Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.54.111.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.54.111.139.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 07:47:30 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.111.54.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.111.54.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.51.120.98 attackbotsspam
$f2bV_matches
2020-02-21 00:42:20
52.100.173.218 attack
TCP Port: 25      invalid blocked  spam-sorbs also backscatter and s5h-net           (230)
2020-02-21 00:28:17
158.174.78.152 attack
Feb 20 17:39:52 plex sshd[16420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.174.78.152  user=plex
Feb 20 17:39:54 plex sshd[16420]: Failed password for plex from 158.174.78.152 port 39650 ssh2
2020-02-21 00:56:01
35.196.8.137 attackspam
Feb 20 17:00:53 cp sshd[13918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.196.8.137
2020-02-21 01:00:30
109.194.111.198 attackbotsspam
Feb 20 11:46:48 plusreed sshd[29776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.111.198  user=games
Feb 20 11:46:50 plusreed sshd[29776]: Failed password for games from 109.194.111.198 port 56446 ssh2
...
2020-02-21 00:48:28
51.77.230.125 attack
Feb 20 16:15:08 plex sshd[15080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.230.125  user=bin
Feb 20 16:15:11 plex sshd[15080]: Failed password for bin from 51.77.230.125 port 39984 ssh2
2020-02-21 00:49:27
49.88.112.112 attackspam
Feb 20 17:40:02 dev0-dcde-rnet sshd[19102]: Failed password for root from 49.88.112.112 port 37664 ssh2
Feb 20 17:40:55 dev0-dcde-rnet sshd[19104]: Failed password for root from 49.88.112.112 port 60435 ssh2
2020-02-21 00:52:20
154.125.248.40 attackspam
Feb 20 06:47:43 scivo sshd[32440]: Invalid user confluence from 154.125.248.40
Feb 20 06:47:43 scivo sshd[32440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.125.248.40 
Feb 20 06:47:46 scivo sshd[32440]: Failed password for invalid user confluence from 154.125.248.40 port 42980 ssh2
Feb 20 06:47:46 scivo sshd[32440]: Received disconnect from 154.125.248.40: 11: Bye Bye [preauth]
Feb 20 07:01:59 scivo sshd[675]: Invalid user chenyang from 154.125.248.40
Feb 20 07:01:59 scivo sshd[675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.125.248.40 
Feb 20 07:02:01 scivo sshd[675]: Failed password for invalid user chenyang from 154.125.248.40 port 53885 ssh2
Feb 20 07:02:01 scivo sshd[675]: Received disconnect from 154.125.248.40: 11: Bye Bye [preauth]
Feb 20 07:04:27 scivo sshd[873]: Invalid user fdy from 154.125.248.40
Feb 20 07:04:27 scivo sshd[873]: pam_unix(sshd:auth): authentica........
-------------------------------
2020-02-21 00:19:02
51.75.27.230 attack
Feb 20 17:13:19 MK-Soft-Root2 sshd[9467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.27.230 
Feb 20 17:13:21 MK-Soft-Root2 sshd[9467]: Failed password for invalid user mssql from 51.75.27.230 port 54026 ssh2
...
2020-02-21 00:45:46
176.51.178.155 attackspambots
20/2/20@08:26:43: FAIL: Alarm-Network address from=176.51.178.155
20/2/20@08:26:43: FAIL: Alarm-Network address from=176.51.178.155
...
2020-02-21 01:01:31
201.190.175.60 attack
Automatic report - Port Scan Attack
2020-02-21 00:41:53
181.28.44.13 attackspam
scan z
2020-02-21 00:43:58
116.22.181.226 attackbots
2020-02-20T01:45:39.4362091495-001 sshd[19261]: Invalid user user12 from 116.22.181.226 port 16273
2020-02-20T01:45:39.4446341495-001 sshd[19261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.22.181.226
2020-02-20T01:45:39.4362091495-001 sshd[19261]: Invalid user user12 from 116.22.181.226 port 16273
2020-02-20T01:45:41.5028501495-001 sshd[19261]: Failed password for invalid user user12 from 116.22.181.226 port 16273 ssh2
2020-02-20T01:57:49.7555901495-001 sshd[20079]: Invalid user capture from 116.22.181.226 port 15084
2020-02-20T01:57:49.7638501495-001 sshd[20079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.22.181.226
2020-02-20T01:57:49.7555901495-001 sshd[20079]: Invalid user capture from 116.22.181.226 port 15084
2020-02-20T01:57:51.7017751495-001 sshd[20079]: Failed password for invalid user capture from 116.22.181.226 port 15084 ssh2
2020-02-20T02:01:30.4856251495-001 s........
------------------------------
2020-02-21 00:50:28
35.220.245.231 attackspam
Feb 20 16:43:40 mout sshd[15304]: Invalid user cpaneleximfilter from 35.220.245.231 port 55292
2020-02-21 00:52:39
36.66.210.115 attackspam
suspicious action Thu, 20 Feb 2020 10:27:16 -0300
2020-02-21 00:32:40

Recently Reported IPs

207.62.94.249 139.156.185.39 153.213.174.97 195.206.169.216
82.243.49.73 121.158.191.80 48.83.220.0 137.110.113.49
212.91.173.217 46.138.132.155 175.13.99.177 102.37.96.100
91.227.122.253 192.157.104.114 73.249.206.2 217.160.142.105
86.121.193.6 116.90.232.40 176.139.56.37 203.43.95.117