Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.242.207.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.242.207.77.			IN	A

;; AUTHORITY SECTION:
.			82	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:46:05 CST 2023
;; MSG SIZE  rcvd: 107
Host info
77.207.242.105.in-addr.arpa domain name pointer vc-gp-n-105-242-207-77.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
77.207.242.105.in-addr.arpa	name = vc-gp-n-105-242-207-77.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.94.225 attackspambots
Dec  2 08:06:58 webhost01 sshd[26111]: Failed password for news from 139.59.94.225 port 59524 ssh2
...
2019-12-02 09:17:48
27.72.105.157 attackbotsspam
Dec  2 02:09:21 * sshd[10455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.105.157
Dec  2 02:09:23 * sshd[10455]: Failed password for invalid user dillyn from 27.72.105.157 port 37562 ssh2
2019-12-02 09:28:05
121.12.151.250 attackbotsspam
Dec  2 05:58:56 MK-Soft-Root2 sshd[28333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.12.151.250 
Dec  2 05:58:58 MK-Soft-Root2 sshd[28333]: Failed password for invalid user test from 121.12.151.250 port 60484 ssh2
...
2019-12-02 13:15:17
222.186.175.163 attack
Dec  2 02:12:26 h2177944 sshd\[4756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
Dec  2 02:12:28 h2177944 sshd\[4756\]: Failed password for root from 222.186.175.163 port 19664 ssh2
Dec  2 02:12:31 h2177944 sshd\[4756\]: Failed password for root from 222.186.175.163 port 19664 ssh2
Dec  2 02:12:35 h2177944 sshd\[4756\]: Failed password for root from 222.186.175.163 port 19664 ssh2
...
2019-12-02 09:15:17
49.232.163.32 attackbots
Dec  1 18:52:08 hpm sshd\[13385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.163.32  user=backup
Dec  1 18:52:10 hpm sshd\[13385\]: Failed password for backup from 49.232.163.32 port 40368 ssh2
Dec  1 18:59:13 hpm sshd\[14204\]: Invalid user euromath from 49.232.163.32
Dec  1 18:59:13 hpm sshd\[14204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.163.32
Dec  1 18:59:15 hpm sshd\[14204\]: Failed password for invalid user euromath from 49.232.163.32 port 36168 ssh2
2019-12-02 13:01:50
51.77.201.36 attackbotsspam
Dec  2 05:52:52 vps691689 sshd[3661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.201.36
Dec  2 05:52:54 vps691689 sshd[3661]: Failed password for invalid user hausding from 51.77.201.36 port 42350 ssh2
...
2019-12-02 13:16:26
112.85.42.178 attackbots
2019-12-02T05:10:34.216190abusebot-3.cloudsearch.cf sshd\[25252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
2019-12-02 13:15:41
51.77.148.77 attack
Dec  2 01:57:21 legacy sshd[22345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.148.77
Dec  2 01:57:23 legacy sshd[22345]: Failed password for invalid user admin from 51.77.148.77 port 33218 ssh2
Dec  2 02:02:59 legacy sshd[22565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.148.77
...
2019-12-02 09:10:58
94.177.189.102 attackspam
Dec  1 18:51:32 sachi sshd\[2828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.189.102  user=backup
Dec  1 18:51:34 sachi sshd\[2828\]: Failed password for backup from 94.177.189.102 port 46984 ssh2
Dec  1 18:59:10 sachi sshd\[3585\]: Invalid user endia from 94.177.189.102
Dec  1 18:59:10 sachi sshd\[3585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.189.102
Dec  1 18:59:12 sachi sshd\[3585\]: Failed password for invalid user endia from 94.177.189.102 port 35764 ssh2
2019-12-02 13:03:49
49.235.101.153 attack
$f2bV_matches
2019-12-02 13:12:38
27.72.105.157 attackspam
Dec  1 18:51:29 hanapaa sshd\[21357\]: Invalid user gwynith from 27.72.105.157
Dec  1 18:51:29 hanapaa sshd\[21357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.105.157
Dec  1 18:51:30 hanapaa sshd\[21357\]: Failed password for invalid user gwynith from 27.72.105.157 port 47150 ssh2
Dec  1 18:58:57 hanapaa sshd\[22111\]: Invalid user squid from 27.72.105.157
Dec  1 18:58:57 hanapaa sshd\[22111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.105.157
2019-12-02 13:14:33
190.187.104.146 attackspambots
Dec  1 23:36:22 ns382633 sshd\[1873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.187.104.146  user=root
Dec  1 23:36:24 ns382633 sshd\[1873\]: Failed password for root from 190.187.104.146 port 38816 ssh2
Dec  1 23:48:05 ns382633 sshd\[3992\]: Invalid user vipan from 190.187.104.146 port 33486
Dec  1 23:48:05 ns382633 sshd\[3992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.187.104.146
Dec  1 23:48:07 ns382633 sshd\[3992\]: Failed password for invalid user vipan from 190.187.104.146 port 33486 ssh2
2019-12-02 09:27:16
5.188.84.120 attack
Joomla User : try to access forms...
2019-12-02 09:18:18
13.85.68.8 attack
Dec  2 06:19:29 vtv3 sshd[6351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.85.68.8 
Dec  2 06:19:31 vtv3 sshd[6351]: Failed password for invalid user marekniewadzi from 13.85.68.8 port 60362 ssh2
Dec  2 06:25:10 vtv3 sshd[9738]: Failed password for root from 13.85.68.8 port 46388 ssh2
Dec  2 06:37:37 vtv3 sshd[15680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.85.68.8 
Dec  2 06:37:40 vtv3 sshd[15680]: Failed password for invalid user beauchaine from 13.85.68.8 port 45552 ssh2
Dec  2 06:43:32 vtv3 sshd[18515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.85.68.8 
Dec  2 06:56:18 vtv3 sshd[24659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.85.68.8 
Dec  2 06:56:20 vtv3 sshd[24659]: Failed password for invalid user wwwadmin from 13.85.68.8 port 58410 ssh2
Dec  2 07:02:19 vtv3 sshd[27575]: pam_unix(sshd:auth): authentication
2019-12-02 13:21:21
118.24.201.132 attackbotsspam
Dec  1 23:59:04 TORMINT sshd\[31735\]: Invalid user web2 from 118.24.201.132
Dec  1 23:59:04 TORMINT sshd\[31735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.132
Dec  1 23:59:06 TORMINT sshd\[31735\]: Failed password for invalid user web2 from 118.24.201.132 port 58600 ssh2
...
2019-12-02 13:06:00

Recently Reported IPs

105.241.197.246 105.241.191.184 105.242.156.173 105.241.102.143
105.242.196.236 105.241.214.61 105.241.103.236 105.241.227.194
105.241.186.74 105.241.76.149 105.242.135.62 105.241.228.83
105.241.167.247 105.240.3.247 105.241.216.104 105.241.114.125
105.241.12.247 105.240.198.105 105.240.192.116 105.241.140.95