Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.254.212.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.254.212.234.		IN	A

;; AUTHORITY SECTION:
.			161	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:10:54 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 234.212.254.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.212.254.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
176.31.253.55 attackspambots
Aug  7 01:49:58 debian sshd\[28995\]: Invalid user qwe1 from 176.31.253.55 port 40640
Aug  7 01:49:58 debian sshd\[28995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.253.55
Aug  7 01:50:00 debian sshd\[28995\]: Failed password for invalid user qwe1 from 176.31.253.55 port 40640 ssh2
...
2019-08-07 13:50:53
46.38.235.14 attackbots
CMS brute force
...
2019-08-07 14:19:47
193.70.0.93 attackspam
Aug  6 22:23:58 marvibiene sshd[34641]: Invalid user deployop from 193.70.0.93 port 38686
Aug  6 22:23:58 marvibiene sshd[34641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.0.93
Aug  6 22:23:58 marvibiene sshd[34641]: Invalid user deployop from 193.70.0.93 port 38686
Aug  6 22:24:00 marvibiene sshd[34641]: Failed password for invalid user deployop from 193.70.0.93 port 38686 ssh2
...
2019-08-07 14:45:57
36.239.37.77 attack
Automatic report - Port Scan Attack
2019-08-07 14:50:06
111.250.155.124 attackbotsspam
Telnetd brute force attack detected by fail2ban
2019-08-07 14:05:35
216.244.66.201 attack
20 attempts against mh-misbehave-ban on air.magehost.pro
2019-08-07 14:36:11
177.130.139.46 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-07 14:20:16
92.53.55.252 attackbotsspam
Attempted WordPress login: "GET /wp-login.php"
2019-08-07 14:01:50
89.248.174.201 attackspam
Port scan on 3 port(s): 2217 8059 9843
2019-08-07 14:28:48
159.89.2.220 attackspambots
B: /wp-login.php attack
2019-08-07 14:24:44
1.165.180.68 attackspam
Unauthorised access (Aug  7) SRC=1.165.180.68 LEN=40 PREC=0x20 TTL=52 ID=32276 TCP DPT=23 WINDOW=29882 SYN
2019-08-07 14:52:09
151.21.130.106 attack
Aug  6 17:28:00 xtremcommunity sshd\[2720\]: Invalid user silvi from 151.21.130.106 port 50144
Aug  6 17:28:00 xtremcommunity sshd\[2720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.21.130.106
Aug  6 17:28:02 xtremcommunity sshd\[2720\]: Failed password for invalid user silvi from 151.21.130.106 port 50144 ssh2
Aug  6 17:33:58 xtremcommunity sshd\[10529\]: Invalid user stephen from 151.21.130.106 port 45312
Aug  6 17:33:58 xtremcommunity sshd\[10529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.21.130.106
...
2019-08-07 14:34:09
112.242.151.117 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-07 14:22:21
149.202.170.60 attackspam
Automatic report - Banned IP Access
2019-08-07 14:17:07
37.59.189.19 attack
Aug  7 08:27:33 ubuntu-2gb-nbg1-dc3-1 sshd[27046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.189.19
Aug  7 08:27:34 ubuntu-2gb-nbg1-dc3-1 sshd[27046]: Failed password for invalid user zfn from 37.59.189.19 port 35686 ssh2
...
2019-08-07 14:49:26

Recently Reported IPs

105.254.86.97 105.254.180.199 105.254.10.188 105.254.101.167
105.254.65.241 105.253.2.222 105.253.217.61 105.254.221.72
105.255.1.229 105.254.19.101 105.253.70.235 105.254.141.19
105.254.92.76 105.253.194.105 105.253.34.253 105.253.183.54
105.253.235.158 105.255.115.45 105.254.104.7 105.253.97.218