Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.136.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.136.224.		IN	A

;; AUTHORITY SECTION:
.			20	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:49:10 CST 2022
;; MSG SIZE  rcvd: 108
Host info
224.136.213.105.in-addr.arpa domain name pointer 105-213-136-224.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.136.213.105.in-addr.arpa	name = 105-213-136-224.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.134.194.101 attack
Automatic report - Port Scan Attack
2019-09-28 03:26:19
217.182.78.87 attackbotsspam
Fail2Ban Ban Triggered
2019-09-28 03:23:28
106.12.208.211 attack
Sep 27 18:08:07 nextcloud sshd\[18341\]: Invalid user foster from 106.12.208.211
Sep 27 18:08:07 nextcloud sshd\[18341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211
Sep 27 18:08:09 nextcloud sshd\[18341\]: Failed password for invalid user foster from 106.12.208.211 port 35952 ssh2
...
2019-09-28 03:14:24
182.74.217.122 attackspam
Sep 27 16:54:19 lnxded64 sshd[12079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.217.122
2019-09-28 03:02:30
222.190.127.58 attackspambots
2019-09-27T21:28:17.219839tmaserv sshd\[18514\]: Failed password for invalid user user from 222.190.127.58 port 44656 ssh2
2019-09-27T21:43:50.497453tmaserv sshd\[19375\]: Invalid user user from 222.190.127.58 port 44564
2019-09-27T21:43:50.508724tmaserv sshd\[19375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.127.58
2019-09-27T21:43:51.789863tmaserv sshd\[19375\]: Failed password for invalid user user from 222.190.127.58 port 44564 ssh2
2019-09-27T21:59:23.420056tmaserv sshd\[20242\]: Invalid user user from 222.190.127.58 port 44470
2019-09-27T21:59:23.427913tmaserv sshd\[20242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.127.58
...
2019-09-28 03:21:19
140.143.59.171 attack
Sep 28 00:49:35 areeb-Workstation sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.59.171
Sep 28 00:49:37 areeb-Workstation sshd[14530]: Failed password for invalid user aq from 140.143.59.171 port 9757 ssh2
...
2019-09-28 03:29:11
136.37.18.230 attackbotsspam
Invalid user opsview from 136.37.18.230 port 33551
2019-09-28 03:05:49
106.12.132.81 attackspambots
Sep 27 05:49:40 tdfoods sshd\[18378\]: Invalid user user1 from 106.12.132.81
Sep 27 05:49:40 tdfoods sshd\[18378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.81
Sep 27 05:49:42 tdfoods sshd\[18378\]: Failed password for invalid user user1 from 106.12.132.81 port 33474 ssh2
Sep 27 05:54:12 tdfoods sshd\[18720\]: Invalid user zw from 106.12.132.81
Sep 27 05:54:12 tdfoods sshd\[18720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.81
2019-09-28 03:22:43
140.143.53.145 attack
Sep 27 20:43:05 s64-1 sshd[14666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.53.145
Sep 27 20:43:07 s64-1 sshd[14666]: Failed password for invalid user backup1 from 140.143.53.145 port 34782 ssh2
Sep 27 20:47:39 s64-1 sshd[14749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.53.145
...
2019-09-28 03:00:05
41.238.130.31 attackspam
Chat Spam
2019-09-28 03:01:37
203.110.83.106 attackspambots
RDP-Bruteforce | Cancer2Ban-Autoban for Windows (see: https://github.com/Zeziroth/Cancer2Ban)
2019-09-28 03:00:53
106.12.78.199 attackbotsspam
*Port Scan* detected from 106.12.78.199 (CN/China/-). 4 hits in the last 285 seconds
2019-09-28 03:21:41
68.66.216.10 attackspam
WordPress XMLRPC scan :: 68.66.216.10 0.112 BYPASS [27/Sep/2019:22:07:14  1000] [censored_2] "POST /xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-28 03:10:35
51.75.207.61 attackbots
Sep 27 14:18:26 ip-172-31-62-245 sshd\[14139\]: Invalid user matt from 51.75.207.61\
Sep 27 14:18:29 ip-172-31-62-245 sshd\[14139\]: Failed password for invalid user matt from 51.75.207.61 port 58128 ssh2\
Sep 27 14:22:25 ip-172-31-62-245 sshd\[14155\]: Failed password for root from 51.75.207.61 port 41610 ssh2\
Sep 27 14:26:26 ip-172-31-62-245 sshd\[14209\]: Invalid user administrator from 51.75.207.61\
Sep 27 14:26:28 ip-172-31-62-245 sshd\[14209\]: Failed password for invalid user administrator from 51.75.207.61 port 53326 ssh2\
2019-09-28 03:32:51
59.145.221.103 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-09-28 03:10:57

Recently Reported IPs

105.213.135.87 105.213.137.73 101.132.151.138 37.3.245.40
105.213.137.244 105.213.137.81 105.213.137.77 105.213.138.233
105.213.138.246 101.132.151.148 105.213.138.78 105.213.139.238
105.213.138.157 105.213.139.190 101.132.151.49 105.213.139.34
105.213.140.132 105.213.140.100 105.213.138.218 101.132.151.51