Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.13.113.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.13.113.70.			IN	A

;; AUTHORITY SECTION:
.			352	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:04:08 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 70.113.13.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.113.13.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.88.44 attackspam
Mar  6 09:26:39 ip-172-31-62-245 sshd\[429\]: Invalid user amanda from 106.13.88.44\
Mar  6 09:26:41 ip-172-31-62-245 sshd\[429\]: Failed password for invalid user amanda from 106.13.88.44 port 41764 ssh2\
Mar  6 09:29:57 ip-172-31-62-245 sshd\[488\]: Invalid user sinus from 106.13.88.44\
Mar  6 09:30:00 ip-172-31-62-245 sshd\[488\]: Failed password for invalid user sinus from 106.13.88.44 port 47358 ssh2\
Mar  6 09:31:25 ip-172-31-62-245 sshd\[515\]: Invalid user teamspeak from 106.13.88.44\
2020-03-06 17:50:45
170.250.10.20 attackspambots
sshd jail - ssh hack attempt
2020-03-06 18:27:40
195.154.87.159 attack
xmlrpc attack
2020-03-06 18:27:12
86.123.118.169 attackspam
Automatic report - Port Scan Attack
2020-03-06 17:53:53
13.228.75.161 attackspambots
Mar  5 22:48:37 hanapaa sshd\[27822\]: Invalid user nginx from 13.228.75.161
Mar  5 22:48:37 hanapaa sshd\[27822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-13-228-75-161.ap-southeast-1.compute.amazonaws.com
Mar  5 22:48:39 hanapaa sshd\[27822\]: Failed password for invalid user nginx from 13.228.75.161 port 46683 ssh2
Mar  5 22:52:46 hanapaa sshd\[28144\]: Invalid user ldapuser from 13.228.75.161
Mar  5 22:52:46 hanapaa sshd\[28144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-13-228-75-161.ap-southeast-1.compute.amazonaws.com
2020-03-06 18:09:38
185.2.140.155 attackspam
Mar  6 01:36:44 mockhub sshd[1505]: Failed password for root from 185.2.140.155 port 49548 ssh2
...
2020-03-06 17:57:28
206.81.12.242 attack
Mar  6 10:00:55 takio sshd[2891]: Invalid user ubuntu from 206.81.12.242 port 47392
Mar  6 10:04:08 takio sshd[2921]: Invalid user oracle from 206.81.12.242 port 45184
Mar  6 10:07:23 takio sshd[2931]: Invalid user ftpuser from 206.81.12.242 port 42970
2020-03-06 17:50:33
41.32.252.164 attackbots
2020-03-06T04:51:56.012163abusebot-6.cloudsearch.cf sshd[25786]: Invalid user admin from 41.32.252.164 port 45727
2020-03-06T04:51:56.021111abusebot-6.cloudsearch.cf sshd[25786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.32.252.164
2020-03-06T04:51:56.012163abusebot-6.cloudsearch.cf sshd[25786]: Invalid user admin from 41.32.252.164 port 45727
2020-03-06T04:51:57.293479abusebot-6.cloudsearch.cf sshd[25786]: Failed password for invalid user admin from 41.32.252.164 port 45727 ssh2
2020-03-06T04:51:59.204046abusebot-6.cloudsearch.cf sshd[25793]: Invalid user admin from 41.32.252.164 port 45740
2020-03-06T04:51:59.210492abusebot-6.cloudsearch.cf sshd[25793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.32.252.164
2020-03-06T04:51:59.204046abusebot-6.cloudsearch.cf sshd[25793]: Invalid user admin from 41.32.252.164 port 45740
2020-03-06T04:52:01.230545abusebot-6.cloudsearch.cf sshd[25793]: Failed
...
2020-03-06 18:09:10
124.235.171.114 attack
Repeated brute force against a port
2020-03-06 18:04:28
115.73.211.145 attackspambots
20/3/5@23:52:23: FAIL: Alarm-Network address from=115.73.211.145
20/3/5@23:52:23: FAIL: Alarm-Network address from=115.73.211.145
...
2020-03-06 17:54:59
183.88.242.174 attackspam
unauthorized connection attempt
2020-03-06 17:54:32
63.82.48.35 attack
Email Subject: 'Wie kann man braten, ohne alles anzubrennen? Mit neuer Backplatte haftet nichts an'
2020-03-06 18:22:00
5.8.184.42 attack
Automatic report - Port Scan Attack
2020-03-06 18:03:43
86.35.37.186 attackbotsspam
SSH invalid-user multiple login attempts
2020-03-06 17:55:37
42.117.233.185 attackbots
Email rejected due to spam filtering
2020-03-06 17:51:33

Recently Reported IPs

105.173.23.129 105.129.35.186 105.129.187.0 105.13.114.147
105.129.233.123 105.129.44.124 105.129.181.109 105.129.39.31
105.129.174.244 105.129.163.57 105.129.225.173 105.129.230.2
105.129.176.51 105.129.32.121 105.129.146.153 105.129.192.26
105.129.126.121 105.129.143.231 105.129.139.239 105.129.160.120