Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.106.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.106.207.		IN	A

;; AUTHORITY SECTION:
.			224	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:44:49 CST 2022
;; MSG SIZE  rcvd: 108
Host info
207.106.213.105.in-addr.arpa domain name pointer 105-213-106-207.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.106.213.105.in-addr.arpa	name = 105-213-106-207.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.52.164.10 attackspambots
Jul  7 17:28:58 dhoomketu sshd[1349756]: Failed password for invalid user bernd from 116.52.164.10 port 18056 ssh2
Jul  7 17:30:50 dhoomketu sshd[1349812]: Invalid user test from 116.52.164.10 port 30564
Jul  7 17:30:50 dhoomketu sshd[1349812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.52.164.10 
Jul  7 17:30:50 dhoomketu sshd[1349812]: Invalid user test from 116.52.164.10 port 30564
Jul  7 17:30:51 dhoomketu sshd[1349812]: Failed password for invalid user test from 116.52.164.10 port 30564 ssh2
...
2020-07-07 22:56:06
122.35.120.59 attackspambots
$f2bV_matches
2020-07-07 23:28:40
117.196.238.230 attack
Unauthorized connection attempt from IP address 117.196.238.230 on Port 445(SMB)
2020-07-07 23:13:34
222.186.30.112 attack
$f2bV_matches
2020-07-07 23:26:05
202.72.243.198 attackspam
2020-07-07T18:49:09.581045hostname sshd[7143]: Failed password for invalid user aman from 202.72.243.198 port 40258 ssh2
...
2020-07-07 23:00:26
103.66.15.237 attackbotsspam
Scanning an empty webserver with deny all robots.txt
2020-07-07 23:11:18
192.241.222.47 attackspam
firewall-block, port(s): 9042/tcp
2020-07-07 23:22:44
5.188.210.18 attackspam
Automatic report - Banned IP Access
2020-07-07 23:31:32
192.3.247.10 attack
2020-07-07T16:07:40.598816afi-git.jinr.ru sshd[19303]: Failed password for root from 192.3.247.10 port 35248 ssh2
2020-07-07T16:08:28.802091afi-git.jinr.ru sshd[19471]: Invalid user demo from 192.3.247.10 port 46264
2020-07-07T16:08:28.805395afi-git.jinr.ru sshd[19471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.247.10
2020-07-07T16:08:28.802091afi-git.jinr.ru sshd[19471]: Invalid user demo from 192.3.247.10 port 46264
2020-07-07T16:08:30.803707afi-git.jinr.ru sshd[19471]: Failed password for invalid user demo from 192.3.247.10 port 46264 ssh2
...
2020-07-07 22:59:30
93.174.93.31 attack
Port scan on 13 port(s): 3080 3115 3188 3284 3303 3349 3380 3566 3578 3592 3643 3807 3941
2020-07-07 23:02:06
51.195.62.230 attackbots
Trying ports that it shouldn't be.
2020-07-07 23:39:32
5.188.206.194 attackbots
Jul  7 18:22:29 takio postfix/smtpd[27924]: lost connection after AUTH from unknown[5.188.206.194]
Jul  7 18:22:40 takio postfix/smtpd[27924]: lost connection after AUTH from unknown[5.188.206.194]
Jul  7 18:22:53 takio postfix/smtpd[27935]: lost connection after AUTH from unknown[5.188.206.194]
2020-07-07 23:35:54
14.186.13.84 attackspam
Unauthorized IMAP connection attempt
2020-07-07 23:34:09
193.228.91.109 attackspam
Unauthorized connection attempt detected from IP address 193.228.91.109 to port 22
2020-07-07 23:20:37
40.79.25.254 attack
$f2bV_matches
2020-07-07 22:57:11

Recently Reported IPs

105.213.106.170 105.213.106.199 105.213.106.234 105.213.106.209
105.213.106.232 105.213.106.32 101.132.108.25 105.213.106.40
105.213.106.224 105.213.106.31 105.213.106.48 105.213.106.55
105.213.106.61 105.213.106.72 105.213.106.95 105.213.107.101
105.213.107.110 105.213.107.113 105.213.107.13 101.132.108.33