Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sandton

Region: Gauteng

Country: South Africa

Internet Service Provider: MTN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.96.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.96.234.			IN	A

;; AUTHORITY SECTION:
.			506	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 08:18:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
234.96.213.105.in-addr.arpa domain name pointer 105-213-96-234.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
234.96.213.105.in-addr.arpa	name = 105-213-96-234.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.32.163.44 attackbotsspam
03/05/2020-02:10:06.758853 193.32.163.44 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-05 18:17:32
198.108.67.110 attackspambots
attempted connection to port 12552
2020-03-05 18:31:02
192.241.227.209 attack
5222/tcp 5902/tcp 873/tcp...
[2020-02-01/03-05]20pkt,15pt.(tcp),3pt.(udp)
2020-03-05 18:13:37
192.241.180.73 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(03051213)
2020-03-05 18:19:06
192.241.225.14 attack
22/tcp 10000/tcp 1400/tcp...
[2020-02-16/03-04]17pkt,16pt.(tcp)
2020-03-05 18:09:55
178.64.126.127 attack
Unauthorized connection attempt from IP address 178.64.126.127 on Port 445(SMB)
2020-03-05 18:26:00
198.108.67.34 attackbotsspam
20100/tcp 18048/tcp 22222/tcp...
[2020-01-04/03-03]75pkt,74pt.(tcp)
2020-03-05 18:30:41
45.182.136.190 attack
Automatic report - Port Scan Attack
2020-03-05 18:07:43
80.82.78.100 attackbots
Scanning for open ports and vulnerable services: 1030,1045,1051,1055,1060,1067,1088,1541,1646,2123,5123,5351,6346
2020-03-05 18:22:06
77.247.110.91 attackbotsspam
[MK-Root1] Blocked by UFW
2020-03-05 18:29:46
168.90.91.169 attack
Honeypot attack, port: 445, PTR: 169.91.90.168.static.megalinkpi.net.br.
2020-03-05 18:31:55
36.91.72.219 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 18:30:07
49.207.6.252 attackspambots
Mar  5 11:19:53 vps691689 sshd[4022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.6.252
Mar  5 11:19:55 vps691689 sshd[4022]: Failed password for invalid user vbox from 49.207.6.252 port 56292 ssh2
...
2020-03-05 18:39:40
192.241.221.241 attack
44818/tcp 9160/tcp 5672/tcp...
[2020-02-14/03-04]22pkt,17pt.(tcp),2pt.(udp)
2020-03-05 18:15:05
220.132.9.234 attackbots
Honeypot attack, port: 445, PTR: 220-132-9-234.HINET-IP.hinet.net.
2020-03-05 18:14:30

Recently Reported IPs

102.22.218.239 188.166.45.50 188.174.59.252 84.178.190.134
221.124.7.126 179.160.146.21 188.22.144.25 85.72.96.96
117.197.1.218 159.242.234.176 177.248.193.88 179.33.146.128
180.254.71.108 233.45.10.81 189.157.66.213 222.218.128.25
182.138.226.16 218.22.21.22 189.142.90.131 213.248.112.37