Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.95.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.95.125.			IN	A

;; AUTHORITY SECTION:
.			137	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 06:30:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
125.95.213.105.in-addr.arpa domain name pointer 105-213-95-125.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.95.213.105.in-addr.arpa	name = 105-213-95-125.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.128.21.38 attackbotsspam
Invalid user webmaster from 178.128.21.38 port 39294
2020-01-18 05:03:22
113.173.94.217 attackspambots
Invalid user admin from 113.173.94.217 port 53375
2020-01-18 04:37:46
117.102.68.188 attack
Jan 17 01:33:48 main sshd[28944]: Failed password for invalid user studio from 117.102.68.188 port 46500 ssh2
2020-01-18 04:37:10
180.76.146.60 attackbots
Unauthorized connection attempt detected from IP address 180.76.146.60 to port 2220 [J]
2020-01-18 05:02:53
183.89.212.147 attackspam
Invalid user admin from 183.89.212.147 port 33088
2020-01-18 05:01:45
187.109.169.75 attackspambots
Invalid user admin from 187.109.169.75 port 46400
2020-01-18 04:59:59
41.35.58.54 attackbots
Invalid user admin from 41.35.58.54 port 43069
2020-01-18 04:46:19
140.143.157.207 attack
Unauthorized connection attempt detected from IP address 140.143.157.207 to port 2220 [J]
2020-01-18 05:09:26
144.217.7.75 attackspambots
Invalid user administrador from 144.217.7.75 port 33474
2020-01-18 05:08:57
139.155.83.98 attack
Jan 17 18:41:35 ws12vmsma01 sshd[38624]: Invalid user ftpuser2 from 139.155.83.98
Jan 17 18:41:37 ws12vmsma01 sshd[38624]: Failed password for invalid user ftpuser2 from 139.155.83.98 port 42298 ssh2
Jan 17 18:45:23 ws12vmsma01 sshd[39136]: Invalid user git from 139.155.83.98
...
2020-01-18 05:10:37
165.227.77.120 attack
Unauthorized connection attempt detected from IP address 165.227.77.120 to port 2220 [J]
2020-01-18 05:06:43
185.38.3.138 attack
Unauthorized connection attempt detected from IP address 185.38.3.138 to port 2220 [J]
2020-01-18 05:01:19
49.234.179.127 attackbotsspam
Unauthorized connection attempt detected from IP address 49.234.179.127 to port 2220 [J]
2020-01-18 04:45:12
140.143.127.179 attackspambots
Unauthorized connection attempt detected from IP address 140.143.127.179 to port 2220 [J]
2020-01-18 05:09:43
104.248.145.163 attackspam
Unauthorized connection attempt detected from IP address 104.248.145.163 to port 2220 [J]
2020-01-18 04:40:50

Recently Reported IPs

105.213.93.195 105.213.97.89 105.215.108.65 105.216.243.251
105.216.38.1 105.216.47.107 105.234.148.100 105.234.148.235
105.234.156.109 105.235.136.67 105.27.144.134 105.27.147.70
74.125.107.135 91.119.248.255 106.116.80.130 106.116.83.18
201.198.46.249 106.12.108.89 209.85.224.73 106.12.116.227