Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mossel Bay

Region: Western Cape

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.227.118.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.227.118.53.			IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032202 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 23 08:17:22 CST 2022
;; MSG SIZE  rcvd: 107
Host info
53.118.227.105.in-addr.arpa domain name pointer 105-227-118-53.south.dsl.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.118.227.105.in-addr.arpa	name = 105-227-118-53.south.dsl.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.19.85.20 attack
 TCP (SYN) 182.19.85.20:50209 -> port 1433, len 40
2020-06-01 03:35:10
80.82.77.240 attack
firewall-block, port(s): 1241/tcp, 1293/tcp
2020-06-01 03:44:35
154.16.171.186 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-01 03:35:55
103.18.246.184 attack
Port scanning [2 denied]
2020-06-01 03:38:40
88.218.17.185 attackbots
Port scanning [2 denied]
2020-06-01 03:42:44
159.89.133.144 attackbotsspam
Port scan denied
2020-06-01 03:15:38
80.82.77.212 attack
Port scanning [6 denied]
2020-06-01 03:45:13
120.132.13.151 attack
May 31 15:36:45 pkdns2 sshd\[4622\]: Invalid user karsan from 120.132.13.151May 31 15:36:47 pkdns2 sshd\[4622\]: Failed password for invalid user karsan from 120.132.13.151 port 45252 ssh2May 31 15:39:55 pkdns2 sshd\[4731\]: Invalid user ot from 120.132.13.151May 31 15:39:57 pkdns2 sshd\[4731\]: Failed password for invalid user ot from 120.132.13.151 port 49746 ssh2May 31 15:46:24 pkdns2 sshd\[5216\]: Invalid user zeenat from 120.132.13.151May 31 15:46:26 pkdns2 sshd\[5216\]: Failed password for invalid user zeenat from 120.132.13.151 port 58738 ssh2
...
2020-06-01 03:21:11
177.139.194.62 attackspam
2020-05-31T19:44:45.675492centos sshd[21229]: Failed password for root from 177.139.194.62 port 50298 ssh2
2020-05-31T19:46:21.567560centos sshd[21333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.194.62  user=root
2020-05-31T19:46:23.515006centos sshd[21333]: Failed password for root from 177.139.194.62 port 43206 ssh2
...
2020-06-01 03:12:41
185.16.37.135 attackbots
SSH Brute Force
2020-06-01 03:11:21
190.52.191.49 attackspambots
SSH Brute Force
2020-06-01 03:10:17
151.77.198.27 attackspambots
ET EXPLOIT Zyxel NAS RCE Attempt Inbound (CVE-2020-9054) M1 - port: 80 proto: TCP cat: Attempted Administrator Privilege Gain
2020-06-01 03:36:21
195.54.166.138 attack
Persistent port scanning [21 denied]
2020-06-01 03:32:41
118.123.96.139 attackbots
1433/tcp 1433/tcp
[2020-05-28/31]2pkt
2020-06-01 03:37:15
103.83.157.39 attackbotsspam
 TCP (SYN) 103.83.157.39:56143 -> port 11211, len 40
2020-06-01 03:38:08

Recently Reported IPs

84.98.86.163 134.14.5.1 0.104.134.124 52.88.224.254
168.227.68.229 181.107.214.118 6.18.139.169 215.137.182.206
241.58.249.195 157.65.240.147 178.4.252.101 233.65.157.141
81.53.86.86 247.104.216.91 204.243.253.224 106.175.182.39
179.14.126.249 118.88.119.39 185.124.86.10 57.93.85.57