Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.79.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.79.150.			IN	A

;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:54:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
150.79.213.105.in-addr.arpa domain name pointer 105-213-79-150.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.79.213.105.in-addr.arpa	name = 105-213-79-150.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.103.52.169 attackspam
Aug 27 07:12:53 php2 sshd\[23501\]: Invalid user santana from 188.103.52.169
Aug 27 07:12:53 php2 sshd\[23501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dslb-188-103-052-169.188.103.pools.vodafone-ip.de
Aug 27 07:12:55 php2 sshd\[23501\]: Failed password for invalid user santana from 188.103.52.169 port 51634 ssh2
Aug 27 07:18:18 php2 sshd\[23891\]: Invalid user ircd from 188.103.52.169
Aug 27 07:18:18 php2 sshd\[23891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dslb-188-103-052-169.188.103.pools.vodafone-ip.de
2019-08-28 01:29:02
14.63.169.33 attackspam
Aug 27 14:09:18 srv-4 sshd\[30951\]: Invalid user tipodirect from 14.63.169.33
Aug 27 14:09:18 srv-4 sshd\[30951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33
Aug 27 14:09:20 srv-4 sshd\[30951\]: Failed password for invalid user tipodirect from 14.63.169.33 port 49455 ssh2
...
2019-08-28 01:05:13
122.121.16.169 attackspambots
19/8/27@05:03:42: FAIL: IoT-Telnet address from=122.121.16.169
...
2019-08-28 01:11:31
144.217.42.212 attackbots
Aug 27 03:28:27 hcbb sshd\[13914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip212.ip-144-217-42.net  user=root
Aug 27 03:28:29 hcbb sshd\[13914\]: Failed password for root from 144.217.42.212 port 41913 ssh2
Aug 27 03:32:48 hcbb sshd\[14292\]: Invalid user nagios from 144.217.42.212
Aug 27 03:32:48 hcbb sshd\[14292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip212.ip-144-217-42.net
Aug 27 03:32:50 hcbb sshd\[14292\]: Failed password for invalid user nagios from 144.217.42.212 port 35729 ssh2
2019-08-28 01:41:53
58.215.133.191 attackspam
Unauthorized connection attempt from IP address 58.215.133.191 on Port 445(SMB)
2019-08-28 01:53:31
1.55.190.99 attack
Unauthorized connection attempt from IP address 1.55.190.99 on Port 445(SMB)
2019-08-28 01:16:16
103.76.241.2 attackspambots
Unauthorized connection attempt from IP address 103.76.241.2 on Port 445(SMB)
2019-08-28 01:06:40
117.199.118.116 attack
Unauthorized connection attempt from IP address 117.199.118.116 on Port 445(SMB)
2019-08-28 01:30:49
104.238.116.94 attackspam
Tried sshing with brute force.
2019-08-28 01:02:55
89.236.112.99 attackbots
$f2bV_matches
2019-08-28 01:27:10
82.147.220.206 attack
[portscan] Port scan
2019-08-28 01:35:04
148.63.84.157 attack
Aug 27 09:03:09 hermescis postfix/smtpd\[2544\]: NOQUEUE: reject: RCPT from unknown\[148.63.84.157\]: 550 5.1.1 \: Recipient address rejected:* from=\ to=\ proto=ESMTP helo=\<157.84.63.148.rev.vodafone.pt\>
2019-08-28 01:41:23
115.61.166.237 attackspam
Unauthorised access (Aug 27) SRC=115.61.166.237 LEN=40 TTL=49 ID=7008 TCP DPT=8080 WINDOW=46801 SYN 
Unauthorised access (Aug 27) SRC=115.61.166.237 LEN=40 TTL=49 ID=37224 TCP DPT=8080 WINDOW=46801 SYN
2019-08-28 01:27:38
205.185.127.219 attackbots
Aug 27 16:35:18 ncomp sshd[26637]: Invalid user user from 205.185.127.219
Aug 27 16:35:18 ncomp sshd[26637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.127.219
Aug 27 16:35:18 ncomp sshd[26637]: Invalid user user from 205.185.127.219
Aug 27 16:35:20 ncomp sshd[26637]: Failed password for invalid user user from 205.185.127.219 port 46774 ssh2
2019-08-28 01:05:52
176.122.177.84 attack
2019-08-27T12:08:51.615900abusebot-6.cloudsearch.cf sshd\[27001\]: Invalid user spamfilter from 176.122.177.84 port 38118
2019-08-28 01:40:52

Recently Reported IPs

105.213.79.192 105.213.79.202 101.132.38.175 105.213.79.21
105.213.79.214 105.213.79.23 105.213.79.205 41.71.172.90
105.213.79.246 105.213.79.251 105.213.79.3 105.213.79.34
105.213.79.249 105.213.79.39 101.132.38.176 105.213.79.42
105.213.79.70 105.213.79.58 105.213.79.6 105.213.79.75