Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.80.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29099
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.80.134.			IN	A

;; AUTHORITY SECTION:
.			233	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:18:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
134.80.213.105.in-addr.arpa domain name pointer 105-213-80-134.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.80.213.105.in-addr.arpa	name = 105-213-80-134.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.25.60.96 normal
fuck you
2020-09-13 19:15:17
49.147.192.215 attackbots
1599929399 - 09/12/2020 18:49:59 Host: 49.147.192.215/49.147.192.215 Port: 445 TCP Blocked
2020-09-13 19:09:27
27.6.184.227 attackspambots
firewall-block, port(s): 23/tcp
2020-09-13 19:07:07
193.247.213.196 attackspambots
(sshd) Failed SSH login from 193.247.213.196 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 13 07:07:05 server sshd[15883]: Invalid user logger from 193.247.213.196 port 43660
Sep 13 07:07:07 server sshd[15883]: Failed password for invalid user logger from 193.247.213.196 port 43660 ssh2
Sep 13 07:10:38 server sshd[17544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.247.213.196  user=root
Sep 13 07:10:41 server sshd[17544]: Failed password for root from 193.247.213.196 port 57408 ssh2
Sep 13 07:11:44 server sshd[17969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.247.213.196  user=root
2020-09-13 19:13:35
74.120.14.22 attack
 TCP (SYN) 74.120.14.22:63511 -> port 25, len 44
2020-09-13 19:04:53
51.91.109.220 attack
Sep 13 10:42:17 jumpserver sshd[47162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.109.220  user=root
Sep 13 10:42:19 jumpserver sshd[47162]: Failed password for root from 51.91.109.220 port 51602 ssh2
Sep 13 10:46:13 jumpserver sshd[47368]: Invalid user zhou from 51.91.109.220 port 32946
...
2020-09-13 19:28:08
117.69.159.249 attack
Sep 12 20:01:57 srv01 postfix/smtpd\[8226\]: warning: unknown\[117.69.159.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 20:05:22 srv01 postfix/smtpd\[7909\]: warning: unknown\[117.69.159.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 20:12:16 srv01 postfix/smtpd\[14595\]: warning: unknown\[117.69.159.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 20:15:42 srv01 postfix/smtpd\[16249\]: warning: unknown\[117.69.159.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 20:19:09 srv01 postfix/smtpd\[8226\]: warning: unknown\[117.69.159.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-13 19:00:51
128.14.230.200 attackbotsspam
$f2bV_matches
2020-09-13 19:21:26
185.245.41.4 attackspambots
2020-09-13T08:55:31.882926mail.standpoint.com.ua sshd[21187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.41.4  user=root
2020-09-13T08:55:33.325304mail.standpoint.com.ua sshd[21187]: Failed password for root from 185.245.41.4 port 46080 ssh2
2020-09-13T08:56:11.653473mail.standpoint.com.ua sshd[21282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.41.4  user=root
2020-09-13T08:56:14.255207mail.standpoint.com.ua sshd[21282]: Failed password for root from 185.245.41.4 port 55278 ssh2
2020-09-13T08:56:51.479208mail.standpoint.com.ua sshd[21365]: Invalid user gasa from 185.245.41.4 port 36250
...
2020-09-13 19:07:25
191.232.254.15 attackspam
SSH invalid-user multiple login attempts
2020-09-13 19:24:59
218.92.0.247 attackbotsspam
prod11
...
2020-09-13 19:31:59
162.142.125.34 attackspambots
SSH Bruteforce Attempt on Honeypot
2020-09-13 19:34:49
89.161.66.177 attackspam
Firewall Dropped Connection
2020-09-13 19:33:00
51.252.39.173 attackspam
(smtpauth) Failed SMTP AUTH login from 51.252.39.173 (SA/Saudi Arabia/-): 5 in the last 3600 secs; Ports: 25,465,587; Direction: in; Trigger: LF_SMTPAUTH; Logs: Sep 12 22:21:26 hostingremote postfix/smtpd[2109926]: warning: unknown[51.252.39.173]: SASL PLAIN authentication failed: authentication failure
Sep 12 22:36:18 hostingremote postfix/smtpd[2115262]: warning: unknown[51.252.39.173]: SASL PLAIN authentication failed: authentication failure
Sep 12 22:52:05 hostingremote postfix/smtpd[2121044]: warning: unknown[51.252.39.173]: SASL PLAIN authentication failed: authentication failure
Sep 12 23:11:21 hostingremote postfix/smtpd[2125095]: warning: unknown[51.252.39.173]: SASL PLAIN authentication failed: authentication failure
Sep 12 23:18:59 hostingremote postfix/smtpd[2127257]: warning: unknown[51.252.39.173]: SASL PLAIN authentication failed: authentication failure
2020-09-13 19:39:32
222.186.175.154 attackspam
Brute force attempt
2020-09-13 18:59:10

Recently Reported IPs

105.247.238.30 105.213.81.149 105.213.81.184 105.213.81.155
105.213.81.19 105.213.81.193 105.213.81.117 105.213.81.115
105.213.81.168 105.213.81.12 105.213.81.15 105.213.81.213
105.213.81.121 105.213.81.224 105.213.81.233 105.213.81.3
106.110.228.53 105.213.81.222 105.213.81.251 105.213.81.66