Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.249.241.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.249.241.207.		IN	A

;; AUTHORITY SECTION:
.			374	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:13:00 CST 2023
;; MSG SIZE  rcvd: 108
Host info
207.241.249.105.in-addr.arpa domain name pointer vc-cpt-105-249-241-207.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.241.249.105.in-addr.arpa	name = vc-cpt-105-249-241-207.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
72.143.15.82 attackbotsspam
2019-07-07T06:46:32.585884scmdmz1 sshd\[26572\]: Invalid user uploader from 72.143.15.82 port 57165
2019-07-07T06:46:32.588984scmdmz1 sshd\[26572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.143.15.82
2019-07-07T06:46:34.422428scmdmz1 sshd\[26572\]: Failed password for invalid user uploader from 72.143.15.82 port 57165 ssh2
...
2019-07-07 20:03:18
91.121.142.225 attackbots
SSH Brute Force
2019-07-07 20:06:04
114.39.156.227 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=11683)(07070954)
2019-07-07 19:58:41
190.78.162.206 attackspambots
445/tcp
[2019-07-07]1pkt
2019-07-07 20:00:01
2405:204:5426:3900:84bc:1bf5:a4e5:cd35 attack
Sniffing for wp-login
2019-07-07 19:53:06
94.232.62.112 attackbotsspam
8080/tcp
[2019-07-07]1pkt
2019-07-07 20:19:16
111.252.83.20 attackbots
37215/tcp
[2019-07-07]1pkt
2019-07-07 20:09:46
92.222.216.81 attack
Jul  7 08:54:28 srv03 sshd\[1665\]: Invalid user schneider from 92.222.216.81 port 48393
Jul  7 08:54:28 srv03 sshd\[1665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.81
Jul  7 08:54:30 srv03 sshd\[1665\]: Failed password for invalid user schneider from 92.222.216.81 port 48393 ssh2
2019-07-07 20:15:19
92.222.10.162 attackspam
Jul  7 05:40:57 ArkNodeAT sshd\[10301\]: Invalid user vpn from 92.222.10.162
Jul  7 05:40:57 ArkNodeAT sshd\[10301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.10.162
Jul  7 05:41:00 ArkNodeAT sshd\[10301\]: Failed password for invalid user vpn from 92.222.10.162 port 57530 ssh2
2019-07-07 20:18:58
114.43.222.46 attackbots
37215/tcp
[2019-07-07]1pkt
2019-07-07 19:50:49
118.114.12.122 attackbotsspam
21/tcp 21/tcp
[2019-07-07]2pkt
2019-07-07 19:33:01
103.24.179.35 attackspam
ssh failed login
2019-07-07 20:08:37
42.55.51.174 attack
23/tcp
[2019-07-07]1pkt
2019-07-07 20:12:39
218.234.206.107 attackspam
Jul  7 13:33:49 ncomp sshd[23999]: Invalid user adam from 218.234.206.107
Jul  7 13:33:49 ncomp sshd[23999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107
Jul  7 13:33:49 ncomp sshd[23999]: Invalid user adam from 218.234.206.107
Jul  7 13:33:51 ncomp sshd[23999]: Failed password for invalid user adam from 218.234.206.107 port 34606 ssh2
2019-07-07 20:13:32
51.255.35.41 attackbots
Jul  7 12:39:16 lnxweb62 sshd[5904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.41
Jul  7 12:39:19 lnxweb62 sshd[5904]: Failed password for invalid user test from 51.255.35.41 port 35271 ssh2
Jul  7 12:43:26 lnxweb62 sshd[7750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.41
2019-07-07 19:31:33

Recently Reported IPs

105.247.203.190 105.247.2.239 105.247.195.84 105.247.217.174
105.249.20.35 105.247.170.182 105.248.148.133 105.247.19.124
105.249.58.209 105.249.108.71 105.247.150.233 105.247.17.238
105.249.101.51 105.247.129.11 105.247.140.79 105.247.113.136
105.247.13.131 105.246.42.183 105.246.99.54 105.246.53.15