Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.228.223.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.228.223.138.		IN	A

;; AUTHORITY SECTION:
.			254	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090100 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 00:42:14 CST 2020
;; MSG SIZE  rcvd: 119
Host info
138.223.228.105.in-addr.arpa domain name pointer 105-228-223-138.north.dsl.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.223.228.105.in-addr.arpa	name = 105-228-223-138.north.dsl.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.62.55.130 attackspambots
Brute force attack stopped by firewall
2019-07-01 09:39:48
177.44.18.114 attackspambots
Brute force attack stopped by firewall
2019-07-01 09:17:41
186.159.2.57 attackspambots
Brute force attack stopped by firewall
2019-07-01 09:14:43
220.164.2.71 attackbotsspam
Brute force attack stopped by firewall
2019-07-01 09:29:29
209.97.161.222 attackbots
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-01 09:13:22
58.20.185.12 attack
Brute force attack stopped by firewall
2019-07-01 09:44:30
46.176.218.134 attackbots
Telnet Server BruteForce Attack
2019-07-01 09:39:17
5.255.250.172 attackbots
EventTime:Mon Jul 1 08:50:17 AEST 2019,Protocol:TCP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:443,SourceIP:5.255.250.172,SourcePort:56472
2019-07-01 09:41:36
222.92.204.50 attack
Brute force attack stopped by firewall
2019-07-01 09:40:50
178.64.190.133 attackspam
Sending SPAM email
2019-07-01 09:11:14
222.243.211.200 attackbotsspam
Brute force attack stopped by firewall
2019-07-01 09:45:33
177.204.138.27 attack
port scan and connect, tcp 23 (telnet)
2019-07-01 09:09:47
60.174.130.19 attack
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-01 09:33:41
218.29.219.18 attack
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-01 09:32:34
153.36.236.234 attackbots
Jul  1 02:14:15 ovpn sshd\[22352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.234  user=root
Jul  1 02:14:17 ovpn sshd\[22352\]: Failed password for root from 153.36.236.234 port 33805 ssh2
Jul  1 02:14:19 ovpn sshd\[22352\]: Failed password for root from 153.36.236.234 port 33805 ssh2
Jul  1 02:14:22 ovpn sshd\[22352\]: Failed password for root from 153.36.236.234 port 33805 ssh2
Jul  1 02:14:25 ovpn sshd\[22372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.234  user=root
2019-07-01 09:23:42

Recently Reported IPs

69.162.12.157 107.87.87.148 114.54.51.236 61.13.137.116
89.17.211.63 104.12.74.204 213.101.205.76 211.239.236.36
204.237.100.85 130.73.53.73 198.188.43.36 218.227.8.211
196.150.186.122 46.176.57.34 204.194.32.252 50.140.238.4
180.247.47.29 60.239.217.69 210.229.206.73 210.5.217.17