Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.226.213.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.226.213.31.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:19:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
31.213.226.105.in-addr.arpa domain name pointer 213-226-105-31.north.dsl.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
31.213.226.105.in-addr.arpa	name = 213-226-105-31.north.dsl.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.51.186.12 attackbots
Apr  5 23:53:22 mail sshd\[21312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.12  user=root
...
2020-04-06 16:01:34
85.96.191.90 attackspam
Automatic report - Port Scan Attack
2020-04-06 16:34:07
163.44.149.235 attack
Apr  6 09:09:25 pi sshd[10471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.149.235  user=root
Apr  6 09:09:27 pi sshd[10471]: Failed password for invalid user root from 163.44.149.235 port 37618 ssh2
2020-04-06 16:13:17
219.117.235.154 attackbots
Apr  6 05:52:38 legacy sshd[2814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.117.235.154
Apr  6 05:52:39 legacy sshd[2817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.117.235.154
Apr  6 05:52:40 legacy sshd[2814]: Failed password for invalid user pi from 219.117.235.154 port 40108 ssh2
...
2020-04-06 16:39:15
45.133.99.6 attack
Apr  6 09:21:36 websrv1.derweidener.de postfix/smtpd[2296605]: warning: unknown[45.133.99.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 09:21:36 websrv1.derweidener.de postfix/smtpd[2296605]: lost connection after AUTH from unknown[45.133.99.6]
Apr  6 09:21:42 websrv1.derweidener.de postfix/smtpd[2296588]: lost connection after AUTH from unknown[45.133.99.6]
Apr  6 09:21:50 websrv1.derweidener.de postfix/smtpd[2296243]: lost connection after AUTH from unknown[45.133.99.6]
Apr  6 09:22:00 websrv1.derweidener.de postfix/smtpd[2296605]: warning: unknown[45.133.99.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-06 15:56:17
89.248.160.150 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 41146 proto: UDP cat: Misc Attack
2020-04-06 16:38:04
192.3.67.107 attack
Apr  6 07:48:17 cloud sshd[32068]: Failed password for root from 192.3.67.107 port 38666 ssh2
2020-04-06 15:48:51
217.182.237.217 attack
Brute force attack against VPN service
2020-04-06 16:06:48
222.186.173.154 attackspambots
Apr  6 04:26:55 plusreed sshd[2233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Apr  6 04:26:57 plusreed sshd[2233]: Failed password for root from 222.186.173.154 port 51660 ssh2
...
2020-04-06 16:29:13
106.13.140.52 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-06 16:20:08
182.61.105.104 attackspambots
Apr  6 07:52:49 lukav-desktop sshd\[27010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.104  user=root
Apr  6 07:52:51 lukav-desktop sshd\[27010\]: Failed password for root from 182.61.105.104 port 50200 ssh2
Apr  6 07:57:14 lukav-desktop sshd\[27183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.104  user=root
Apr  6 07:57:17 lukav-desktop sshd\[27183\]: Failed password for root from 182.61.105.104 port 60896 ssh2
Apr  6 08:01:34 lukav-desktop sshd\[27323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.104  user=root
2020-04-06 16:33:33
114.69.249.194 attackbots
2020-04-06T08:44:16.549115  sshd[4234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.69.249.194  user=root
2020-04-06T08:44:18.776619  sshd[4234]: Failed password for root from 114.69.249.194 port 42741 ssh2
2020-04-06T08:52:43.354647  sshd[4432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.69.249.194  user=root
2020-04-06T08:52:44.850592  sshd[4432]: Failed password for root from 114.69.249.194 port 59798 ssh2
...
2020-04-06 16:16:26
220.250.0.252 attackspambots
Apr  5 21:09:07 mockhub sshd[2977]: Failed password for root from 220.250.0.252 port 46813 ssh2
...
2020-04-06 15:51:28
208.93.152.4 attackbotsspam
inbound access attempt
2020-04-06 16:39:33
191.13.215.183 attackbotsspam
Automatic report BANNED IP
2020-04-06 15:53:47

Recently Reported IPs

105.226.211.160 105.226.211.218 105.226.214.72 105.226.224.198
105.226.216.16 105.226.211.179 105.226.211.87 105.226.212.21
105.226.219.194 105.227.250.217 105.227.242.209 105.227.26.32
105.227.250.50 105.227.33.158 105.227.33.222 105.227.251.37
105.227.30.246 105.227.32.220 105.227.29.94 105.227.30.82