Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.76.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.76.99.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:53:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
99.76.213.105.in-addr.arpa domain name pointer 105-213-76-99.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.76.213.105.in-addr.arpa	name = 105-213-76-99.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.153.199.132 attackspam
Found on   Binary Defense     / proto=6  .  srcport=40904  .  dstport=3410  .     (78)
2020-10-01 07:03:56
103.82.24.179 attack
Invalid user testftp from 103.82.24.179 port 60624
2020-10-01 06:31:12
102.165.30.41 attackspambots
firewall-block, port(s): 3493/tcp
2020-10-01 06:43:03
148.72.168.23 attackbotsspam
ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 456
2020-10-01 06:38:16
114.113.81.130 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-01 06:39:34
192.241.175.250 attackbots
Sep 30 22:11:30 buvik sshd[27590]: Failed password for invalid user steve from 192.241.175.250 port 37767 ssh2
Sep 30 22:20:20 buvik sshd[28697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.175.250  user=root
Sep 30 22:20:21 buvik sshd[28697]: Failed password for root from 192.241.175.250 port 42467 ssh2
...
2020-10-01 06:31:29
195.54.161.59 attackbots
scans 5 times in preceeding hours on the ports (in chronological order) 54782 4017 50450 3636 2112 resulting in total of 25 scans from 195.54.160.0/23 block.
2020-10-01 07:01:13
60.251.183.90 attack
SSH login attempts.
2020-10-01 06:52:49
45.129.33.121 attack
scans 3 times in preceeding hours on the ports (in chronological order) 29745 29808 29506 resulting in total of 113 scans from 45.129.33.0/24 block.
2020-10-01 06:55:05
212.95.175.140 attack
 TCP (SYN) 212.95.175.140:41587 -> port 445, len 44
2020-10-01 06:59:06
119.187.120.38 attack
Listed on    zen-spamhaus   / proto=6  .  srcport=54697  .  dstport=1433  .     (2089)
2020-10-01 06:39:17
193.27.228.157 attackspambots
 TCP (SYN) 193.27.228.157:55227 -> port 12048, len 44
2020-10-01 06:36:39
104.248.176.46 attackspam
Invalid user admin from 104.248.176.46 port 56658
2020-10-01 06:41:00
112.248.124.164 attackbots
Hit honeypot r.
2020-10-01 06:33:44
45.129.33.5 attack
[MK-VM3] Blocked by UFW
2020-10-01 06:56:21

Recently Reported IPs

105.213.76.34 105.213.77.108 105.213.76.74 105.213.76.8
105.213.76.63 105.213.76.37 105.213.76.91 105.213.76.69
106.2.129.85 101.132.32.199 105.213.77.14 105.213.77.148
105.213.77.201 105.213.77.185 105.213.77.136 105.213.77.139
105.213.77.19 105.213.77.118 105.213.77.203 105.213.77.165