Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.105.104.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.105.104.165.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:55:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
165.104.105.2.in-addr.arpa domain name pointer 2-105-104-165-dynamic.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
165.104.105.2.in-addr.arpa	name = 2-105-104-165-dynamic.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.211.72.48 attackspambots
Invalid user yixin from 129.211.72.48 port 35328
2020-08-02 15:45:23
139.59.146.28 attackbotsspam
139.59.146.28 - - [02/Aug/2020:08:20:01 +0200] "POST /xmlrpc.php HTTP/1.1" 403 207343 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.146.28 - - [02/Aug/2020:08:43:08 +0200] "POST /xmlrpc.php HTTP/1.1" 403 9972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-02 16:00:57
122.100.125.125 attackspam
Unauthorized connection attempt detected from IP address 122.100.125.125 to port 80
2020-08-02 15:59:32
141.98.9.157 attackspambots
2020-08-02T08:01:24.358970abusebot-7.cloudsearch.cf sshd[2590]: Invalid user admin from 141.98.9.157 port 36491
2020-08-02T08:01:24.363819abusebot-7.cloudsearch.cf sshd[2590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
2020-08-02T08:01:24.358970abusebot-7.cloudsearch.cf sshd[2590]: Invalid user admin from 141.98.9.157 port 36491
2020-08-02T08:01:26.330234abusebot-7.cloudsearch.cf sshd[2590]: Failed password for invalid user admin from 141.98.9.157 port 36491 ssh2
2020-08-02T08:01:44.744743abusebot-7.cloudsearch.cf sshd[2604]: Invalid user test from 141.98.9.157 port 43135
2020-08-02T08:01:44.748953abusebot-7.cloudsearch.cf sshd[2604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
2020-08-02T08:01:44.744743abusebot-7.cloudsearch.cf sshd[2604]: Invalid user test from 141.98.9.157 port 43135
2020-08-02T08:01:46.459668abusebot-7.cloudsearch.cf sshd[2604]: Failed password for inv
...
2020-08-02 16:04:02
113.23.16.229 attack
xmlrpc attack
2020-08-02 16:24:42
139.162.113.212 attackspambots
firewall-block, port(s): 25/tcp
2020-08-02 16:23:12
218.161.86.209 attackspambots
" "
2020-08-02 16:01:49
106.75.52.43 attackspam
Aug  2 08:31:50 h2646465 sshd[25022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.52.43  user=root
Aug  2 08:31:51 h2646465 sshd[25022]: Failed password for root from 106.75.52.43 port 39050 ssh2
Aug  2 08:48:31 h2646465 sshd[27503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.52.43  user=root
Aug  2 08:48:33 h2646465 sshd[27503]: Failed password for root from 106.75.52.43 port 57820 ssh2
Aug  2 08:53:20 h2646465 sshd[28270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.52.43  user=root
Aug  2 08:53:22 h2646465 sshd[28270]: Failed password for root from 106.75.52.43 port 46036 ssh2
Aug  2 08:58:10 h2646465 sshd[28976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.52.43  user=root
Aug  2 08:58:11 h2646465 sshd[28976]: Failed password for root from 106.75.52.43 port 34256 ssh2
Aug  2 09:03:00 h2646465 sshd[30130]
2020-08-02 16:04:24
167.88.179.84 attackbots
Port Scan
...
2020-08-02 15:57:41
145.239.11.166 attackspambots
SIP Server BruteForce Attack
2020-08-02 16:03:40
114.34.233.190 attack
1596340258 - 08/02/2020 05:50:58 Host: 114.34.233.190/114.34.233.190 Port: 8080 TCP Blocked
2020-08-02 15:48:46
67.68.120.95 attackspam
(sshd) Failed SSH login from 67.68.120.95 (CA/Canada/shbkpq4068w-lp140-01-67-68-120-95.dsl.bell.ca): 10 in the last 3600 secs
2020-08-02 15:53:36
46.101.103.207 attackspam
$f2bV_matches
2020-08-02 15:44:30
187.142.68.214 attack
20/8/2@00:43:49: FAIL: Alarm-Network address from=187.142.68.214
20/8/2@00:43:49: FAIL: Alarm-Network address from=187.142.68.214
...
2020-08-02 15:39:16
222.186.61.19 attackbots
 TCP (SYN) 222.186.61.19:35743 -> port 7777, len 44
2020-08-02 16:16:01

Recently Reported IPs

185.161.88.223 130.126.183.68 56.165.20.232 240.75.65.22
185.209.119.185 9.95.18.183 101.109.79.0 176.116.57.37
210.208.158.8 233.125.81.78 149.82.187.196 28.152.80.225
107.155.8.221 239.82.193.245 85.181.210.44 206.150.41.93
118.62.248.229 49.119.179.155 65.117.72.183 217.251.53.5