Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.247.73.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.247.73.47.			IN	A

;; AUTHORITY SECTION:
.			335	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:12:46 CST 2023
;; MSG SIZE  rcvd: 106
Host info
47.73.247.105.in-addr.arpa domain name pointer vc-vb-105-247-73-47.ens.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.73.247.105.in-addr.arpa	name = vc-vb-105-247-73-47.ens.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.251.18.92 attackbots
Automatic report - Port Scan Attack
2020-03-20 05:20:22
122.51.21.44 attackspambots
Invalid user kristofvps from 122.51.21.44 port 50098
2020-03-20 05:25:51
134.209.164.184 attackbots
Mar 19 21:55:29 ns3042688 sshd\[14189\]: Invalid user zhucm from 134.209.164.184
Mar 19 21:55:29 ns3042688 sshd\[14189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.164.184 
Mar 19 21:55:31 ns3042688 sshd\[14189\]: Failed password for invalid user zhucm from 134.209.164.184 port 53802 ssh2
Mar 19 22:02:17 ns3042688 sshd\[15357\]: Invalid user gmodserver from 134.209.164.184
Mar 19 22:02:17 ns3042688 sshd\[15357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.164.184 
...
2020-03-20 05:23:33
68.183.133.156 attackbotsspam
Invalid user root0 from 68.183.133.156 port 44848
2020-03-20 05:06:50
27.154.242.142 attackspambots
Invalid user system from 27.154.242.142 port 19606
2020-03-20 05:12:08
88.150.39.5 attackspambots
Automatic report - SSH Brute-Force Attack
2020-03-20 05:33:41
49.234.163.238 attackspam
5x Failed Password
2020-03-20 05:08:52
211.253.9.160 attackspambots
SSH Invalid Login
2020-03-20 05:44:12
139.199.25.110 attackspambots
fail2ban -- 139.199.25.110
...
2020-03-20 05:22:40
51.178.81.239 attackbotsspam
SSH Invalid Login
2020-03-20 05:37:55
35.241.120.198 attackspam
Invalid user bserver from 35.241.120.198 port 40218
2020-03-20 05:41:28
114.69.249.194 attackbots
SSH Invalid Login
2020-03-20 05:27:12
200.69.250.253 attack
Mar 19 18:06:19 ws24vmsma01 sshd[5701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.250.253
Mar 19 18:06:21 ws24vmsma01 sshd[5701]: Failed password for invalid user postgres from 200.69.250.253 port 44033 ssh2
...
2020-03-20 05:44:28
81.250.231.251 attackbotsspam
[MK-VM5] Blocked by UFW
2020-03-20 05:34:16
46.209.31.146 attackspambots
Mar 19 16:28:29 marvibiene sshd[44857]: Invalid user vncuser from 46.209.31.146 port 38486
Mar 19 16:28:29 marvibiene sshd[44857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.209.31.146
Mar 19 16:28:29 marvibiene sshd[44857]: Invalid user vncuser from 46.209.31.146 port 38486
Mar 19 16:28:31 marvibiene sshd[44857]: Failed password for invalid user vncuser from 46.209.31.146 port 38486 ssh2
...
2020-03-20 05:09:39

Recently Reported IPs

105.248.113.140 105.248.170.211 105.247.29.123 105.247.40.122
105.247.54.187 105.248.49.126 105.247.8.37 105.25.140.115
105.247.215.96 105.247.213.96 105.247.207.82 105.248.22.173
105.247.253.226 105.248.199.184 105.248.72.61 105.247.193.99
105.248.8.81 105.248.10.13 105.247.203.190 105.249.241.207