Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.247.213.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.247.213.96.			IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:12:50 CST 2023
;; MSG SIZE  rcvd: 107
Host info
96.213.247.105.in-addr.arpa domain name pointer vc-vb-105-247-213-96.ens.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
96.213.247.105.in-addr.arpa	name = vc-vb-105-247-213-96.ens.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.68.99.138 attackbotsspam
Unauthorized connection attempt detected from IP address 118.68.99.138 to port 445 [T]
2020-05-09 02:56:54
153.232.44.240 attackspambots
Unauthorized connection attempt detected from IP address 153.232.44.240 to port 80 [T]
2020-05-09 02:51:19
43.247.91.111 attack
Unauthorized connection attempt detected from IP address 43.247.91.111 to port 8080 [T]
2020-05-09 03:12:28
187.160.114.228 attack
Unauthorized connection attempt detected from IP address 187.160.114.228 to port 445 [T]
2020-05-09 02:44:37
203.6.237.234 attack
Unauthorized connection attempt detected from IP address 203.6.237.234 to port 8492 [T]
2020-05-09 02:39:51
103.109.109.250 attackbots
Unauthorized connection attempt detected from IP address 103.109.109.250 to port 445 [T]
2020-05-09 03:05:00
49.143.32.6 attackspam
Unauthorized connection attempt detected from IP address 49.143.32.6 to port 80 [T]
2020-05-09 03:10:48
196.52.43.115 attackspam
...
2020-05-09 02:41:55
111.196.230.48 attack
Unauthorized connection attempt detected from IP address 111.196.230.48 to port 5555 [T]
2020-05-09 03:02:22
110.228.32.110 attackspam
Unauthorized connection attempt detected from IP address 110.228.32.110 to port 23 [T]
2020-05-09 03:03:07
51.15.191.81 attack
Unauthorized connection attempt detected from IP address 51.15.191.81 to port 4567
2020-05-09 03:09:54
160.176.250.56 attack
Unauthorized connection attempt detected from IP address 160.176.250.56 to port 445 [T]
2020-05-09 02:50:18
39.85.111.152 attackbots
Unauthorized connection attempt detected from IP address 39.85.111.152 to port 23 [T]
2020-05-09 03:14:35
112.231.35.159 attackbots
May  8 15:15:00 firewall sshd[24972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.231.35.159
May  8 15:15:00 firewall sshd[24972]: Invalid user pi from 112.231.35.159
May  8 15:15:02 firewall sshd[24972]: Failed password for invalid user pi from 112.231.35.159 port 43378 ssh2
...
2020-05-09 03:00:22
222.94.212.72 attackspambots
Unauthorized connection attempt detected from IP address 222.94.212.72 to port 1133 [T]
2020-05-09 02:36:21

Recently Reported IPs

105.247.215.96 105.247.207.82 105.248.22.173 105.247.253.226
105.248.199.184 105.248.72.61 105.247.193.99 105.248.8.81
105.248.10.13 105.247.203.190 105.249.241.207 105.247.2.239
105.247.195.84 105.247.217.174 105.249.20.35 105.247.170.182
105.248.148.133 105.247.19.124 105.249.58.209 105.249.108.71