Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Durban

Region: KwaZulu-Natal

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.228.104.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38381
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.228.104.222.		IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011901 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 20 05:12:36 CST 2020
;; MSG SIZE  rcvd: 119
Host info
222.104.228.105.in-addr.arpa domain name pointer 105-228-104-222.south.dsl.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
222.104.228.105.in-addr.arpa	name = 105-228-104-222.south.dsl.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.76.252.101 attack
Port Scan: TCP/1433
2019-09-16 06:05:52
76.76.239.123 attack
Port Scan: UDP/137
2019-09-16 05:52:08
160.153.244.140 attackbotsspam
Port Scan: TCP/445
2019-09-16 05:42:30
207.99.98.162 attackspam
Port Scan: TCP/445
2019-09-16 06:09:34
24.97.238.106 attackspam
Port Scan: UDP/137
2019-09-16 05:32:36
220.143.8.150 attackspambots
Port Scan: TCP/2323
2019-09-16 05:34:50
123.157.19.62 attack
Port Scan: TCP/1433
2019-09-16 05:44:09
69.80.119.169 attackbotsspam
Port Scan: UDP/1
2019-09-16 05:54:23
64.202.187.200 attack
Port Scan: TCP/445
2019-09-16 05:56:40
50.63.14.85 attack
Port Scan: TCP/445
2019-09-16 05:58:44
2400:6180:0:d0::15:e001 attackbots
WordPress wp-login brute force :: 2400:6180:0:d0::15:e001 0.048 BYPASS [15/Sep/2019:23:15:08  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-16 05:30:48
136.223.103.124 attack
Port Scan: UDP/137
2019-09-16 05:43:36
116.1.235.155 attack
Port Scan: TCP/1433
2019-09-16 05:46:15
118.117.53.131 attackspam
Port Scan: TCP/1433
2019-09-16 05:45:24
216.59.166.113 attackbotsspam
(imapd) Failed IMAP login from 216.59.166.113 (US/United States/-): 1 in the last 3600 secs
2019-09-16 06:07:04

Recently Reported IPs

212.149.174.248 174.221.183.249 105.111.98.247 49.85.62.145
93.189.255.157 120.52.77.245 151.45.238.48 47.97.196.10
1.132.72.251 143.200.70.184 63.225.141.25 110.209.187.148
83.145.91.154 166.123.104.171 178.123.224.227 107.139.191.90
150.237.201.176 124.22.244.55 183.41.247.57 89.201.130.100