Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.49.122.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.49.122.152.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092002 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 21 13:52:57 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 152.122.49.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.122.49.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.28.177.29 attack
Sep  8 15:31:46 webhost01 sshd[15412]: Failed password for root from 129.28.177.29 port 54482 ssh2
...
2020-09-08 19:26:39
164.68.111.62 attackbotsspam
WordPress XMLRPC scan :: 164.68.111.62 1.664 - [08/Sep/2020:11:05:45  0000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 503 18231 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-09-08 19:16:44
192.232.253.241 attackspam
Hacking Attempt (Website Honeypot)
2020-09-08 18:58:40
51.68.139.151 attackbots
Sep  8 12:22:30 nextcloud sshd\[11738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.139.151  user=root
Sep  8 12:22:33 nextcloud sshd\[11738\]: Failed password for root from 51.68.139.151 port 55898 ssh2
Sep  8 12:22:35 nextcloud sshd\[11738\]: Failed password for root from 51.68.139.151 port 55898 ssh2
2020-09-08 19:01:38
121.145.78.129 attack
Time:     Tue Sep  8 11:47:09 2020 +0200
IP:       121.145.78.129 (KR/South Korea/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  8 11:39:24 mail-03 sshd[23288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.145.78.129  user=root
Sep  8 11:39:26 mail-03 sshd[23288]: Failed password for root from 121.145.78.129 port 38522 ssh2
Sep  8 11:43:37 mail-03 sshd[23348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.145.78.129  user=root
Sep  8 11:43:39 mail-03 sshd[23348]: Failed password for root from 121.145.78.129 port 50396 ssh2
Sep  8 11:47:07 mail-03 sshd[23449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.145.78.129  user=root
2020-09-08 18:47:03
175.6.108.213 attackspam
SIP/5060 Probe, BF, Hack -
2020-09-08 19:05:37
210.22.78.74 attackbotsspam
2020-09-08T12:43:29.815015afi-git.jinr.ru sshd[15575]: Failed password for root from 210.22.78.74 port 29888 ssh2
2020-09-08T12:47:04.955367afi-git.jinr.ru sshd[16657]: Invalid user ms from 210.22.78.74 port 44736
2020-09-08T12:47:04.959147afi-git.jinr.ru sshd[16657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.22.78.74
2020-09-08T12:47:04.955367afi-git.jinr.ru sshd[16657]: Invalid user ms from 210.22.78.74 port 44736
2020-09-08T12:47:06.588944afi-git.jinr.ru sshd[16657]: Failed password for invalid user ms from 210.22.78.74 port 44736 ssh2
...
2020-09-08 18:54:44
45.61.136.146 attack
 TCP (SYN) 45.61.136.146:50918 -> port 13389, len 44
2020-09-08 18:50:42
222.179.101.18 attackspam
20/9/8@02:20:50: FAIL: IoT-SSH address from=222.179.101.18
...
2020-09-08 18:49:35
116.196.81.216 attack
$f2bV_matches
2020-09-08 18:59:05
183.98.42.232 attack
Sep  7 17:58:01 v26 sshd[30733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.98.42.232  user=r.r
Sep  7 17:58:03 v26 sshd[30733]: Failed password for r.r from 183.98.42.232 port 54254 ssh2
Sep  7 17:58:03 v26 sshd[30733]: Received disconnect from 183.98.42.232 port 54254:11: Bye Bye [preauth]
Sep  7 17:58:03 v26 sshd[30733]: Disconnected from 183.98.42.232 port 54254 [preauth]
Sep  7 17:58:57 v26 sshd[30843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.98.42.232  user=r.r
Sep  7 17:59:00 v26 sshd[30843]: Failed password for r.r from 183.98.42.232 port 53214 ssh2
Sep  7 17:59:00 v26 sshd[30843]: Received disconnect from 183.98.42.232 port 53214:11: Bye Bye [preauth]
Sep  7 17:59:00 v26 sshd[30843]: Disconnected from 183.98.42.232 port 53214 [preauth]
Sep  7 17:59:33 v26 sshd[30903]: Invalid user nocWF from 183.98.42.232 port 42364
Sep  7 17:59:33 v26 sshd[30903]: pam_unix(sshd........
-------------------------------
2020-09-08 19:00:48
200.93.102.106 attackspambots
Unauthorized connection attempt from IP address 200.93.102.106 on Port 445(SMB)
2020-09-08 19:27:22
217.182.205.27 attack
Sep  8 12:41:49 srv-ubuntu-dev3 sshd[130127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27  user=root
Sep  8 12:41:50 srv-ubuntu-dev3 sshd[130127]: Failed password for root from 217.182.205.27 port 53580 ssh2
Sep  8 12:45:04 srv-ubuntu-dev3 sshd[130450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27  user=root
Sep  8 12:45:06 srv-ubuntu-dev3 sshd[130450]: Failed password for root from 217.182.205.27 port 58324 ssh2
Sep  8 12:48:26 srv-ubuntu-dev3 sshd[130864]: Invalid user tester from 217.182.205.27
Sep  8 12:48:26 srv-ubuntu-dev3 sshd[130864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27
Sep  8 12:48:26 srv-ubuntu-dev3 sshd[130864]: Invalid user tester from 217.182.205.27
Sep  8 12:48:28 srv-ubuntu-dev3 sshd[130864]: Failed password for invalid user tester from 217.182.205.27 port 34860 ssh2
Sep  8 12:51:43 srv-ubu
...
2020-09-08 19:05:14
85.11.154.212 attack
2020-09-07 18:47:14 1kFKIT-000078-MT SMTP connection from \(85-11-154-212.sofianet.net\) \[85.11.154.212\]:31416 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-09-07 18:47:22 1kFKIb-00007J-P1 SMTP connection from \(85-11-154-212.sofianet.net\) \[85.11.154.212\]:31526 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-09-07 18:47:26 1kFKIf-00007T-UU SMTP connection from \(85-11-154-212.sofianet.net\) \[85.11.154.212\]:31581 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-09-08 18:51:25
206.253.167.195 attack
Sep  8 10:43:09 ovpn sshd\[15540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.253.167.195  user=root
Sep  8 10:43:11 ovpn sshd\[15540\]: Failed password for root from 206.253.167.195 port 60964 ssh2
Sep  8 10:54:57 ovpn sshd\[18485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.253.167.195  user=root
Sep  8 10:54:59 ovpn sshd\[18485\]: Failed password for root from 206.253.167.195 port 38712 ssh2
Sep  8 10:59:14 ovpn sshd\[19557\]: Invalid user user02 from 206.253.167.195
Sep  8 10:59:14 ovpn sshd\[19557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.253.167.195
2020-09-08 19:15:17

Recently Reported IPs

193.31.117.108 54.36.150.82 84.16.109.113 217.61.5.122
83.164.2.13 145.111.115.163 111.27.35.222 116.0.148.155
96.249.212.121 225.238.165.37 228.161.246.41 25.5.208.239
138.37.64.148 254.95.40.147 129.160.47.244 171.250.94.184
15.217.254.224 248.0.173.222 87.211.155.16 250.193.11.21