Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.185.149.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.185.149.75.			IN	A

;; AUTHORITY SECTION:
.			212	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:58:58 CST 2023
;; MSG SIZE  rcvd: 107
Host info
75.149.185.105.in-addr.arpa domain name pointer 105-185-149-75.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.149.185.105.in-addr.arpa	name = 105-185-149-75.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.129.33.58 attack
ET DROP Dshield Block Listed Source group 1 - port: 3430 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 16:43:40
77.241.49.45 attackbots
Automatic report - Port Scan Attack
2020-09-30 17:08:02
183.181.90.55 attackspambots
ang 183.181.90.55 [29/Sep/2020:19:47:32 "-" "POST /wp-login.php 200 2357
183.181.90.55 [30/Sep/2020:06:44:40 "-" "GET /wp-login.php 200 1711
183.181.90.55 [30/Sep/2020:06:44:43 "-" "POST /wp-login.php 200 2103
2020-09-30 17:27:24
187.162.61.10 attackbotsspam
Automatic report - Port Scan Attack
2020-09-30 17:11:43
200.69.234.168 attackbots
Invalid user wind2017 from 200.69.234.168 port 38554
2020-09-30 17:02:45
66.68.187.140 attackspambots
$f2bV_matches
2020-09-30 16:38:30
41.33.250.219 attack
RDPBrutePap24
2020-09-30 17:20:52
211.197.251.121 attackspam
$f2bV_matches
2020-09-30 16:19:31
104.206.128.38 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-30 16:03:00
223.171.46.146 attack
sshd: Failed password for invalid user .... from 223.171.46.146 port 1975 ssh2
2020-09-30 17:23:22
45.148.121.138 attackspam
10 packets to port 5060
2020-09-30 16:41:47
87.242.234.181 attackspam
(sshd) Failed SSH login from 87.242.234.181 (GB/United Kingdom/host-87-242-234-181.ppp.onetel.net.uk): 5 in the last 3600 secs
2020-09-30 16:34:08
45.129.33.129 attackbots
 TCP (SYN) 45.129.33.129:47355 -> port 1434, len 44
2020-09-30 16:42:28
176.43.171.173 attackspam
Unauthorised access (Sep 29) SRC=176.43.171.173 LEN=52 TTL=116 ID=187 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-30 17:09:29
45.129.33.43 attack
 TCP (SYN) 45.129.33.43:47368 -> port 28954, len 44
2020-09-30 16:44:35

Recently Reported IPs

105.185.0.21 105.185.123.163 105.184.81.89 105.184.89.39
105.184.84.106 105.184.82.197 105.184.73.24 105.184.6.54
105.184.54.17 105.184.49.219 105.184.44.86 105.184.50.10
105.184.41.119 105.184.36.240 105.184.27.213 105.184.32.118
105.184.249.32 105.184.244.152 105.184.237.239 105.184.250.0