Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.126.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.126.107.		IN	A

;; AUTHORITY SECTION:
.			235	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 06:29:28 CST 2022
;; MSG SIZE  rcvd: 108
Host info
107.126.213.105.in-addr.arpa domain name pointer 105-213-126-107.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.126.213.105.in-addr.arpa	name = 105-213-126-107.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.179.75 attackspam
Invalid user stream from 182.61.179.75 port 48871
2019-10-27 01:26:52
133.130.90.174 attack
Invalid user st from 133.130.90.174 port 33204
2019-10-27 01:32:12
111.62.12.169 attackspambots
Invalid user ts from 111.62.12.169 port 60704
2019-10-27 02:03:50
45.136.109.215 attackbots
Oct 26 18:57:30 h2177944 kernel: \[4984854.330097\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=45501 PROTO=TCP SPT=43015 DPT=1780 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 26 18:58:04 h2177944 kernel: \[4984887.940682\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=9305 PROTO=TCP SPT=43015 DPT=79 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 26 18:58:08 h2177944 kernel: \[4984892.419868\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=20481 PROTO=TCP SPT=43015 DPT=4703 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 26 18:59:53 h2177944 kernel: \[4984996.481413\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=29013 PROTO=TCP SPT=43015 DPT=3615 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 26 19:00:28 h2177944 kernel: \[4985032.263314\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117
2019-10-27 01:23:24
51.77.230.125 attackbots
Invalid user zimbra from 51.77.230.125 port 49738
2019-10-27 01:45:34
36.111.36.83 attackspam
Oct 26 18:23:03 host sshd[36524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.36.83  user=root
Oct 26 18:23:05 host sshd[36524]: Failed password for root from 36.111.36.83 port 47802 ssh2
...
2019-10-27 01:48:43
117.73.10.45 attackbots
Invalid user farid from 117.73.10.45 port 49504
2019-10-27 02:02:45
104.40.3.249 attack
Invalid user support from 104.40.3.249 port 23744
2019-10-27 01:41:21
203.146.170.167 attack
Invalid user admin from 203.146.170.167 port 37124
2019-10-27 01:52:36
69.176.95.240 attackspambots
2019-10-26T17:05:39.051850abusebot-5.cloudsearch.cf sshd\[20867\]: Invalid user carl from 69.176.95.240 port 40327
2019-10-27 01:43:43
41.210.19.27 attack
Invalid user admin from 41.210.19.27 port 46021
2019-10-27 01:23:48
117.121.38.113 attackspam
Oct 22 09:49:54 master sshd[4178]: Failed password for invalid user oracle from 117.121.38.113 port 41422 ssh2
Oct 26 14:27:19 master sshd[18049]: Failed password for invalid user support from 117.121.38.113 port 35389 ssh2
2019-10-27 01:34:13
35.197.227.71 attackspam
Invalid user ubuntu from 35.197.227.71 port 39604
2019-10-27 01:49:08
138.68.250.76 attackspambots
Automatic report - Banned IP Access
2019-10-27 01:31:36
182.61.162.54 attackbots
Invalid user a3w from 182.61.162.54 port 56742
2019-10-27 01:55:37

Recently Reported IPs

105.213.124.218 105.213.126.233 105.213.129.169 105.213.134.65
105.213.136.102 105.213.136.44 202.131.31.88 105.213.137.224
105.213.139.249 105.213.150.98 105.213.151.39 105.213.152.56
105.213.184.176 105.213.189.229 105.213.66.131 105.213.69.131
105.213.70.105 105.213.71.37 105.213.75.207 105.213.76.95