Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.167.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.167.199.		IN	A

;; AUTHORITY SECTION:
.			272	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:50:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
199.167.213.105.in-addr.arpa domain name pointer 105-213-167-199.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.167.213.105.in-addr.arpa	name = 105-213-167-199.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.4.92.105 attackbots
Dec 18 08:05:38 plusreed sshd[26564]: Invalid user vcsa from 103.4.92.105
...
2019-12-18 21:08:27
190.123.211.222 attack
Automatic report - Banned IP Access
2019-12-18 20:34:55
119.28.105.127 attackspam
Dec 18 02:29:17 php1 sshd\[22350\]: Invalid user ple from 119.28.105.127
Dec 18 02:29:17 php1 sshd\[22350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.105.127
Dec 18 02:29:19 php1 sshd\[22350\]: Failed password for invalid user ple from 119.28.105.127 port 42304 ssh2
Dec 18 02:36:31 php1 sshd\[23041\]: Invalid user barmeier from 119.28.105.127
Dec 18 02:36:31 php1 sshd\[23041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.105.127
2019-12-18 20:38:39
117.64.234.119 attackbots
SSH invalid-user multiple login try
2019-12-18 20:32:06
23.95.237.100 attackspambots
Wordpress login attempts
2019-12-18 20:46:27
120.253.127.10 attackspam
Automatic report - Port Scan
2019-12-18 21:09:56
174.52.89.176 attackspambots
2019-12-18T13:06:12.820695  sshd[4615]: Invalid user lisa from 174.52.89.176 port 49472
2019-12-18T13:06:12.833628  sshd[4615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.52.89.176
2019-12-18T13:06:12.820695  sshd[4615]: Invalid user lisa from 174.52.89.176 port 49472
2019-12-18T13:06:15.140600  sshd[4615]: Failed password for invalid user lisa from 174.52.89.176 port 49472 ssh2
2019-12-18T13:11:32.654430  sshd[4705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.52.89.176  user=nagios
2019-12-18T13:11:34.891296  sshd[4705]: Failed password for nagios from 174.52.89.176 port 56904 ssh2
...
2019-12-18 20:47:00
222.186.175.163 attackbots
--- report ---
Dec 18 09:43:34 sshd: Connection from 222.186.175.163 port 61728
Dec 18 09:43:39 sshd: Failed password for root from 222.186.175.163 port 61728 ssh2
Dec 18 09:43:41 sshd: Received disconnect from 222.186.175.163: 11:  [preauth]
2019-12-18 21:07:32
117.64.234.28 attackbots
SSH invalid-user multiple login try
2019-12-18 20:33:55
37.17.250.101 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-12-18 20:49:00
117.211.169.148 attackspam
Unauthorized connection attempt detected from IP address 117.211.169.148 to port 445
2019-12-18 20:57:38
14.231.111.153 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-12-2019 06:25:12.
2019-12-18 20:56:20
175.176.23.13 attackspambots
Automatic report - Port Scan
2019-12-18 20:43:39
106.51.39.234 attack
Unauthorized connection attempt from IP address 106.51.39.234 on Port 445(SMB)
2019-12-18 20:47:29
159.203.201.217 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-18 20:36:45

Recently Reported IPs

105.213.167.101 105.213.167.215 105.213.167.221 105.213.167.37
105.213.167.83 105.213.167.230 105.213.167.56 105.213.168.153
105.213.168.104 105.213.167.203 101.132.155.198 105.213.168.99
105.213.168.54 105.213.169.100 99.32.82.67 105.213.169.114
101.132.155.23 101.132.155.41 101.132.155.70 101.132.155.99