejected because extension not found in context 'public'.
[2020-03-07 07:13:20] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-07T07:13:20.210-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="400011972592277524",SessionID="0x7fd82ca712e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.70.138/59266",ACLName="no_extension_match"
[2020-03-07 07:18:30] NOTICE[1148][C-0000f4af] chan_sip.c: Call from '' (62.210.70.138:53181) to extension '500011972592277524' rejected because extension not found in context 'public'.
[2020-03-07 07:18:30] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-07T07:18:30.172-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="500011972592277524",SessionID="0x7fd82c40d3d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddres
...
2020-03-07 20:23:31

Recently Reported IPs

87.208.115.33 142.75.89.157 126.123.65.55 121.202.108.107
138.59.141.188 21.253.126.213 245.222.108.76 35.2.80.225
121.158.187.185 223.130.30.26 218.230.155.141 153.227.121.144
218.143.119.1 187.203.187.186 0.135.1.6 43.104.170.252
32.117.123.250 46.22.161.138 185.156.233.90 63.159.222.149