Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.216.28.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.216.28.14.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:20:50 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 14.28.216.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.28.216.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
161.35.11.118 attackbotsspam
SSH login attempts.
2020-10-06 16:58:03
202.44.251.211 attackbotsspam
Telnet Server BruteForce Attack
2020-10-06 16:53:42
196.52.43.114 attackspam
IP 196.52.43.114 attacked honeypot on port: 593 at 10/6/2020 12:39:34 AM
2020-10-06 16:47:14
111.161.74.118 attack
Oct  6 05:07:07 firewall sshd[2723]: Failed password for root from 111.161.74.118 port 34234 ssh2
Oct  6 05:09:29 firewall sshd[2751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.74.118  user=root
Oct  6 05:09:32 firewall sshd[2751]: Failed password for root from 111.161.74.118 port 36354 ssh2
...
2020-10-06 16:50:24
106.12.69.250 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-06 16:41:06
187.214.221.44 attack
SSH brute force
2020-10-06 16:30:20
102.165.30.17 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-06 16:35:50
154.92.14.85 attackbots
Invalid user testing from 154.92.14.85 port 47929
2020-10-06 16:22:48
61.240.148.105 attackspambots
2020-10-06 02:24:11.077291-0500  localhost screensharingd[85297]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 61.240.148.105 :: Type: VNC DES
2020-10-06 16:24:06
41.44.222.246 attackbots
Telnet Server BruteForce Attack
2020-10-06 17:00:36
220.132.151.199 attack
Firewall Dropped Connection
2020-10-06 16:34:42
138.59.121.40 attack
Email rejected due to spam filtering
2020-10-06 16:24:59
111.193.247.197 attack
Unauthorised access (Oct  6) SRC=111.193.247.197 LEN=40 TTL=46 ID=48308 TCP DPT=23 WINDOW=29232 SYN 
Unauthorised access (Oct  5) SRC=111.193.247.197 LEN=40 TTL=46 ID=162 TCP DPT=8080 WINDOW=51881 SYN 
Unauthorised access (Oct  5) SRC=111.193.247.197 LEN=40 TTL=46 ID=4741 TCP DPT=23 WINDOW=33224 SYN
2020-10-06 16:49:58
92.223.89.6 attack
Name: Ronaldveinc
Email: belinskiyr317@gmail.com
Phone: 83819623545
Street: Algiers
City: Algiers
Zip: 143252
Message: В интернете большое количество анализаторов сайта, качество работы которых напрямую зависит от тарифных планов. Мы никогда не брали деньги со своей аудитории, не показывали им рекламу и не планируем этого делать  позиции сайта   автоматкалашникова
2020-10-06 17:04:50
58.214.11.123 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-06 16:29:16

Recently Reported IPs

105.216.29.124 105.216.29.243 105.216.3.175 105.216.3.121
105.216.30.157 105.216.3.88 105.216.30.190 105.216.29.88
106.110.235.133 105.216.3.185 119.91.255.148 105.216.30.123
105.216.29.4 105.216.3.72 105.216.3.43 105.216.30.231
105.216.30.14 105.216.30.201 105.216.30.60 105.216.30.211