Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bothasig

Region: Western Cape

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.185.26.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.185.26.68.			IN	A

;; AUTHORITY SECTION:
.			316	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101301 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 14 02:09:04 CST 2023
;; MSG SIZE  rcvd: 106
Host info
68.26.185.105.in-addr.arpa domain name pointer 105-185-26-68.apn.mobile.telkomsa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.26.185.105.in-addr.arpa	name = 105-185-26-68.apn.mobile.telkomsa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.132.215.152 attack
23/tcp
[2019-12-12]1pkt
2019-12-13 01:37:17
63.80.189.94 attack
Autoban   63.80.189.94 AUTH/CONNECT
2019-12-13 01:21:47
45.55.184.78 attackbotsspam
Dec 12 07:25:08 hanapaa sshd\[29008\]: Invalid user weitmann from 45.55.184.78
Dec 12 07:25:08 hanapaa sshd\[29008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78
Dec 12 07:25:10 hanapaa sshd\[29008\]: Failed password for invalid user weitmann from 45.55.184.78 port 56498 ssh2
Dec 12 07:32:36 hanapaa sshd\[29657\]: Invalid user wwwrun from 45.55.184.78
Dec 12 07:32:36 hanapaa sshd\[29657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78
2019-12-13 01:35:02
63.80.189.150 attackbots
Autoban   63.80.189.150 AUTH/CONNECT
2019-12-13 01:51:48
63.80.189.158 attackspambots
Autoban   63.80.189.158 AUTH/CONNECT
2019-12-13 01:44:28
63.80.189.139 attackbotsspam
Autoban   63.80.189.139 AUTH/CONNECT
2019-12-13 01:59:28
123.154.80.97 attack
Dec 12 15:39:07 grey postfix/smtpd\[14541\]: NOQUEUE: reject: RCPT from unknown\[123.154.80.97\]: 554 5.7.1 Service unavailable\; Client host \[123.154.80.97\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[123.154.80.97\]\; from=\ to=\ proto=SMTP helo=\
...
2019-12-13 01:40:38
114.24.198.38 attack
23/tcp
[2019-12-12]1pkt
2019-12-13 01:26:57
116.101.234.240 attackspam
445/tcp 445/tcp 445/tcp
[2019-12-12]3pkt
2019-12-13 01:21:20
63.80.189.169 attackspam
Autoban   63.80.189.169 AUTH/CONNECT
2019-12-13 01:36:15
63.80.189.185 attackspambots
Autoban   63.80.189.185 AUTH/CONNECT
2019-12-13 01:27:14
112.85.42.186 attack
Dec 12 22:50:17 areeb-Workstation sshd[10908]: Failed password for root from 112.85.42.186 port 52926 ssh2
...
2019-12-13 01:37:35
51.79.60.147 attack
--- report ---
Dec 12 12:45:16 sshd: Connection from 51.79.60.147 port 49024
Dec 12 12:45:16 sshd: Invalid user dermardiros from 51.79.60.147
Dec 12 12:45:18 sshd: Failed password for invalid user dermardiros from 51.79.60.147 port 49024 ssh2
Dec 12 12:45:18 sshd: Received disconnect from 51.79.60.147: 11: Bye Bye [preauth]
2019-12-13 01:32:35
63.81.87.103 attack
Autoban   63.81.87.103 AUTH/CONNECT
2019-12-13 01:19:30
203.70.217.40 attack
445/tcp 445/tcp
[2019-12-12]2pkt
2019-12-13 01:42:22

Recently Reported IPs

30.27.130.201 76.133.40.17 65.6.125.20 244.64.117.48
96.113.200.133 10.112.12.135 86.210.126.206 5.160.223.186
122.53.197.40 36.241.165.101 186.178.208.240 249.2.105.210
91.146.138.138 56.190.41.91 156.225.23.233 195.180.182.61
31.150.45.116 76.146.96.247 169.48.233.22 60.218.39.97