Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.116.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.116.57.			IN	A

;; AUTHORITY SECTION:
.			269	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:15:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
57.116.213.105.in-addr.arpa domain name pointer 105-213-116-57.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.116.213.105.in-addr.arpa	name = 105-213-116-57.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.41.139.134 attackbots
Sep 15 01:54:29 xeon sshd[30759]: Failed password for root from 46.41.139.134 port 45512 ssh2
2020-09-15 12:45:24
51.83.132.89 attackspam
2020-09-15T05:23:29+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-15 12:23:25
74.72.192.179 attackspam
Sep 15 03:08:39 root sshd[29278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-74-72-192-179.nyc.res.rr.com  user=root
Sep 15 03:08:40 root sshd[29278]: Failed password for root from 74.72.192.179 port 56139 ssh2
...
2020-09-15 12:51:09
104.208.155.75 attackbotsspam
URL Probing: /en/home/wp-includes/wlwmanifest.xml
2020-09-15 12:22:33
141.98.9.166 attack
Sep 15 06:54:34 inter-technics sshd[6138]: Invalid user admin from 141.98.9.166 port 44255
Sep 15 06:54:34 inter-technics sshd[6138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.166
Sep 15 06:54:34 inter-technics sshd[6138]: Invalid user admin from 141.98.9.166 port 44255
Sep 15 06:54:36 inter-technics sshd[6138]: Failed password for invalid user admin from 141.98.9.166 port 44255 ssh2
Sep 15 06:54:51 inter-technics sshd[6190]: Invalid user ubnt from 141.98.9.166 port 33543
...
2020-09-15 12:56:08
116.236.60.114 attackspambots
20 attempts against mh-ssh on star
2020-09-15 12:26:17
193.203.214.158 attackspam
Sep 14 23:51:37 l02a sshd[26240]: Invalid user robert from 193.203.214.158
Sep 14 23:51:37 l02a sshd[26240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.203.214.158 
Sep 14 23:51:37 l02a sshd[26240]: Invalid user robert from 193.203.214.158
Sep 14 23:51:39 l02a sshd[26240]: Failed password for invalid user robert from 193.203.214.158 port 44700 ssh2
2020-09-15 12:46:40
5.79.239.130 attackbots
20/9/14@13:00:09: FAIL: Alarm-Network address from=5.79.239.130
...
2020-09-15 12:53:45
159.65.131.92 attackspambots
"Unauthorized connection attempt on SSHD detected"
2020-09-15 12:36:10
83.103.150.72 attack
Sep 15 05:32:01 nuernberg-4g-01 sshd[25293]: Failed password for root from 83.103.150.72 port 55554 ssh2
Sep 15 05:35:23 nuernberg-4g-01 sshd[26407]: Failed password for root from 83.103.150.72 port 54825 ssh2
2020-09-15 12:33:43
195.54.167.94 attackbotsspam
Port Scan
...
2020-09-15 12:23:52
78.72.123.217 attackspambots
Sep 14 19:02:48 ssh2 sshd[50875]: User root from 78-72-123-217-no2410.tbcn.telia.com not allowed because not listed in AllowUsers
Sep 14 19:02:48 ssh2 sshd[50875]: Failed password for invalid user root from 78.72.123.217 port 56570 ssh2
Sep 14 19:02:48 ssh2 sshd[50875]: Connection closed by invalid user root 78.72.123.217 port 56570 [preauth]
...
2020-09-15 12:50:57
183.230.248.88 attack
Automatic report - Banned IP Access
2020-09-15 12:44:33
217.111.239.37 attack
Sep 15 00:08:16 vps46666688 sshd[30090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.111.239.37
Sep 15 00:08:18 vps46666688 sshd[30090]: Failed password for invalid user dev from 217.111.239.37 port 49802 ssh2
...
2020-09-15 12:50:01
23.101.183.9 attackspambots
2020-09-15T06:59:26.836427afi-git.jinr.ru sshd[26131]: Failed password for invalid user alan from 23.101.183.9 port 45668 ssh2
2020-09-15T07:03:09.872110afi-git.jinr.ru sshd[27256]: Invalid user alina from 23.101.183.9 port 46852
2020-09-15T07:03:09.875426afi-git.jinr.ru sshd[27256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.183.9
2020-09-15T07:03:09.872110afi-git.jinr.ru sshd[27256]: Invalid user alina from 23.101.183.9 port 46852
2020-09-15T07:03:11.187378afi-git.jinr.ru sshd[27256]: Failed password for invalid user alina from 23.101.183.9 port 46852 ssh2
...
2020-09-15 12:26:52

Recently Reported IPs

105.213.116.55 105.213.116.71 105.213.117.116 221.233.101.172
105.213.126.62 105.213.130.75 105.213.125.21 105.213.141.16
105.213.141.184 105.213.141.75 105.213.140.48 105.213.140.36
105.213.140.78 105.213.140.72 105.213.140.70 105.213.141.35
105.213.141.57 105.213.140.91 105.213.142.109 105.213.142.116