Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.116.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.116.210.		IN	A

;; AUTHORITY SECTION:
.			401	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:15:35 CST 2022
;; MSG SIZE  rcvd: 108
Host info
210.116.213.105.in-addr.arpa domain name pointer 105-213-116-210.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
210.116.213.105.in-addr.arpa	name = 105-213-116-210.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.139.245.70 attackspam
Invalid user r00t from 222.139.245.70 port 47439
2020-08-25 23:30:37
206.189.190.27 attack
Invalid user oracle from 206.189.190.27 port 49968
2020-08-25 22:55:58
49.233.254.253 attackbots
Invalid user ubuntu from 49.233.254.253 port 42814
2020-08-25 23:28:07
62.210.136.231 attackbots
Aug 25 08:34:07 george sshd[12293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.231  user=mysql
Aug 25 08:34:08 george sshd[12293]: Failed password for mysql from 62.210.136.231 port 39586 ssh2
Aug 25 08:37:57 george sshd[12315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.231  user=root
Aug 25 08:37:59 george sshd[12315]: Failed password for root from 62.210.136.231 port 47856 ssh2
Aug 25 08:41:42 george sshd[12450]: Invalid user ari from 62.210.136.231 port 56128
...
2020-08-25 23:24:04
161.35.49.31 attackbotsspam
Aug 25 18:01:31 ift sshd\[13620\]: Failed password for root from 161.35.49.31 port 41886 ssh2Aug 25 18:01:42 ift sshd\[13646\]: Invalid user oracle from 161.35.49.31Aug 25 18:01:44 ift sshd\[13646\]: Failed password for invalid user oracle from 161.35.49.31 port 39162 ssh2Aug 25 18:01:57 ift sshd\[13651\]: Failed password for root from 161.35.49.31 port 36546 ssh2Aug 25 18:02:07 ift sshd\[13660\]: Invalid user postgres from 161.35.49.31
...
2020-08-25 23:03:35
90.91.95.105 attackbots
Invalid user pi from 90.91.95.105 port 33102
2020-08-25 23:21:26
68.104.240.238 attackbotsspam
Invalid user admin from 68.104.240.238 port 49896
2020-08-25 23:23:16
111.229.1.180 attackbots
Invalid user aurelien from 111.229.1.180 port 4010
2020-08-25 23:16:14
35.187.233.244 attack
Invalid user zhongfu from 35.187.233.244 port 54610
2020-08-25 22:53:33
51.38.188.101 attack
Aug 25 15:39:02 vps333114 sshd[20526]: Failed password for root from 51.38.188.101 port 56416 ssh2
Aug 25 15:47:03 vps333114 sshd[20769]: Invalid user juancarlos from 51.38.188.101
...
2020-08-25 22:51:51
132.232.112.96 attackspambots
Invalid user test from 132.232.112.96 port 43726
2020-08-25 23:09:20
52.188.69.174 attackspam
Invalid user ralf from 52.188.69.174 port 37420
2020-08-25 23:26:59
39.109.116.129 attack
Invalid user postgres from 39.109.116.129 port 52582
2020-08-25 23:29:28
103.28.114.101 attack
Aug 25 16:47:29 marvibiene sshd[4955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.114.101 
Aug 25 16:47:31 marvibiene sshd[4955]: Failed password for invalid user jerome from 103.28.114.101 port 51460 ssh2
Aug 25 16:58:05 marvibiene sshd[5486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.114.101
2020-08-25 23:20:40
66.70.150.153 attack
SSH invalid-user multiple login try
2020-08-25 23:23:46

Recently Reported IPs

105.213.116.229 105.213.116.21 105.213.116.231 105.213.116.32
105.213.116.243 105.213.116.55 105.213.116.57 105.213.116.71
105.213.117.116 221.233.101.172 105.213.126.62 105.213.130.75
105.213.125.21 105.213.141.16 105.213.141.184 105.213.141.75
105.213.140.48 105.213.140.36 105.213.140.78 105.213.140.72