Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.185.49.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15987
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.185.49.0.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:58:43 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 0.49.185.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.49.185.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.25.193.25 attackspam
Automatic report - Banned IP Access
2020-09-17 22:08:16
96.127.179.156 attackspam
20 attempts against mh-ssh on pcx
2020-09-17 22:14:31
39.109.127.91 attackbotsspam
Multiple SSH authentication failures from 39.109.127.91
2020-09-17 22:16:27
14.231.248.86 attackspam
Unauthorized connection attempt from IP address 14.231.248.86 on Port 445(SMB)
2020-09-17 22:20:43
31.44.116.66 attackbots
Automatic report - Port Scan Attack
2020-09-17 21:56:43
161.35.200.85 attackspambots
TCP port : 27478
2020-09-17 21:49:20
181.120.204.164 attack
Sep 16 19:00:44 sip sshd[28867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.120.204.164
Sep 16 19:00:45 sip sshd[28869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.120.204.164
Sep 16 19:00:46 sip sshd[28867]: Failed password for invalid user osmc from 181.120.204.164 port 42390 ssh2
2020-09-17 22:13:36
190.199.78.55 attackspambots
Unauthorized connection attempt from IP address 190.199.78.55 on Port 445(SMB)
2020-09-17 22:07:24
206.189.2.54 attack
206.189.2.54 - - [16/Sep/2020:20:21:34 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.2.54 - - [16/Sep/2020:20:21:34 +0200] "POST /wp-login.php HTTP/1.1" 200 2104 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.2.54 - - [16/Sep/2020:20:21:39 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.2.54 - - [16/Sep/2020:20:21:39 +0200] "POST /wp-login.php HTTP/1.1" 200 2078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.2.54 - - [16/Sep/2020:20:21:44 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.2.54 - - [16/Sep/2020:20:21:45 +0200] "POST /wp-login.php HTTP/1.1" 200 2078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/6
...
2020-09-17 22:05:35
71.189.47.10 attackspambots
5x Failed Password
2020-09-17 22:06:57
82.112.62.181 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 82.112.62.181:22767->gjan.info:23, len 40
2020-09-17 22:19:38
83.149.45.205 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-17 21:41:14
213.150.184.62 attack
2020-09-17T16:40:18.903535mail.standpoint.com.ua sshd[25997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.150.184.62
2020-09-17T16:40:18.900821mail.standpoint.com.ua sshd[25997]: Invalid user kongxx from 213.150.184.62 port 35446
2020-09-17T16:40:20.937994mail.standpoint.com.ua sshd[25997]: Failed password for invalid user kongxx from 213.150.184.62 port 35446 ssh2
2020-09-17T16:42:57.039798mail.standpoint.com.ua sshd[26303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.150.184.62  user=root
2020-09-17T16:42:59.234963mail.standpoint.com.ua sshd[26303]: Failed password for root from 213.150.184.62 port 46732 ssh2
...
2020-09-17 21:55:26
51.158.190.54 attackbotsspam
Sep 17 14:23:54 h2646465 sshd[21252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54  user=root
Sep 17 14:23:57 h2646465 sshd[21252]: Failed password for root from 51.158.190.54 port 37408 ssh2
Sep 17 14:34:45 h2646465 sshd[22558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54  user=root
Sep 17 14:34:47 h2646465 sshd[22558]: Failed password for root from 51.158.190.54 port 42434 ssh2
Sep 17 14:38:29 h2646465 sshd[23142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54  user=root
Sep 17 14:38:30 h2646465 sshd[23142]: Failed password for root from 51.158.190.54 port 54056 ssh2
Sep 17 14:42:09 h2646465 sshd[23793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54  user=root
Sep 17 14:42:11 h2646465 sshd[23793]: Failed password for root from 51.158.190.54 port 37446 ssh2
Sep 17 14:45:58 h2646465 ssh
2020-09-17 21:46:16
123.16.219.184 attack
Unauthorized connection attempt from IP address 123.16.219.184 on Port 445(SMB)
2020-09-17 21:49:38

Recently Reported IPs

105.185.214.105 105.185.24.130 105.185.174.226 105.185.156.195
105.185.158.126 105.185.31.44 105.185.27.134 105.186.110.217
105.185.76.193 105.185.202.69 105.185.184.158 105.185.255.227
105.185.54.150 105.185.169.123 105.185.48.181 105.185.139.106
105.185.177.227 105.185.114.186 105.185.161.117 105.185.120.99