Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.216.39.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.216.39.114.			IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:57:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 114.39.216.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.39.216.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.144.143 attackspam
Apr 25 07:27:27 [host] sshd[4675]: Invalid user te
Apr 25 07:27:28 [host] sshd[4675]: pam_unix(sshd:a
Apr 25 07:27:30 [host] sshd[4675]: Failed password
2020-04-25 15:38:42
118.25.99.44 attackbots
Invalid user zv from 118.25.99.44 port 43888
2020-04-25 15:32:38
125.124.40.19 attackbotsspam
Invalid user zg from 125.124.40.19 port 51792
2020-04-25 15:19:56
104.236.228.46 attackspambots
Apr 25 08:40:03 ns381471 sshd[8327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.228.46
Apr 25 08:40:05 ns381471 sshd[8327]: Failed password for invalid user roosevelt1 from 104.236.228.46 port 59416 ssh2
2020-04-25 15:17:59
36.67.81.7 attackbots
2020-04-25 05:55:50,732 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 36.67.81.7
2020-04-25 06:30:54,586 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 36.67.81.7
2020-04-25 07:11:13,874 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 36.67.81.7
2020-04-25 07:47:19,231 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 36.67.81.7
2020-04-25 08:23:54,141 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 36.67.81.7
...
2020-04-25 14:59:48
190.196.64.93 attack
$f2bV_matches
2020-04-25 14:58:32
80.82.77.189 attack
Port scan(s) denied
2020-04-25 15:10:33
2607:5300:60:e28::1 attackspam
ENG,WP GET /wp-login.php
2020-04-25 15:36:08
159.203.30.208 attackspambots
Invalid user hp from 159.203.30.208 port 56519
2020-04-25 15:14:44
14.146.94.223 attack
Invalid user hl from 14.146.94.223 port 43000
2020-04-25 15:33:55
93.126.11.249 attackbots
(sshd) Failed SSH login from 93.126.11.249 (IR/Iran/asmanfaraz.249.11.126.93.in-addr.arpa): 5 in the last 3600 secs
2020-04-25 14:57:27
106.12.93.251 attack
Invalid user postgres from 106.12.93.251 port 45270
2020-04-25 15:02:24
200.88.168.113 attackspambots
DATE:2020-04-25 06:14:33,IP:200.88.168.113,MATCHES:11,PORT:ssh
2020-04-25 15:16:59
88.230.30.113 attackbotsspam
xmlrpc attack
2020-04-25 15:01:08
111.68.98.152 attack
Apr 25 05:59:35 scw-6657dc sshd[1511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.98.152
Apr 25 05:59:35 scw-6657dc sshd[1511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.98.152
Apr 25 05:59:37 scw-6657dc sshd[1511]: Failed password for invalid user changeme from 111.68.98.152 port 52292 ssh2
...
2020-04-25 15:29:22

Recently Reported IPs

105.216.39.149 105.216.39.168 105.216.39.7 105.216.39.213
105.216.39.92 105.216.39.95 105.216.4.114 105.216.38.203
105.216.4.162 105.216.39.73 105.216.4.51 101.17.163.47
105.216.4.69 105.216.40.124 105.216.4.59 105.216.40.233
105.216.4.88 105.216.40.16 105.216.40.43 105.216.40.1