Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.130.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.130.238.		IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:48:50 CST 2022
;; MSG SIZE  rcvd: 108
Host info
238.130.213.105.in-addr.arpa domain name pointer 105-213-130-238.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
238.130.213.105.in-addr.arpa	name = 105-213-130-238.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.44.144.62 attack
445/tcp 445/tcp 445/tcp
[2019-06-22/26]3pkt
2019-06-26 22:58:23
104.203.235.2 attack
Unauthorized connection attempt from IP address 104.203.235.2 on Port 445(SMB)
2019-06-26 23:25:07
119.197.224.201 attackspambots
37215/tcp 37215/tcp 37215/tcp...
[2019-04-26/06-26]34pkt,1pt.(tcp)
2019-06-26 23:10:01
182.148.122.3 attack
445/tcp 445/tcp 445/tcp...
[2019-05-05/06-26]5pkt,1pt.(tcp)
2019-06-26 22:38:21
71.6.147.254 attackbots
26/tcp 21/tcp 82/tcp...
[2019-04-25/06-26]179pkt,119pt.(tcp),19pt.(udp)
2019-06-26 22:49:44
162.158.182.170 attackspambots
SQL injection:/international/volontariat/benevolat/index.php?sub_menu_selected=644&language=FR&menu_selected=79%20and%201%3D1
2019-06-26 23:26:16
182.74.233.106 attackspam
Unauthorised access (Jun 26) SRC=182.74.233.106 LEN=48 TTL=118 ID=8686 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-26 23:08:14
80.82.70.118 attack
WEB Masscan Scanner Activity
3 x WEB Apache mod_ssl HTTP Request DoS (CVE-2004-0113)
2019-06-26 22:56:46
120.88.46.226 attack
Jun 26 15:09:09 server sshd[19370]: Failed password for invalid user test from 120.88.46.226 port 48872 ssh2
Jun 26 15:13:05 server sshd[20212]: Failed password for invalid user jonathan from 120.88.46.226 port 57808 ssh2
Jun 26 15:14:53 server sshd[20599]: Failed password for root from 120.88.46.226 port 45618 ssh2
2019-06-26 22:59:49
92.253.122.229 attackbots
3389BruteforceFW22
2019-06-26 23:38:15
76.104.243.253 attack
Jun 26 16:31:59 debian sshd\[22977\]: Invalid user jhesrhel from 76.104.243.253 port 46110
Jun 26 16:31:59 debian sshd\[22977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.104.243.253
...
2019-06-26 23:32:31
103.228.117.187 attack
445/tcp 445/tcp 445/tcp...
[2019-05-07/06-26]7pkt,1pt.(tcp)
2019-06-26 22:58:47
124.251.53.4 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-04-25/06-26]74pkt,1pt.(tcp)
2019-06-26 23:37:32
197.51.128.221 attack
445/tcp 445/tcp 445/tcp...
[2019-04-30/06-26]13pkt,1pt.(tcp)
2019-06-26 23:21:14
182.254.135.14 attackspambots
Jun 26 15:07:25 vserver sshd\[5779\]: Invalid user nagios from 182.254.135.14Jun 26 15:07:27 vserver sshd\[5779\]: Failed password for invalid user nagios from 182.254.135.14 port 59954 ssh2Jun 26 15:14:43 vserver sshd\[5892\]: Invalid user blake from 182.254.135.14Jun 26 15:14:45 vserver sshd\[5892\]: Failed password for invalid user blake from 182.254.135.14 port 49550 ssh2
...
2019-06-26 23:07:05

Recently Reported IPs

105.213.130.150 105.213.129.57 105.213.130.180 105.213.130.27
105.213.130.252 101.132.148.7 105.213.130.70 105.213.131.253
105.213.131.162 105.213.130.164 105.213.131.196 105.213.132.130
101.132.149.193 105.213.131.47 105.213.132.138 105.213.132.101
105.213.132.134 105.213.131.65 105.213.132.207 105.213.132.249