Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.69.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.69.152.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:52:29 CST 2022
;; MSG SIZE  rcvd: 107
Host info
152.69.213.105.in-addr.arpa domain name pointer 105-213-69-152.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.69.213.105.in-addr.arpa	name = 105-213-69-152.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.45.104.181 attackspambots
Aug 19 23:17:15 cosmoit sshd[32069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.104.181
2020-08-20 05:31:32
76.67.192.249 attackspam
SSH Invalid Login
2020-08-20 05:49:35
186.23.28.133 attackbotsspam
Automatic report - Port Scan Attack
2020-08-20 05:39:18
74.208.18.153 attack
SSH login attempts.
2020-08-20 05:25:26
35.195.161.121 attackbots
Port scan: Attack repeated for 24 hours
2020-08-20 05:29:40
106.54.141.196 attack
Invalid user gateway from 106.54.141.196 port 58024
2020-08-20 05:26:20
132.232.1.155 attackspambots
Aug 19 22:48:48 * sshd[8422]: Failed password for root from 132.232.1.155 port 43278 ssh2
Aug 19 22:53:05 * sshd[8847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.1.155
2020-08-20 05:17:54
106.13.173.137 attackspam
Aug 19 18:38:20 vps46666688 sshd[23212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.137
Aug 19 18:38:21 vps46666688 sshd[23212]: Failed password for invalid user xun from 106.13.173.137 port 48886 ssh2
...
2020-08-20 05:42:27
34.67.85.82 attackbots
Aug 19 22:52:36 vm1 sshd[26453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.85.82
Aug 19 22:52:37 vm1 sshd[26453]: Failed password for invalid user sinusbot from 34.67.85.82 port 55864 ssh2
...
2020-08-20 05:40:55
106.75.165.187 attackbotsspam
Failed password for invalid user robert from 106.75.165.187 port 34302 ssh2
2020-08-20 05:27:20
213.109.87.223 attackbotsspam
srvr1: (mod_security) mod_security (id:920350) triggered by 213.109.87.223 (UA/-/s-213-109-87-223.under.net.ua): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/19 20:52:29 [error] 338292#0: *638706 [client 213.109.87.223] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159787034950.354027"] [ref "o0,16v21,16"], client: 213.109.87.223, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-08-20 05:45:24
51.77.212.179 attack
Aug 19 23:04:30 meumeu sshd[1020388]: Invalid user checker from 51.77.212.179 port 34355
Aug 19 23:04:30 meumeu sshd[1020388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.212.179 
Aug 19 23:04:30 meumeu sshd[1020388]: Invalid user checker from 51.77.212.179 port 34355
Aug 19 23:04:32 meumeu sshd[1020388]: Failed password for invalid user checker from 51.77.212.179 port 34355 ssh2
Aug 19 23:08:11 meumeu sshd[1020514]: Invalid user customerservice from 51.77.212.179 port 38254
Aug 19 23:08:11 meumeu sshd[1020514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.212.179 
Aug 19 23:08:11 meumeu sshd[1020514]: Invalid user customerservice from 51.77.212.179 port 38254
Aug 19 23:08:13 meumeu sshd[1020514]: Failed password for invalid user customerservice from 51.77.212.179 port 38254 ssh2
Aug 19 23:11:48 meumeu sshd[1020810]: Invalid user mysql from 51.77.212.179 port 42152
...
2020-08-20 05:15:22
112.85.42.227 attackbotsspam
Aug 19 17:14:54 NPSTNNYC01T sshd[1536]: Failed password for root from 112.85.42.227 port 23051 ssh2
Aug 19 17:15:48 NPSTNNYC01T sshd[1649]: Failed password for root from 112.85.42.227 port 11864 ssh2
...
2020-08-20 05:40:41
158.69.222.2 attackspambots
Aug 19 23:28:49 abendstille sshd\[28870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2  user=root
Aug 19 23:28:52 abendstille sshd\[28870\]: Failed password for root from 158.69.222.2 port 57061 ssh2
Aug 19 23:32:31 abendstille sshd\[514\]: Invalid user oracle from 158.69.222.2
Aug 19 23:32:31 abendstille sshd\[514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2
Aug 19 23:32:33 abendstille sshd\[514\]: Failed password for invalid user oracle from 158.69.222.2 port 59036 ssh2
...
2020-08-20 05:35:25
220.133.0.84 attackbotsspam
Unauthorised access (Aug 19) SRC=220.133.0.84 LEN=40 TTL=46 ID=25833 TCP DPT=23 WINDOW=29145 SYN
2020-08-20 05:22:44

Recently Reported IPs

175.193.208.195 105.213.69.143 105.213.69.165 105.213.69.11
105.213.69.151 105.213.69.175 105.213.69.176 101.132.25.175
105.213.69.172 105.213.69.208 105.213.69.19 105.213.69.238
101.132.255.151 105.213.69.254 105.213.69.66 105.213.69.25
105.213.69.4 105.213.69.231 105.213.69.212 105.213.69.68