Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.211.199.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.211.199.140.		IN	A

;; AUTHORITY SECTION:
.			162	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:30:17 CST 2023
;; MSG SIZE  rcvd: 108
Host info
140.199.211.105.in-addr.arpa domain name pointer 105-211-199-140.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.199.211.105.in-addr.arpa	name = 105-211-199-140.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
152.32.72.37 attack
Icarus honeypot on github
2020-09-11 03:07:49
111.161.72.99 attack
2020-09-09 UTC: (2x) - teacher(2x)
2020-09-11 03:11:28
45.187.152.19 attackspambots
Sep 10 19:03:05 ns3164893 sshd[26094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.187.152.19  user=root
Sep 10 19:03:07 ns3164893 sshd[26094]: Failed password for root from 45.187.152.19 port 52448 ssh2
...
2020-09-11 02:51:42
112.85.42.102 attack
Sep 10 18:48:01 rush sshd[27078]: Failed password for root from 112.85.42.102 port 61910 ssh2
Sep 10 18:48:03 rush sshd[27078]: Failed password for root from 112.85.42.102 port 61910 ssh2
Sep 10 18:48:06 rush sshd[27078]: Failed password for root from 112.85.42.102 port 61910 ssh2
...
2020-09-11 02:52:29
111.229.93.104 attackbots
Sep 10 20:33:09  sshd\[11523\]: Invalid user x2 from 111.229.93.104Sep 10 20:33:11  sshd\[11523\]: Failed password for invalid user x2 from 111.229.93.104 port 35158 ssh2
...
2020-09-11 02:34:18
106.52.55.146 attackbots
2020-09-09T20:49:51.172186yoshi.linuxbox.ninja sshd[3979841]: Failed password for invalid user nx from 106.52.55.146 port 50294 ssh2
2020-09-09T20:53:49.241455yoshi.linuxbox.ninja sshd[3982213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.55.146  user=root
2020-09-09T20:53:50.833003yoshi.linuxbox.ninja sshd[3982213]: Failed password for root from 106.52.55.146 port 36090 ssh2
...
2020-09-11 02:40:12
157.245.117.187 attack
157.245.117.187 Multiple Bad Request error 400...
2020-09-11 02:31:33
185.234.218.84 attack
Sep 10 17:00:43 mail postfix/smtpd\[6220\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 10 17:38:48 mail postfix/smtpd\[7112\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 10 18:18:46 mail postfix/smtpd\[9017\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 10 18:59:32 mail postfix/smtpd\[10497\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-11 03:21:42
167.99.96.114 attack
Sep 10 19:20:13 MainVPS sshd[15439]: Invalid user adsl from 167.99.96.114 port 49670
Sep 10 19:20:13 MainVPS sshd[15439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.96.114
Sep 10 19:20:13 MainVPS sshd[15439]: Invalid user adsl from 167.99.96.114 port 49670
Sep 10 19:20:15 MainVPS sshd[15439]: Failed password for invalid user adsl from 167.99.96.114 port 49670 ssh2
Sep 10 19:23:50 MainVPS sshd[25553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.96.114  user=root
Sep 10 19:23:52 MainVPS sshd[25553]: Failed password for root from 167.99.96.114 port 53788 ssh2
...
2020-09-11 03:13:49
43.229.153.81 attack
Sep  9 19:39:37 mavik sshd[18238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.81  user=root
Sep  9 19:39:39 mavik sshd[18238]: Failed password for root from 43.229.153.81 port 52896 ssh2
Sep  9 19:44:09 mavik sshd[18376]: Invalid user wartex from 43.229.153.81
Sep  9 19:44:09 mavik sshd[18376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.81
Sep  9 19:44:11 mavik sshd[18376]: Failed password for invalid user wartex from 43.229.153.81 port 52034 ssh2
...
2020-09-11 02:29:43
111.229.142.192 attack
2020-09-10T18:32:24+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-11 02:50:26
222.249.235.234 attackspam
Sep 10 10:40:15 root sshd[30952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.249.235.234 
...
2020-09-11 02:33:47
49.235.209.206 attackbotsspam
fail2ban detected brute force on sshd
2020-09-11 03:03:26
164.52.24.164 attackspam
 TCP (SYN) 164.52.24.164:33766 -> port 22, len 44
2020-09-11 03:11:12
2a03:2880:30ff::face:b00c attack
Fail2Ban Ban Triggered
2020-09-11 03:15:32

Recently Reported IPs

105.211.118.213 105.211.121.115 105.211.87.60 105.211.134.244
105.211.236.137 105.211.201.36 105.211.68.216 105.211.126.158
105.212.133.45 105.211.11.112 105.211.55.15 105.211.75.160
105.211.176.84 105.211.206.195 105.211.205.228 105.210.96.72
105.211.82.10 105.211.154.179 105.211.19.93 105.210.76.35