Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.249.3.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.249.3.219.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:12:33 CST 2023
;; MSG SIZE  rcvd: 106
Host info
219.3.249.105.in-addr.arpa domain name pointer vc-cpt-105-249-3-219.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.3.249.105.in-addr.arpa	name = vc-cpt-105-249-3-219.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.70.173.63 attackspam
Aug 30 16:55:14 ns382633 sshd\[10823\]: Invalid user ubuntu from 66.70.173.63 port 35920
Aug 30 16:55:14 ns382633 sshd\[10823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.173.63
Aug 30 16:55:16 ns382633 sshd\[10823\]: Failed password for invalid user ubuntu from 66.70.173.63 port 35920 ssh2
Aug 30 17:03:31 ns382633 sshd\[12432\]: Invalid user test from 66.70.173.63 port 47847
Aug 30 17:03:31 ns382633 sshd\[12432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.173.63
2020-08-31 03:15:04
218.75.72.82 attackspambots
2020-08-31T01:48:14.860324hostname sshd[102379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.72.82
2020-08-31T01:48:14.852700hostname sshd[102379]: Invalid user bruna from 218.75.72.82 port 23639
2020-08-31T01:48:17.123093hostname sshd[102379]: Failed password for invalid user bruna from 218.75.72.82 port 23639 ssh2
...
2020-08-31 03:13:17
58.130.120.224 attackspambots
Aug 30 16:39:44 mout sshd[6974]: Invalid user qwe from 58.130.120.224 port 28729
2020-08-31 03:08:31
117.26.40.38 attackspambots
$f2bV_matches
2020-08-31 03:34:08
2a01:4f8:190:43e1::2 attackbotsspam
20 attempts against mh-misbehave-ban on cedar
2020-08-31 03:03:56
188.166.1.95 attackbotsspam
2020-08-30T18:34:48.633093vps-d63064a2 sshd[6939]: Invalid user nfe from 188.166.1.95 port 48522
2020-08-30T18:34:50.921367vps-d63064a2 sshd[6939]: Failed password for invalid user nfe from 188.166.1.95 port 48522 ssh2
2020-08-30T18:45:28.061402vps-d63064a2 sshd[6964]: Invalid user vbox from 188.166.1.95 port 52607
2020-08-30T18:45:28.071065vps-d63064a2 sshd[6964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.1.95
2020-08-30T18:45:28.061402vps-d63064a2 sshd[6964]: Invalid user vbox from 188.166.1.95 port 52607
2020-08-30T18:45:30.545167vps-d63064a2 sshd[6964]: Failed password for invalid user vbox from 188.166.1.95 port 52607 ssh2
...
2020-08-31 03:32:03
111.229.157.211 attackbotsspam
Aug 30 17:33:15 rush sshd[23068]: Failed password for root from 111.229.157.211 port 38538 ssh2
Aug 30 17:38:42 rush sshd[23320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.157.211
Aug 30 17:38:44 rush sshd[23320]: Failed password for invalid user test001 from 111.229.157.211 port 50984 ssh2
...
2020-08-31 03:14:30
45.40.199.82 attackbotsspam
Aug 30 21:25:53 mellenthin sshd[9490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.82
Aug 30 21:25:54 mellenthin sshd[9490]: Failed password for invalid user spark from 45.40.199.82 port 34804 ssh2
2020-08-31 03:26:20
107.179.117.186 attack
Email rejected due to spam filtering
2020-08-31 03:18:29
46.101.97.5 attack
Aug 30 16:13:07 minden010 sshd[19448]: Failed password for root from 46.101.97.5 port 36900 ssh2
Aug 30 16:17:01 minden010 sshd[20835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.97.5
Aug 30 16:17:02 minden010 sshd[20835]: Failed password for invalid user bill from 46.101.97.5 port 44978 ssh2
...
2020-08-31 03:22:48
79.130.91.140 attackspambots
Attempts against non-existent wp-login
2020-08-31 03:34:33
58.229.114.170 attack
Aug 30 20:12:54 webhost01 sshd[6745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.229.114.170
Aug 30 20:12:56 webhost01 sshd[6745]: Failed password for invalid user apache from 58.229.114.170 port 41120 ssh2
...
2020-08-31 03:17:26
150.109.82.109 attackbotsspam
2020-08-30T19:26:15.801708ks3355764 sshd[26555]: Invalid user sawada from 150.109.82.109 port 60844
2020-08-30T19:26:18.122469ks3355764 sshd[26555]: Failed password for invalid user sawada from 150.109.82.109 port 60844 ssh2
...
2020-08-31 03:09:44
34.75.125.212 attack
Aug 30 16:35:52 ift sshd\[34303\]: Failed password for mysql from 34.75.125.212 port 47002 ssh2Aug 30 16:39:27 ift sshd\[34647\]: Invalid user ganesh from 34.75.125.212Aug 30 16:39:29 ift sshd\[34647\]: Failed password for invalid user ganesh from 34.75.125.212 port 52374 ssh2Aug 30 16:43:02 ift sshd\[35571\]: Invalid user wxc from 34.75.125.212Aug 30 16:43:04 ift sshd\[35571\]: Failed password for invalid user wxc from 34.75.125.212 port 57734 ssh2
...
2020-08-31 03:22:06
58.87.66.249 attackbotsspam
2020-08-30T20:54:16.976056galaxy.wi.uni-potsdam.de sshd[6796]: Failed password for invalid user naresh from 58.87.66.249 port 40598 ssh2
2020-08-30T20:56:15.167288galaxy.wi.uni-potsdam.de sshd[7004]: Invalid user sales from 58.87.66.249 port 35226
2020-08-30T20:56:15.172394galaxy.wi.uni-potsdam.de sshd[7004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.66.249
2020-08-30T20:56:15.167288galaxy.wi.uni-potsdam.de sshd[7004]: Invalid user sales from 58.87.66.249 port 35226
2020-08-30T20:56:17.133786galaxy.wi.uni-potsdam.de sshd[7004]: Failed password for invalid user sales from 58.87.66.249 port 35226 ssh2
2020-08-30T20:58:15.244997galaxy.wi.uni-potsdam.de sshd[7256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.66.249  user=root
2020-08-30T20:58:17.346805galaxy.wi.uni-potsdam.de sshd[7256]: Failed password for root from 58.87.66.249 port 58084 ssh2
2020-08-30T21:00:17.411373galaxy.wi.uni-pots
...
2020-08-31 03:27:07

Recently Reported IPs

105.248.4.96 105.248.186.234 105.248.75.19 105.248.76.178
105.249.77.204 105.249.150.84 105.247.84.162 105.248.208.12
105.248.92.187 105.248.236.226 105.248.232.209 105.25.143.222
105.249.116.197 105.249.82.97 105.249.146.206 105.248.128.254
105.248.86.220 105.249.199.68 105.248.145.193 105.25.72.26