Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Algiers

Region: Alger

Country: Algeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.98.149.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.98.149.134.			IN	A

;; AUTHORITY SECTION:
.			78	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:31:24 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 134.149.98.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.149.98.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.2.33 attackspambots
Dec 22 00:58:21 v22018086721571380 sshd[21238]: Failed password for invalid user yamakoshi from 91.121.2.33 port 39921 ssh2
Dec 22 01:03:59 v22018086721571380 sshd[21490]: Failed password for invalid user gotit from 91.121.2.33 port 43126 ssh2
2019-12-22 08:29:31
52.6.12.150 attackbotsspam
Detected by Maltrail
2019-12-22 08:53:14
185.143.223.81 attack
Dec 22 00:57:12 h2177944 kernel: \[171429.886693\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=45381 PROTO=TCP SPT=59834 DPT=4442 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 22 00:57:12 h2177944 kernel: \[171429.886706\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=45381 PROTO=TCP SPT=59834 DPT=4442 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 22 01:09:10 h2177944 kernel: \[172148.120149\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=2726 PROTO=TCP SPT=59834 DPT=32622 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 22 01:09:10 h2177944 kernel: \[172148.120164\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=2726 PROTO=TCP SPT=59834 DPT=32622 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 22 01:12:22 h2177944 kernel: \[172339.443056\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9
2019-12-22 09:04:20
203.147.80.116 attackspam
failed_logins
2019-12-22 08:46:59
174.138.7.207 attackspam
Detected by Maltrail
2019-12-22 08:48:52
182.61.3.119 attackspambots
2019-12-22 01:38:52,903 fail2ban.actions: WARNING [ssh] Ban 182.61.3.119
2019-12-22 08:39:44
112.80.133.216 attack
Dec 22 01:56:44 server sshd\[1981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.80.133.216  user=root
Dec 22 01:56:46 server sshd\[1981\]: Failed password for root from 112.80.133.216 port 55968 ssh2
Dec 22 01:56:46 server sshd\[1982\]: Received disconnect from 112.80.133.216: 3: com.jcraft.jsch.JSchException: Auth fail
Dec 22 01:56:48 server sshd\[1989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.80.133.216  user=root
Dec 22 01:56:50 server sshd\[1989\]: Failed password for root from 112.80.133.216 port 56428 ssh2
...
2019-12-22 09:03:34
13.66.192.66 attackbotsspam
Dec 22 00:48:00 ArkNodeAT sshd\[15731\]: Invalid user aaa from 13.66.192.66
Dec 22 00:48:00 ArkNodeAT sshd\[15731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66
Dec 22 00:48:02 ArkNodeAT sshd\[15731\]: Failed password for invalid user aaa from 13.66.192.66 port 33468 ssh2
2019-12-22 08:58:18
62.212.88.246 attackbots
schuetzenmusikanten.de 62.212.88.246 [21/Dec/2019:23:57:14 +0100] "POST /wp-login.php HTTP/1.1" 200 6346 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 62.212.88.246 [21/Dec/2019:23:57:15 +0100] "POST /wp-login.php HTTP/1.1" 200 6316 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-22 08:34:06
197.82.202.98 attack
Dec 22 05:55:34 vibhu-HP-Z238-Microtower-Workstation sshd\[26763\]: Invalid user admin from 197.82.202.98
Dec 22 05:55:34 vibhu-HP-Z238-Microtower-Workstation sshd\[26763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.82.202.98
Dec 22 05:55:37 vibhu-HP-Z238-Microtower-Workstation sshd\[26763\]: Failed password for invalid user admin from 197.82.202.98 port 39446 ssh2
Dec 22 06:02:27 vibhu-HP-Z238-Microtower-Workstation sshd\[27045\]: Invalid user ot from 197.82.202.98
Dec 22 06:02:27 vibhu-HP-Z238-Microtower-Workstation sshd\[27045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.82.202.98
...
2019-12-22 08:44:06
120.36.2.217 attackbots
2019-12-21T23:54:52.238267hub.schaetter.us sshd\[12651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.36.2.217  user=root
2019-12-21T23:54:54.112283hub.schaetter.us sshd\[12651\]: Failed password for root from 120.36.2.217 port 34474 ssh2
2019-12-22T00:00:42.722554hub.schaetter.us sshd\[12700\]: Invalid user hsu from 120.36.2.217 port 28403
2019-12-22T00:00:42.734483hub.schaetter.us sshd\[12700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.36.2.217
2019-12-22T00:00:44.322688hub.schaetter.us sshd\[12700\]: Failed password for invalid user hsu from 120.36.2.217 port 28403 ssh2
...
2019-12-22 08:25:30
36.112.137.165 attack
Dec 22 01:30:47 MK-Soft-VM4 sshd[3659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.165 
Dec 22 01:30:48 MK-Soft-VM4 sshd[3659]: Failed password for invalid user test from 36.112.137.165 port 64131 ssh2
...
2019-12-22 08:34:51
77.42.83.158 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-22 08:57:58
177.36.8.226 attackspam
[munged]::443 177.36.8.226 - - [22/Dec/2019:00:18:37 +0100] "POST /[munged]: HTTP/1.1" 200 6093 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-22 08:27:29
206.189.37.55 attackspambots
Detected by Maltrail
2019-12-22 08:46:32

Recently Reported IPs

105.97.220.54 105.96.4.172 105.97.146.113 105.96.48.175
105.97.107.138 105.98.158.104 105.96.248.23 105.97.247.135
105.96.255.17 105.96.43.151 105.96.253.156 105.96.250.242
105.96.229.1 106.0.150.193 105.96.206.255 105.96.225.64
105.96.215.198 105.96.182.113 105.96.230.238 105.96.155.68