Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.242.171.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.242.171.89.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:45:51 CST 2023
;; MSG SIZE  rcvd: 107
Host info
89.171.242.105.in-addr.arpa domain name pointer vc-gp-n-105-242-171-89.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.171.242.105.in-addr.arpa	name = vc-gp-n-105-242-171-89.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.123.188.127 attackbots
(imapd) Failed IMAP login from 5.123.188.127 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 24 09:44:50 ir1 dovecot[3110802]: imap-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=5.123.188.127, lip=5.63.12.44, session=<46pNDSmrfgsFe7x/>
2020-07-24 21:21:14
43.242.178.193 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-24 21:06:27
122.51.31.171 attackspam
$f2bV_matches
2020-07-24 21:10:55
106.13.215.17 attack
Jul 24 13:31:43 ajax sshd[26446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.215.17 
Jul 24 13:31:46 ajax sshd[26446]: Failed password for invalid user server1 from 106.13.215.17 port 39156 ssh2
2020-07-24 21:42:28
95.110.129.91 attackbots
Automatically reported by fail2ban report script (mx1)
2020-07-24 21:23:17
123.207.107.144 attackspambots
Jul 24 15:28:00 h2427292 sshd\[5521\]: Invalid user panther from 123.207.107.144
Jul 24 15:28:00 h2427292 sshd\[5521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.107.144 
Jul 24 15:28:03 h2427292 sshd\[5521\]: Failed password for invalid user panther from 123.207.107.144 port 39174 ssh2
...
2020-07-24 21:41:43
192.144.218.101 attack
Invalid user abuseio from 192.144.218.101 port 46330
2020-07-24 21:27:03
111.231.55.74 attackbotsspam
Invalid user huanghao from 111.231.55.74 port 33834
2020-07-24 21:42:09
72.69.175.165 attackbots
"$f2bV_matches"
2020-07-24 21:13:04
91.193.206.90 attackbots
Invalid user riccardo from 91.193.206.90 port 34332
2020-07-24 21:40:12
91.232.4.149 attack
Invalid user miyagi from 91.232.4.149 port 34242
2020-07-24 21:37:01
220.133.95.68 attackbotsspam
Invalid user admin from 220.133.95.68 port 54214
2020-07-24 21:13:33
159.203.87.95 attack
Jul 24 14:35:59 ns382633 sshd\[18609\]: Invalid user test from 159.203.87.95 port 39944
Jul 24 14:35:59 ns382633 sshd\[18609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.87.95
Jul 24 14:36:01 ns382633 sshd\[18609\]: Failed password for invalid user test from 159.203.87.95 port 39944 ssh2
Jul 24 14:47:58 ns382633 sshd\[20570\]: Invalid user rodrigo from 159.203.87.95 port 32890
Jul 24 14:47:58 ns382633 sshd\[20570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.87.95
2020-07-24 21:22:29
46.22.224.179 attackbotsspam
Port Scan
...
2020-07-24 21:37:28
59.152.237.118 attackspam
Invalid user dev from 59.152.237.118 port 33084
2020-07-24 21:42:46

Recently Reported IPs

105.242.224.255 105.242.159.190 105.242.119.216 105.241.66.170
105.242.170.130 105.242.80.176 105.241.73.88 105.241.62.216
105.242.167.212 105.242.146.113 105.241.45.77 105.241.27.236
105.242.132.130 105.241.207.221 105.241.210.96 105.242.109.131
105.241.52.173 105.242.108.11 105.241.87.213 105.242.134.48