Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.240.198.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.240.198.105.		IN	A

;; AUTHORITY SECTION:
.			220	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:46:11 CST 2023
;; MSG SIZE  rcvd: 108
Host info
105.198.240.105.in-addr.arpa domain name pointer vc-gp-n-105-240-198-105.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.198.240.105.in-addr.arpa	name = vc-gp-n-105-240-198-105.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.186.7.52 attackspam
Brute forcing email accounts
2020-03-26 14:38:28
178.32.172.246 attackspambots
Invalid user ke from 178.32.172.246 port 54563
2020-03-26 14:29:44
183.89.214.145 attackspambots
Mar 26 04:52:14 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:183.89.214.145\]
...
2020-03-26 15:04:55
200.195.174.227 attackbots
Invalid user mario from 200.195.174.227 port 35586
2020-03-26 14:29:11
49.254.42.156 attack
Mar 26 08:32:10 pkdns2 sshd\[44252\]: Invalid user sh from 49.254.42.156Mar 26 08:32:13 pkdns2 sshd\[44252\]: Failed password for invalid user sh from 49.254.42.156 port 28564 ssh2Mar 26 08:37:01 pkdns2 sshd\[44441\]: Invalid user mu from 49.254.42.156Mar 26 08:37:03 pkdns2 sshd\[44441\]: Failed password for invalid user mu from 49.254.42.156 port 32558 ssh2Mar 26 08:41:55 pkdns2 sshd\[44658\]: Invalid user aufbauorganisation from 49.254.42.156Mar 26 08:41:57 pkdns2 sshd\[44658\]: Failed password for invalid user aufbauorganisation from 49.254.42.156 port 26596 ssh2
...
2020-03-26 14:43:02
94.131.243.27 attackbots
Invalid user aviation from 94.131.243.27 port 50192
2020-03-26 14:28:41
123.207.142.31 attackspambots
Brute force attempt
2020-03-26 14:57:22
36.110.78.62 attackbotsspam
Total attacks: 6
2020-03-26 14:34:20
107.180.92.3 attack
$f2bV_matches
2020-03-26 14:50:54
158.69.220.70 attackbots
Mar 26 06:15:07 pi sshd[9598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.220.70 
Mar 26 06:15:10 pi sshd[9598]: Failed password for invalid user ambulator from 158.69.220.70 port 43612 ssh2
2020-03-26 14:21:47
220.231.127.6 attackbotsspam
Unauthorized connection attempt detected from IP address 220.231.127.6 to port 445
2020-03-26 14:27:37
49.234.216.52 attackbotsspam
Invalid user sinusbot from 49.234.216.52 port 37520
2020-03-26 14:27:12
79.98.79.170 attack
Mar 26 06:37:14 legacy sshd[30958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.98.79.170
Mar 26 06:37:16 legacy sshd[30958]: Failed password for invalid user gaochangfeng from 79.98.79.170 port 54398 ssh2
Mar 26 06:40:38 legacy sshd[31042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.98.79.170
...
2020-03-26 14:45:13
190.94.18.2 attackbotsspam
Invalid user sauv from 190.94.18.2 port 35432
2020-03-26 14:50:13
129.226.50.78 attackbotsspam
SSH login attempts.
2020-03-26 14:58:32

Recently Reported IPs

105.241.12.247 105.240.192.116 105.241.140.95 105.240.34.68
105.240.30.240 105.240.207.142 105.241.72.231 105.241.145.154
105.240.18.27 105.240.80.164 105.242.142.50 105.240.171.212
105.240.77.213 105.240.79.125 105.240.156.191 105.240.59.162
105.240.24.219 105.240.168.8 105.241.173.34 105.240.31.28