Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.102.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.102.132.		IN	A

;; AUTHORITY SECTION:
.			367	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 13:58:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
132.102.213.105.in-addr.arpa domain name pointer 105-213-102-132.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.102.213.105.in-addr.arpa	name = 105-213-102-132.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.202.11.98 attackspambots
Fail2Ban Ban Triggered
2019-09-25 06:41:09
134.91.177.14 attackbots
Sep 25 01:39:58 www2 sshd\[14973\]: Invalid user postgres from 134.91.177.14Sep 25 01:40:00 www2 sshd\[14973\]: Failed password for invalid user postgres from 134.91.177.14 port 40590 ssh2Sep 25 01:44:10 www2 sshd\[15518\]: Invalid user cribb from 134.91.177.14
...
2019-09-25 06:55:47
221.215.204.211 attackspam
Fail2Ban Ban Triggered
2019-09-25 06:40:09
61.133.232.254 attack
$f2bV_matches
2019-09-25 06:46:11
222.186.42.117 attackspam
SSH-BruteForce
2019-09-25 06:38:53
103.89.88.64 attackbotsspam
Scan or attack attempt on email service.
2019-09-25 06:53:30
104.248.68.88 attackspam
miraniessen.de 104.248.68.88 \[24/Sep/2019:23:15:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 5972 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
miraniessen.de 104.248.68.88 \[24/Sep/2019:23:15:50 +0200\] "POST /wp-login.php HTTP/1.1" 200 5976 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-25 07:02:40
82.196.4.46 attackbots
Sep 25 00:11:45 localhost sshd\[7135\]: Invalid user hui from 82.196.4.46
Sep 25 00:11:45 localhost sshd\[7135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.46
Sep 25 00:11:47 localhost sshd\[7135\]: Failed password for invalid user hui from 82.196.4.46 port 56958 ssh2
Sep 25 00:15:35 localhost sshd\[7350\]: Invalid user lmx from 82.196.4.46
Sep 25 00:15:35 localhost sshd\[7350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.46
...
2019-09-25 06:59:10
60.51.22.248 attackbots
1588/tcp
[2019-09-24]1pkt
2019-09-25 06:50:07
61.250.149.222 attackspam
Sep 24 12:48:20 web1 sshd\[766\]: Invalid user marisa from 61.250.149.222
Sep 24 12:48:20 web1 sshd\[766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.149.222
Sep 24 12:48:23 web1 sshd\[766\]: Failed password for invalid user marisa from 61.250.149.222 port 44075 ssh2
Sep 24 12:53:29 web1 sshd\[1299\]: Invalid user marek from 61.250.149.222
Sep 24 12:53:29 web1 sshd\[1299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.149.222
2019-09-25 06:59:22
92.118.37.74 attackbotsspam
Sep 25 00:40:49 mc1 kernel: \[651293.550327\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=6043 PROTO=TCP SPT=46525 DPT=32040 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 25 00:42:32 mc1 kernel: \[651396.706954\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=30394 PROTO=TCP SPT=46525 DPT=54456 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 25 00:42:39 mc1 kernel: \[651403.330380\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=43671 PROTO=TCP SPT=46525 DPT=41683 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-25 06:45:28
82.64.140.9 attack
Automatic report - Banned IP Access
2019-09-25 07:00:08
222.186.31.145 attackspam
2019-09-24T22:49:11.776293abusebot-4.cloudsearch.cf sshd\[3442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.145  user=root
2019-09-25 06:54:03
118.32.165.111 attackspam
Netgear DGN Device Remote Command Execution Vulnerability
2019-09-25 07:05:07
5.135.179.178 attackspambots
Sep 25 00:23:09 dedicated sshd[25625]: Invalid user florin from 5.135.179.178 port 5817
2019-09-25 06:29:46

Recently Reported IPs

104.22.12.18 104.22.12.65 104.22.12.76 104.22.12.202
104.22.13.185 104.22.13.123 104.22.13.18 104.22.13.146
105.213.102.143 104.22.26.201 104.22.25.249 104.22.25.254
104.22.26.67 104.22.26.122 104.22.26.176 104.22.25.99
104.22.26.180 104.22.26.209 104.22.27.209 105.213.102.150