Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.123.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.123.9.			IN	A

;; AUTHORITY SECTION:
.			457	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:13:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
9.123.213.105.in-addr.arpa domain name pointer 105-213-123-9.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.123.213.105.in-addr.arpa	name = 105-213-123-9.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.232.151.240 attackbotsspam
Sep 29 05:51:35 v22018076622670303 sshd\[4153\]: Invalid user admin from 41.232.151.240 port 53975
Sep 29 05:51:35 v22018076622670303 sshd\[4153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.232.151.240
Sep 29 05:51:36 v22018076622670303 sshd\[4153\]: Failed password for invalid user admin from 41.232.151.240 port 53975 ssh2
...
2019-09-29 15:39:32
74.63.250.6 attackspam
Sep 29 09:41:26 localhost sshd\[19602\]: Invalid user faridah from 74.63.250.6 port 45762
Sep 29 09:41:26 localhost sshd\[19602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.250.6
Sep 29 09:41:28 localhost sshd\[19602\]: Failed password for invalid user faridah from 74.63.250.6 port 45762 ssh2
2019-09-29 15:51:31
188.68.47.181 attackspam
xmlrpc attack
2019-09-29 15:12:41
14.189.240.138 attackspambots
Unauthorised access (Sep 29) SRC=14.189.240.138 LEN=52 TTL=118 ID=4027 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-29 15:43:29
103.207.11.12 attackbots
Sep 29 14:41:33 webhost01 sshd[22817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.12
Sep 29 14:41:34 webhost01 sshd[22817]: Failed password for invalid user dn123 from 103.207.11.12 port 46706 ssh2
...
2019-09-29 15:45:54
125.130.110.20 attack
Sep 28 20:58:35 php1 sshd\[28401\]: Invalid user client from 125.130.110.20
Sep 28 20:58:35 php1 sshd\[28401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Sep 28 20:58:37 php1 sshd\[28401\]: Failed password for invalid user client from 125.130.110.20 port 37600 ssh2
Sep 28 21:03:15 php1 sshd\[28800\]: Invalid user mpsingh from 125.130.110.20
Sep 28 21:03:15 php1 sshd\[28800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
2019-09-29 15:18:58
219.156.130.255 attackspam
Unauthorised access (Sep 29) SRC=219.156.130.255 LEN=40 TTL=49 ID=49392 TCP DPT=8080 WINDOW=27995 SYN 
Unauthorised access (Sep 29) SRC=219.156.130.255 LEN=40 TTL=49 ID=29050 TCP DPT=8080 WINDOW=35771 SYN
2019-09-29 15:38:01
178.62.234.122 attack
Sep 29 09:10:33 mail sshd\[16370\]: Invalid user 20150602 from 178.62.234.122 port 42402
Sep 29 09:10:33 mail sshd\[16370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.234.122
Sep 29 09:10:34 mail sshd\[16370\]: Failed password for invalid user 20150602 from 178.62.234.122 port 42402 ssh2
Sep 29 09:14:31 mail sshd\[16726\]: Invalid user 123 from 178.62.234.122 port 54806
Sep 29 09:14:31 mail sshd\[16726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.234.122
2019-09-29 15:20:54
46.238.40.2 attackbotsspam
Sep 29 07:38:18 web8 sshd\[1117\]: Invalid user login from 46.238.40.2
Sep 29 07:38:18 web8 sshd\[1117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.40.2
Sep 29 07:38:20 web8 sshd\[1117\]: Failed password for invalid user login from 46.238.40.2 port 49288 ssh2
Sep 29 07:42:35 web8 sshd\[3435\]: Invalid user kaitlyn from 46.238.40.2
Sep 29 07:42:35 web8 sshd\[3435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.40.2
2019-09-29 15:47:06
185.216.140.6 attackbotsspam
09/29/2019-03:25:37.167694 185.216.140.6 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-29 15:30:33
206.189.165.94 attack
Invalid user TEST5 from 206.189.165.94 port 44574
2019-09-29 15:16:03
106.75.174.87 attackbotsspam
Sep 29 07:13:20 vps01 sshd[15981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.174.87
Sep 29 07:13:22 vps01 sshd[15981]: Failed password for invalid user octsr from 106.75.174.87 port 52210 ssh2
2019-09-29 15:41:00
188.131.211.207 attackspambots
Sep 29 09:25:25 OPSO sshd\[30346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.211.207  user=root
Sep 29 09:25:26 OPSO sshd\[30346\]: Failed password for root from 188.131.211.207 port 50874 ssh2
Sep 29 09:30:55 OPSO sshd\[32366\]: Invalid user fw from 188.131.211.207 port 33012
Sep 29 09:30:55 OPSO sshd\[32366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.211.207
Sep 29 09:30:57 OPSO sshd\[32366\]: Failed password for invalid user fw from 188.131.211.207 port 33012 ssh2
2019-09-29 15:44:32
203.171.227.205 attackbotsspam
Sep 28 21:19:55 web9 sshd\[6597\]: Invalid user lucifer from 203.171.227.205
Sep 28 21:19:55 web9 sshd\[6597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.171.227.205
Sep 28 21:19:57 web9 sshd\[6597\]: Failed password for invalid user lucifer from 203.171.227.205 port 43007 ssh2
Sep 28 21:24:25 web9 sshd\[7347\]: Invalid user test from 203.171.227.205
Sep 28 21:24:25 web9 sshd\[7347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.171.227.205
2019-09-29 15:25:21
200.56.60.5 attackspam
Sep 29 08:57:30 jane sshd[15700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.56.60.5 
Sep 29 08:57:31 jane sshd[15700]: Failed password for invalid user t from 200.56.60.5 port 62068 ssh2
...
2019-09-29 15:33:43

Recently Reported IPs

105.213.124.93 105.213.128.109 105.209.41.211 105.213.116.248
105.213.158.157 105.213.139.68 105.213.141.182 105.213.173.74
105.213.65.87 105.213.76.149 105.213.86.138 105.213.99.79
105.213.88.66 105.216.83.109 105.213.93.51 105.213.165.62
105.22.66.214 105.22.44.10 105.226.143.149 105.227.46.41