Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.185.148.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.185.148.33.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 01:26:13 CST 2022
;; MSG SIZE  rcvd: 107
Host info
33.148.185.105.in-addr.arpa domain name pointer 105-185-148-33.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
33.148.185.105.in-addr.arpa	name = 105-185-148-33.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.189.210.2 attackbots
Automatic report - Banned IP Access
2020-10-08 05:45:54
35.222.30.137 attack
20 attempts against mh-ssh on echoip
2020-10-08 05:33:33
206.248.17.106 attackspam
20/10/6@16:44:09: FAIL: Alarm-Network address from=206.248.17.106
20/10/6@16:44:09: FAIL: Alarm-Network address from=206.248.17.106
...
2020-10-08 05:33:08
132.255.20.250 attackbots
Port scan on 5 port(s): 8933 9833 23389 33387 33389
2020-10-08 05:40:45
27.122.12.247 attackbotsspam
27.122.12.247 - - [06/Oct/2020:22:43:48 +0200] "GET /awstats.pl?lang=en&output=main HTTP/1.1" 404 280 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0,gzip(gfe)"
2020-10-08 05:50:14
161.35.72.39 attackspambots
Oct  7 20:11:50 host sshd[9654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.72.39  user=root
Oct  7 20:11:53 host sshd[9654]: Failed password for root from 161.35.72.39 port 44130 ssh2
...
2020-10-08 05:26:22
1.160.93.170 attack
Oct  7 21:22:45 django-0 sshd[12123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1-160-93-170.dynamic-ip.hinet.net  user=root
Oct  7 21:22:47 django-0 sshd[12123]: Failed password for root from 1.160.93.170 port 57678 ssh2
...
2020-10-08 05:27:00
185.202.2.147 attack
Trying ports that it shouldn't be.
2020-10-08 05:43:15
103.45.175.247 attackspambots
Oct  7 23:28:37 [host] sshd[16706]: pam_unix(sshd:
Oct  7 23:28:39 [host] sshd[16706]: Failed passwor
Oct  7 23:32:08 [host] sshd[16730]: pam_unix(sshd:
2020-10-08 06:02:29
218.92.0.251 attackbots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-08 06:01:50
51.38.190.237 attackbots
SS5,WP GET /wp-login.php
GET /wp-login.php
2020-10-08 05:52:37
45.148.122.197 attackspam
SSH break in attempt
...
2020-10-08 06:01:36
106.54.64.77 attackbots
prod11
...
2020-10-08 06:02:14
81.68.90.10 attack
srv02 Mass scanning activity detected Target: 3423  ..
2020-10-08 05:34:00
74.220.219.186 attack
Trolling for resource vulnerabilities
2020-10-08 05:30:05

Recently Reported IPs

176.159.139.80 114.171.131.233 164.123.102.200 60.216.207.221
155.35.172.25 171.177.176.247 30.23.36.125 103.247.146.235
146.8.92.51 243.19.167.144 137.147.99.52 7.111.77.100
225.171.162.72 25.141.73.71 103.169.147.190 169.236.59.123
18.219.201.77 136.71.251.69 213.77.122.162 165.169.218.232