Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Camperdown

Region: KwaZulu-Natal

Country: South Africa

Internet Service Provider: Vodacom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.252.242.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.252.242.171.		IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400

;; Query time: 131 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 16:04:36 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 171.242.252.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 171.242.252.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.112.160.203 attack
May 24 08:03:53 vps647732 sshd[3394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.160.203
May 24 08:03:55 vps647732 sshd[3394]: Failed password for invalid user ahb from 193.112.160.203 port 52756 ssh2
...
2020-05-24 16:32:12
106.13.84.151 attackbots
(sshd) Failed SSH login from 106.13.84.151 (CN/China/-): 5 in the last 3600 secs
2020-05-24 16:07:07
138.197.213.227 attackspam
May 24 09:12:04 dev0-dcde-rnet sshd[13224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.227
May 24 09:12:06 dev0-dcde-rnet sshd[13224]: Failed password for invalid user rur from 138.197.213.227 port 32832 ssh2
May 24 09:14:58 dev0-dcde-rnet sshd[13249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.227
2020-05-24 15:55:00
222.186.171.108 attack
reported through recidive - multiple failed attempts(SSH)
2020-05-24 16:04:08
152.136.22.63 attack
Invalid user djc from 152.136.22.63 port 45304
2020-05-24 16:11:45
178.47.132.182 attack
(imapd) Failed IMAP login from 178.47.132.182 (RU/Russia/dsl-178-47-132-182.permonline.ru): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 24 08:20:24 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 14 secs): user=, method=PLAIN, rip=178.47.132.182, lip=5.63.12.44, session=
2020-05-24 16:14:20
193.70.112.6 attack
Wordpress malicious attack:[sshd]
2020-05-24 15:59:33
138.118.102.244 attackbots
scan z
2020-05-24 16:12:23
222.186.175.167 attack
May 24 08:05:45 IngegnereFirenze sshd[16519]: User root from 222.186.175.167 not allowed because not listed in AllowUsers
...
2020-05-24 16:08:18
218.92.0.195 attackbots
May 24 09:05:19 cdc sshd[32120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.195  user=root
May 24 09:05:20 cdc sshd[32120]: Failed password for invalid user root from 218.92.0.195 port 43692 ssh2
2020-05-24 16:06:52
114.26.193.161 attackspam
firewall-block, port(s): 23/tcp
2020-05-24 16:29:54
87.251.74.48 attack
[portscan] tcp/22 [SSH]
[scan/connect: 4 time(s)]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(05241101)
2020-05-24 16:27:24
180.167.240.210 attackspam
Invalid user jbo from 180.167.240.210 port 37938
2020-05-24 15:52:00
62.148.142.202 attackbots
May 24 10:24:27 ift sshd\[4067\]: Invalid user rpa from 62.148.142.202May 24 10:24:28 ift sshd\[4067\]: Failed password for invalid user rpa from 62.148.142.202 port 60290 ssh2May 24 10:27:13 ift sshd\[4466\]: Invalid user tjo from 62.148.142.202May 24 10:27:15 ift sshd\[4466\]: Failed password for invalid user tjo from 62.148.142.202 port 46946 ssh2May 24 10:30:01 ift sshd\[4654\]: Invalid user uju from 62.148.142.202
...
2020-05-24 16:18:01
113.161.53.147 attack
Invalid user bve from 113.161.53.147 port 40483
2020-05-24 16:21:26

Recently Reported IPs

149.67.198.108 65.209.54.47 212.147.166.76 225.31.69.185
44.177.57.241 59.17.5.25 236.194.210.92 30.228.84.53
98.44.117.123 34.108.56.238 135.140.19.240 95.67.11.197
95.205.167.119 211.118.80.248 69.106.163.65 160.177.232.109
5.164.255.219 33.244.255.205 149.179.235.31 253.104.96.193