Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.70.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.70.106.			IN	A

;; AUTHORITY SECTION:
.			224	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:52:36 CST 2022
;; MSG SIZE  rcvd: 107
Host info
106.70.213.105.in-addr.arpa domain name pointer 105-213-70-106.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.70.213.105.in-addr.arpa	name = 105-213-70-106.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.42.29.236 attackbots
Nov 26 07:30:08 * sshd[18067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.29.236
Nov 26 07:30:10 * sshd[18067]: Failed password for invalid user cetp from 104.42.29.236 port 17344 ssh2
2019-11-26 14:59:23
104.248.37.88 attackspam
2210/tcp 2209/tcp 2208/tcp...≡ [2177/tcp,2210/tcp]
[2019-09-25/11-26]111pkt,34pt.(tcp)
2019-11-26 14:09:41
222.186.173.183 attackbotsspam
2019-11-26T06:46:27.804918hub.schaetter.us sshd\[21501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2019-11-26T06:46:29.608823hub.schaetter.us sshd\[21501\]: Failed password for root from 222.186.173.183 port 16920 ssh2
2019-11-26T06:46:32.729925hub.schaetter.us sshd\[21501\]: Failed password for root from 222.186.173.183 port 16920 ssh2
2019-11-26T06:46:36.258210hub.schaetter.us sshd\[21501\]: Failed password for root from 222.186.173.183 port 16920 ssh2
2019-11-26T06:46:39.335209hub.schaetter.us sshd\[21501\]: Failed password for root from 222.186.173.183 port 16920 ssh2
...
2019-11-26 14:48:16
119.10.115.36 attackbotsspam
Nov 26 10:39:04 areeb-Workstation sshd[29965]: Failed password for root from 119.10.115.36 port 59899 ssh2
...
2019-11-26 14:09:20
101.254.185.118 attackspam
Nov 26 11:46:08 itv-usvr-01 sshd[24596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.254.185.118  user=root
Nov 26 11:46:10 itv-usvr-01 sshd[24596]: Failed password for root from 101.254.185.118 port 47428 ssh2
Nov 26 11:50:00 itv-usvr-01 sshd[24718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.254.185.118  user=root
Nov 26 11:50:03 itv-usvr-01 sshd[24718]: Failed password for root from 101.254.185.118 port 44870 ssh2
Nov 26 11:53:59 itv-usvr-01 sshd[24880]: Invalid user dhaussy from 101.254.185.118
2019-11-26 14:18:41
114.119.4.74 attackbots
Nov 26 03:21:30 firewall sshd[31526]: Invalid user 6 from 114.119.4.74
Nov 26 03:21:32 firewall sshd[31526]: Failed password for invalid user 6 from 114.119.4.74 port 37782 ssh2
Nov 26 03:30:21 firewall sshd[31744]: Invalid user luna from 114.119.4.74
...
2019-11-26 14:56:12
218.92.0.179 attackbotsspam
Nov 26 07:30:19 legacy sshd[12371]: Failed password for root from 218.92.0.179 port 3832 ssh2
Nov 26 07:30:31 legacy sshd[12371]: error: maximum authentication attempts exceeded for root from 218.92.0.179 port 3832 ssh2 [preauth]
Nov 26 07:30:37 legacy sshd[12374]: Failed password for root from 218.92.0.179 port 34006 ssh2
...
2019-11-26 14:40:43
218.92.0.135 attackbotsspam
2019-11-26T07:25:37.880566vps751288.ovh.net sshd\[23765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
2019-11-26T07:25:39.750415vps751288.ovh.net sshd\[23765\]: Failed password for root from 218.92.0.135 port 17348 ssh2
2019-11-26T07:25:42.429518vps751288.ovh.net sshd\[23765\]: Failed password for root from 218.92.0.135 port 17348 ssh2
2019-11-26T07:25:46.051915vps751288.ovh.net sshd\[23765\]: Failed password for root from 218.92.0.135 port 17348 ssh2
2019-11-26T07:25:49.222124vps751288.ovh.net sshd\[23765\]: Failed password for root from 218.92.0.135 port 17348 ssh2
2019-11-26 14:28:35
182.185.179.162 attack
Unauthorised access (Nov 26) SRC=182.185.179.162 LEN=52 TTL=114 ID=12140 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-26 14:12:12
81.88.106.110 attackspam
Nov 26 09:30:21 server sshd\[26685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.88.106.110  user=root
Nov 26 09:30:23 server sshd\[26685\]: Failed password for root from 81.88.106.110 port 57000 ssh2
Nov 26 09:30:24 server sshd\[26685\]: Failed password for root from 81.88.106.110 port 57000 ssh2
Nov 26 09:30:26 server sshd\[26685\]: Failed password for root from 81.88.106.110 port 57000 ssh2
Nov 26 09:30:28 server sshd\[26685\]: Failed password for root from 81.88.106.110 port 57000 ssh2
...
2019-11-26 14:44:16
178.62.117.106 attackbots
2019-11-26T06:00:32.221773abusebot-5.cloudsearch.cf sshd\[1550\]: Invalid user arnold from 178.62.117.106 port 38407
2019-11-26 14:12:40
222.186.175.155 attackspam
Nov 25 20:09:30 hanapaa sshd\[6022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Nov 25 20:09:32 hanapaa sshd\[6022\]: Failed password for root from 222.186.175.155 port 42002 ssh2
Nov 25 20:09:48 hanapaa sshd\[6049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Nov 25 20:09:50 hanapaa sshd\[6049\]: Failed password for root from 222.186.175.155 port 59432 ssh2
Nov 25 20:10:00 hanapaa sshd\[6049\]: Failed password for root from 222.186.175.155 port 59432 ssh2
2019-11-26 14:10:08
119.29.2.157 attackbots
2019-11-26T05:53:54.6237431240 sshd\[5152\]: Invalid user cevey from 119.29.2.157 port 60722
2019-11-26T05:53:54.6265311240 sshd\[5152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.2.157
2019-11-26T05:53:56.6975321240 sshd\[5152\]: Failed password for invalid user cevey from 119.29.2.157 port 60722 ssh2
...
2019-11-26 14:21:26
200.207.136.107 attack
Automatic report - Banned IP Access
2019-11-26 14:39:42
106.91.210.122 attack
Unauthorised access (Nov 26) SRC=106.91.210.122 LEN=40 TTL=49 ID=51554 TCP DPT=23 WINDOW=25599 SYN
2019-11-26 14:57:37

Recently Reported IPs

105.213.70.0 105.213.7.89 105.213.70.155 105.213.70.167
105.213.70.148 105.213.70.173 105.213.70.184 105.213.70.194
105.213.70.14 105.213.70.186 101.132.32.10 105.213.70.237
105.213.70.188 105.213.70.219 105.213.70.30 105.213.70.43
105.213.70.7 105.213.70.238 105.213.70.197 101.132.32.120