Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.164.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63172
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.164.96.			IN	A

;; AUTHORITY SECTION:
.			244	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:50:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
96.164.213.105.in-addr.arpa domain name pointer 105-213-164-96.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
96.164.213.105.in-addr.arpa	name = 105-213-164-96.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.82.70.118 attack
20/4/4@16:44:17: FAIL: IoT-SSH address from=80.82.70.118
...
2020-04-05 05:26:15
138.197.171.149 attack
SSH Invalid Login
2020-04-05 05:52:37
106.13.103.203 attackbotsspam
Apr  4 18:51:41 work-partkepr sshd\[9964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.203  user=root
Apr  4 18:51:43 work-partkepr sshd\[9964\]: Failed password for root from 106.13.103.203 port 51618 ssh2
...
2020-04-05 05:21:47
170.78.75.122 attack
445/tcp
[2020-04-04]1pkt
2020-04-05 05:24:19
74.208.65.52 attack
" "
2020-04-05 05:49:58
187.190.236.88 attackbots
Apr  4 22:03:14 plex sshd[19556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.236.88  user=root
Apr  4 22:03:15 plex sshd[19556]: Failed password for root from 187.190.236.88 port 49286 ssh2
2020-04-05 05:35:18
92.63.194.30 attackbotsspam
04/04/2020-16:35:06.223759 92.63.194.30 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-05 05:19:39
79.116.247.251 attack
23/tcp
[2020-04-04]1pkt
2020-04-05 05:26:30
207.182.135.164 attack
Apr  4 22:30:10 vpn01 sshd[20669]: Failed password for root from 207.182.135.164 port 35196 ssh2
...
2020-04-05 05:21:04
51.38.188.101 attack
(sshd) Failed SSH login from 51.38.188.101 (FR/France/101.ip-51-38-188.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  5 00:01:06 srv sshd[7762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.101  user=root
Apr  5 00:01:08 srv sshd[7762]: Failed password for root from 51.38.188.101 port 33452 ssh2
Apr  5 00:13:33 srv sshd[8647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.101  user=root
Apr  5 00:13:36 srv sshd[8647]: Failed password for root from 51.38.188.101 port 40634 ssh2
Apr  5 00:18:08 srv sshd[8935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.101  user=root
2020-04-05 05:56:58
106.13.111.19 attackbots
Invalid user gz from 106.13.111.19 port 41132
2020-04-05 05:28:55
85.209.0.5 attack
SSH bruteforce (Triggered fail2ban)
2020-04-05 05:33:54
186.91.223.172 attack
37215/tcp
[2020-04-04]1pkt
2020-04-05 05:28:00
218.45.205.203 attackspambots
Automatic report - Port Scan Attack
2020-04-05 05:50:40
187.162.22.30 attackspambots
SSH Invalid Login
2020-04-05 05:55:49

Recently Reported IPs

105.213.164.79 105.213.165.126 101.132.155.12 105.213.165.234
198.217.116.81 105.213.165.150 105.213.165.198 105.213.165.78
105.213.166.126 101.132.155.155 105.213.166.228 105.213.166.174
105.213.166.166 105.213.166.31 105.213.165.80 105.213.165.209
105.213.166.56 105.213.166.8 105.213.166.40 105.213.166.66