Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Cell C

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.7.8.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55250
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.7.8.124.			IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080301 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 04 08:32:34 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 124.8.7.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.8.7.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.70.118 attack
20/4/4@16:44:17: FAIL: IoT-SSH address from=80.82.70.118
...
2020-04-05 05:26:15
106.13.22.60 attackbotsspam
(sshd) Failed SSH login from 106.13.22.60 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  4 15:34:07 ubnt-55d23 sshd[24936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.22.60  user=root
Apr  4 15:34:08 ubnt-55d23 sshd[24936]: Failed password for root from 106.13.22.60 port 38714 ssh2
2020-04-05 05:23:37
74.208.65.52 attack
" "
2020-04-05 05:49:58
80.234.50.75 attackspam
445/tcp
[2020-04-04]1pkt
2020-04-05 05:42:29
37.187.105.36 attackbotsspam
SSH Brute Force
2020-04-05 05:22:48
111.230.219.156 attackspambots
Apr  4 22:02:54 ns3164893 sshd[15712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.219.156  user=root
Apr  4 22:02:56 ns3164893 sshd[15712]: Failed password for root from 111.230.219.156 port 58662 ssh2
...
2020-04-05 05:19:07
85.209.0.5 attack
SSH bruteforce (Triggered fail2ban)
2020-04-05 05:33:54
37.36.116.207 attackspambots
Brute force attack against VPN service
2020-04-05 05:14:04
89.151.44.44 attackbots
61239/udp
[2020-04-04]1pkt
2020-04-05 05:37:13
134.119.1.117 attack
$f2bV_matches
2020-04-05 05:39:42
193.70.118.123 attackspam
Apr  4 23:46:38 master sshd[8228]: Failed password for root from 193.70.118.123 port 52487 ssh2
2020-04-05 05:40:09
170.246.184.12 attack
Automatic report - Banned IP Access
2020-04-05 05:33:01
222.186.173.154 attackspambots
Apr  4 17:33:33 plusreed sshd[1686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Apr  4 17:33:35 plusreed sshd[1686]: Failed password for root from 222.186.173.154 port 50768 ssh2
...
2020-04-05 05:34:24
41.207.184.182 attack
$f2bV_matches
2020-04-05 05:38:30
92.118.37.86 attack
firewall-block, port(s): 6689/tcp, 8000/tcp
2020-04-05 05:25:16

Recently Reported IPs

123.18.0.180 190.24.41.83 129.242.114.152 5.47.150.246
49.228.111.62 41.181.49.208 174.39.188.131 221.53.177.67
130.25.136.196 112.171.233.54 184.159.54.56 59.170.90.120
104.185.122.134 31.129.172.86 83.181.69.255 222.72.45.130
222.85.6.175 196.98.91.145 174.248.203.239 179.210.233.243