Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.150.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.150.116.		IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030301 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 02:15:21 CST 2022
;; MSG SIZE  rcvd: 108
Host info
116.150.213.105.in-addr.arpa domain name pointer 105-213-150-116.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.150.213.105.in-addr.arpa	name = 105-213-150-116.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.191.28.143 attackspambots
23/tcp
[2019-11-13]1pkt
2019-11-14 07:03:22
1.173.83.21 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/1.173.83.21/ 
 
 TW - 1H : (48)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 1.173.83.21 
 
 CIDR : 1.173.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 29 
  3H - 29 
  6H - 29 
 12H - 29 
 24H - 29 
 
 DateTime : 2019-11-13 16:59:29 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 06:29:46
144.217.214.100 attack
Nov 13 12:11:26 tdfoods sshd\[11467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-144-217-214.net  user=root
Nov 13 12:11:29 tdfoods sshd\[11467\]: Failed password for root from 144.217.214.100 port 39728 ssh2
Nov 13 12:15:20 tdfoods sshd\[11780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-144-217-214.net  user=root
Nov 13 12:15:23 tdfoods sshd\[11780\]: Failed password for root from 144.217.214.100 port 47026 ssh2
Nov 13 12:19:13 tdfoods sshd\[12096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-144-217-214.net  user=www-data
2019-11-14 06:29:23
115.238.59.165 attackspambots
Invalid user june from 115.238.59.165 port 36158
2019-11-14 06:47:16
163.172.105.54 attack
Brute force attacks
2019-11-14 06:31:16
125.212.217.214 attackspambots
Port scan: Attack repeated for 24 hours
2019-11-14 06:43:57
159.89.115.126 attackspambots
$f2bV_matches
2019-11-14 07:01:08
218.255.150.226 attack
2019-11-13T22:30:20.741594abusebot-8.cloudsearch.cf sshd\[5980\]: Invalid user test from 218.255.150.226 port 46300
2019-11-14 06:30:50
104.140.188.58 attackbots
Port scan: Attack repeated for 24 hours
2019-11-14 06:57:30
202.40.187.17 attack
Honeypot attack, port: 445, PTR: ritt-187-17.ranksitt.net.
2019-11-14 06:57:17
103.237.144.136 attackspambots
fail2ban honeypot
2019-11-14 06:39:54
181.224.184.67 attackbotsspam
SSH Brute Force
2019-11-14 06:58:33
121.143.171.119 attackspam
$f2bV_matches
2019-11-14 06:56:53
62.210.211.137 attackspam
$f2bV_matches
2019-11-14 06:42:15
188.190.221.146 attack
Honeypot attack, port: 445, PTR: pool.megalink.lg.ua.
2019-11-14 06:25:13

Recently Reported IPs

105.213.144.179 105.213.182.16 105.213.186.71 105.213.73.15
105.213.79.127 105.213.86.163 105.213.95.5 105.22.34.122
105.225.113.135 105.225.120.158 105.225.205.39 105.225.253.82
105.225.28.96 105.225.53.170 105.225.55.77 105.226.143.3
105.226.22.229 105.226.246.2 105.226.98.22 105.226.99.202