Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Windhoek

Region: Khomas

Country: Namibia

Internet Service Provider: MTC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.232.75.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20667
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.232.75.105.			IN	A

;; AUTHORITY SECTION:
.			498	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 25 21:21:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 105.75.232.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.75.232.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.73.197.170 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-09 04:28:09
218.92.0.201 attackspambots
Unauthorized connection attempt detected from IP address 218.92.0.201 to port 22 [T]
2020-01-09 04:29:36
182.139.134.82 attack
Unauthorized connection attempt detected from IP address 182.139.134.82 to port 445 [T]
2020-01-09 04:31:58
59.80.31.23 attackspam
Unauthorized connection attempt detected from IP address 59.80.31.23 to port 200 [T]
2020-01-09 04:22:54
116.232.48.4 attackspam
Unauthorized connection attempt detected from IP address 116.232.48.4 to port 22 [T]
2020-01-09 04:18:57
124.115.214.182 attackspambots
Unauthorized connection attempt detected from IP address 124.115.214.182 to port 1433 [T]
2020-01-09 04:14:19
136.243.56.106 attackbotsspam
Unauthorized connection attempt detected from IP address 136.243.56.106 to port 5075 [T]
2020-01-09 04:12:14
59.175.175.10 attackbotsspam
Unauthorized connection attempt detected from IP address 59.175.175.10 to port 1433 [T]
2020-01-09 04:22:34
141.237.34.19 attackspam
Jan  8 13:49:32 tux postfix/smtpd[24476]: connect from ppp141237034019.access.hol.gr[141.237.34.19]
Jan x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=141.237.34.19
2020-01-09 04:34:18
123.207.241.148 attack
IP: 123.207.241.148
Ports affected
    World Wide Web HTTP (80) 
Abuse Confidence rating 28%
Found in DNSBL('s)
ASN Details
   AS45090 Shenzhen Tencent Computer Systems Company Limited
   China (CN)
   CIDR 123.206.0.0/15
Log Date: 8/01/2020 1:04:44 PM UTC
2020-01-09 04:35:33
122.228.19.79 attackbots
Jan  8 20:47:17 debian-2gb-nbg1-2 kernel: \[772152.115678\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=122.228.19.79 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=111 ID=19665 PROTO=TCP SPT=46083 DPT=990 WINDOW=29200 RES=0x00 SYN URGP=0
2020-01-09 04:15:08
58.218.185.147 attack
Unauthorized connection attempt detected from IP address 58.218.185.147 to port 1433 [T]
2020-01-09 04:23:21
35.199.51.122 attack
Unauthorized connection attempt detected from IP address 35.199.51.122 to port 80 [T]
2020-01-09 04:26:12
95.174.102.38 attackbotsspam
Failed password for root from 95.174.102.38 port 13833 ssh2
2020-01-09 04:21:14
164.52.24.181 attack
Unauthorized connection attempt detected from IP address 164.52.24.181 to port 3128 [T]
2020-01-09 04:33:48

Recently Reported IPs

208.73.206.201 171.90.218.91 24.105.177.138 47.23.63.163
7.27.84.124 209.206.197.119 98.75.8.57 142.89.38.165
125.227.119.77 192.28.216.205 40.68.77.208 166.149.78.42
83.26.179.237 128.101.19.118 11.55.234.205 67.73.59.55
139.131.58.250 122.220.178.152 166.228.114.187 168.157.118.168