Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.230.151.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.230.151.150.		IN	A

;; AUTHORITY SECTION:
.			322	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:59:23 CST 2023
;; MSG SIZE  rcvd: 108
Host info
150.151.230.105.in-addr.arpa domain name pointer 150-151-230-105.r.airtelkenya.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.151.230.105.in-addr.arpa	name = 150-151-230-105.r.airtelkenya.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
24.16.186.25 attackspambots
10 attempts against mh-pma-try-ban on milky
2020-02-08 14:29:04
115.58.236.96 attack
Automatic report - Port Scan Attack
2020-02-08 15:17:50
146.88.240.4 attackbotsspam
146.88.240.4 was recorded 273 times by 9 hosts attempting to connect to the following ports: 123,1900,5683,111,1434,19,69,10001,27970,7777,623,17,1194,7780,5353,11211,520,5093,1604,3283,47808,161,7778,7779. Incident counter (4h, 24h, all-time): 273, 787, 51265
2020-02-08 15:10:27
188.190.221.151 attack
Honeypot attack, port: 445, PTR: pool.megalink.lg.ua.
2020-02-08 15:11:23
51.68.84.36 attack
Feb  8 05:57:59 odroid64 sshd\[26487\]: Invalid user uen from 51.68.84.36
Feb  8 05:57:59 odroid64 sshd\[26487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.84.36
...
2020-02-08 14:23:41
123.18.15.123 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-08 15:26:57
112.119.209.118 attack
Honeypot attack, port: 5555, PTR: n112119209118.netvigator.com.
2020-02-08 15:22:38
47.22.82.8 attackspambots
Feb  8 02:09:06 plusreed sshd[30743]: Invalid user bqh from 47.22.82.8
...
2020-02-08 15:17:25
194.6.231.122 attackbots
Feb  8 08:09:11 sso sshd[13061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.6.231.122
Feb  8 08:09:12 sso sshd[13061]: Failed password for invalid user cyg from 194.6.231.122 port 49363 ssh2
...
2020-02-08 15:28:44
139.199.84.234 attackbotsspam
SSH Brute Force
2020-02-08 15:15:07
45.143.223.68 attack
Brute forcing email accounts
2020-02-08 15:31:07
185.156.73.49 attack
Feb  8 08:28:27 debian-2gb-nbg1-2 kernel: \[3406147.412567\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.49 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=36599 PROTO=TCP SPT=53848 DPT=50012 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-08 15:31:23
113.162.53.72 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-08 15:18:22
162.243.128.228 attack
firewall-block, port(s): 9042/tcp
2020-02-08 15:08:32
92.59.136.208 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-08 15:00:35

Recently Reported IPs

105.230.232.119 105.230.124.40 105.23.53.110 105.230.196.102
105.231.83.181 105.230.13.227 105.23.30.119 105.230.57.138
105.230.131.206 105.230.248.157 105.230.148.99 105.230.205.63
105.230.45.37 105.23.249.146 105.230.142.196 105.23.54.130
105.23.250.103 105.23.245.5 105.23.69.204 105.23.251.78