Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.227.234.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32164
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.227.234.45.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:03:30 CST 2022
;; MSG SIZE  rcvd: 107
Host info
45.234.227.105.in-addr.arpa domain name pointer 234-227-105-45.south.dsl.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.234.227.105.in-addr.arpa	name = 234-227-105-45.south.dsl.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
145.102.6.58 attackbotsspam
Port scan on 1 port(s): 53
2019-10-19 22:25:13
222.65.177.128 attackbots
Unauthorized connection attempt from IP address 222.65.177.128 on Port 445(SMB)
2019-10-19 22:45:56
18.140.20.72 attackspambots
Oct 19 03:00:36 archiv sshd[24214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-18-140-20-72.ap-southeast-1.compute.amazonaws.com  user=r.r
Oct 19 03:00:39 archiv sshd[24214]: Failed password for r.r from 18.140.20.72 port 41580 ssh2
Oct 19 03:00:39 archiv sshd[24214]: Received disconnect from 18.140.20.72 port 41580:11: Bye Bye [preauth]
Oct 19 03:00:39 archiv sshd[24214]: Disconnected from 18.140.20.72 port 41580 [preauth]
Oct 19 03:25:24 archiv sshd[24472]: Connection closed by 18.140.20.72 port 57462 [preauth]
Oct 19 03:43:11 archiv sshd[24608]: Invalid user ubnt from 18.140.20.72 port 40350
Oct 19 03:43:11 archiv sshd[24608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-18-140-20-72.ap-southeast-1.compute.amazonaws.com
Oct 19 03:43:13 archiv sshd[24608]: Failed password for invalid user ubnt from 18.140.20.72 port 40350 ssh2
Oct 19 03:43:13 archiv sshd[24608]: Received di........
-------------------------------
2019-10-19 22:19:11
121.46.94.7 attack
Unauthorized connection attempt from IP address 121.46.94.7 on Port 445(SMB)
2019-10-19 22:27:24
59.51.166.180 attack
IMAP brute force
...
2019-10-19 22:28:09
51.75.66.11 attackspam
Invalid user aavetsland from 51.75.66.11 port 54090
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.11
Failed password for invalid user aavetsland from 51.75.66.11 port 54090 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.11  user=root
Failed password for root from 51.75.66.11 port 37292 ssh2
2019-10-19 22:24:23
213.230.85.8 attackspam
Oct 19 13:47:17 mxgate1 postfix/postscreen[17805]: CONNECT from [213.230.85.8]:33835 to [176.31.12.44]:25
Oct 19 13:47:18 mxgate1 postfix/dnsblog[17896]: addr 213.230.85.8 listed by domain zen.spamhaus.org as 127.0.0.4
Oct 19 13:47:18 mxgate1 postfix/dnsblog[17896]: addr 213.230.85.8 listed by domain zen.spamhaus.org as 127.0.0.11
Oct 19 13:47:18 mxgate1 postfix/dnsblog[17920]: addr 213.230.85.8 listed by domain cbl.abuseat.org as 127.0.0.2
Oct 19 13:47:18 mxgate1 postfix/dnsblog[17897]: addr 213.230.85.8 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 19 13:47:18 mxgate1 postfix/postscreen[17805]: PREGREET 21 after 0.19 from [213.230.85.8]:33835: EHLO [213.230.85.8]

Oct 19 13:47:18 mxgate1 postfix/postscreen[17805]: DNSBL rank 4 for [213.230.85.8]:33835
Oct x@x
Oct 19 13:47:19 mxgate1 postfix/postscreen[17805]: HANGUP after 0.78 from [213.230.85.8]:33835 in tests after SMTP handshake
Oct 19 13:47:19 mxgate1 postfix/postscreen[17805]: DISCONNECT [213.230.85.8]........
-------------------------------
2019-10-19 23:06:30
183.82.32.223 attackbots
Unauthorised access (Oct 19) SRC=183.82.32.223 LEN=52 PREC=0x20 TTL=114 ID=3482 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-19 22:26:06
189.146.22.208 attackbots
Unauthorized connection attempt from IP address 189.146.22.208 on Port 445(SMB)
2019-10-19 22:52:17
185.153.197.116 attackspam
Automatic report - Port Scan
2019-10-19 22:59:48
62.97.35.188 attackspam
Unauthorized connection attempt from IP address 62.97.35.188 on Port 445(SMB)
2019-10-19 22:58:15
51.91.218.189 attack
Oct 19 16:03:23 MK-Soft-VM5 sshd[10435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.218.189 
Oct 19 16:03:25 MK-Soft-VM5 sshd[10435]: Failed password for invalid user Betong-ER from 51.91.218.189 port 58424 ssh2
...
2019-10-19 22:44:37
213.251.224.21 attackspam
Oct 15 06:35:51 zulu1842 sshd[2689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.224.21  user=r.r
Oct 15 06:35:53 zulu1842 sshd[2689]: Failed password for r.r from 213.251.224.21 port 40912 ssh2
Oct 15 06:35:53 zulu1842 sshd[2689]: Received disconnect from 213.251.224.21: 11: Bye Bye [preauth]
Oct 15 06:51:40 zulu1842 sshd[3661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.224.21  user=r.r
Oct 15 06:51:42 zulu1842 sshd[3661]: Failed password for r.r from 213.251.224.21 port 37762 ssh2
Oct 15 06:51:42 zulu1842 sshd[3661]: Received disconnect from 213.251.224.21: 11: Bye Bye [preauth]
Oct 15 06:55:26 zulu1842 sshd[3894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.224.21  user=r.r
Oct 15 06:55:27 zulu1842 sshd[3894]: Failed password for r.r from 213.251.224.21 port 56174 ssh2
Oct 15 06:55:27 zulu1842 sshd[3894]: Receiv........
-------------------------------
2019-10-19 22:30:51
106.12.131.5 attackbots
Oct 19 14:44:20 hcbbdb sshd\[1520\]: Invalid user 123 from 106.12.131.5
Oct 19 14:44:20 hcbbdb sshd\[1520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.131.5
Oct 19 14:44:22 hcbbdb sshd\[1520\]: Failed password for invalid user 123 from 106.12.131.5 port 59812 ssh2
Oct 19 14:49:59 hcbbdb sshd\[2189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.131.5  user=root
Oct 19 14:50:01 hcbbdb sshd\[2189\]: Failed password for root from 106.12.131.5 port 37460 ssh2
2019-10-19 23:00:48
116.110.117.42 attack
frenzy
2019-10-19 23:06:46

Recently Reported IPs

105.227.228.250 101.200.40.28 101.200.40.93 101.200.41.219
251.33.1.193 101.200.42.224 101.200.43.49 101.200.45.117
101.200.45.131 101.200.45.91 105.228.152.138 105.228.16.71
105.228.150.73 105.228.150.156 105.228.152.190 105.228.149.109
105.228.148.218 105.228.151.90 105.228.145.241 105.228.141.82