Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: MTN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.180.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48914
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.180.108.		IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030100 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 15:48:37 CST 2022
;; MSG SIZE  rcvd: 108
Host info
108.180.213.105.in-addr.arpa domain name pointer 105-213-180-108.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.180.213.105.in-addr.arpa	name = 105-213-180-108.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.32.20.107 attackbots
Automatic report - XMLRPC Attack
2019-10-15 21:13:32
162.144.41.232 attackbots
WordPress wp-login brute force :: 162.144.41.232 0.064 BYPASS [15/Oct/2019:22:45:25  1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-15 21:23:35
176.8.178.46 attackspambots
Oct 15 13:21:29 giraffe sshd[26092]: Invalid user pi from 176.8.178.46
Oct 15 13:21:29 giraffe sshd[26093]: Invalid user pi from 176.8.178.46
Oct 15 13:21:29 giraffe sshd[26092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.8.178.46
Oct 15 13:21:29 giraffe sshd[26093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.8.178.46
Oct 15 13:21:31 giraffe sshd[26092]: Failed password for invalid user pi from 176.8.178.46 port 40850 ssh2
Oct 15 13:21:31 giraffe sshd[26093]: Failed password for invalid user pi from 176.8.178.46 port 40852 ssh2
Oct 15 13:21:31 giraffe sshd[26092]: Connection closed by 176.8.178.46 port 40850 [preauth]
Oct 15 13:21:31 giraffe sshd[26093]: Connection closed by 176.8.178.46 port 40852 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.8.178.46
2019-10-15 21:29:23
189.115.28.186 attack
Oct 15 13:24:10 pegasus sshd[1159]: Failed password for invalid user nagesh from 189.115.28.186 port 60954 ssh2
Oct 15 13:24:10 pegasus sshd[1159]: Connection closed by 189.115.28.186 port 60954 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.115.28.186
2019-10-15 21:26:37
131.221.80.211 attackbots
2019-10-15T13:22:30.896092abusebot-3.cloudsearch.cf sshd\[25359\]: Invalid user pardeep from 131.221.80.211 port 12513
2019-10-15 21:47:13
51.77.141.158 attackbotsspam
Oct 15 15:19:53 mout sshd[15050]: Invalid user ubuntu10 from 51.77.141.158 port 57881
2019-10-15 21:33:18
194.84.17.10 attackspambots
Oct 14 14:47:52 rb06 sshd[17992]: reveeclipse mapping checking getaddrinfo for ip10.sub17.equant.ru [194.84.17.10] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 14:47:52 rb06 sshd[17992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.84.17.10  user=r.r
Oct 14 14:47:53 rb06 sshd[17992]: Failed password for r.r from 194.84.17.10 port 50300 ssh2
Oct 14 14:47:53 rb06 sshd[17992]: Received disconnect from 194.84.17.10: 11: Bye Bye [preauth]
Oct 14 14:55:15 rb06 sshd[9320]: reveeclipse mapping checking getaddrinfo for ip10.sub17.equant.ru [194.84.17.10] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 14:55:15 rb06 sshd[9320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.84.17.10  user=r.r
Oct 14 14:55:17 rb06 sshd[9320]: Failed password for r.r from 194.84.17.10 port 53158 ssh2
Oct 14 14:55:17 rb06 sshd[9320]: Received disconnect from 194.84.17.10: 11: Bye Bye [preauth]
Oct 14 14:59:41 rb06 s........
-------------------------------
2019-10-15 21:33:34
46.102.114.246 attackbotsspam
Oct 15 11:44:35 system,error,critical: login failure for user admin from 46.102.114.246 via telnet
Oct 15 11:44:36 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:38 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:44 system,error,critical: login failure for user admin from 46.102.114.246 via telnet
Oct 15 11:44:46 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:47 system,error,critical: login failure for user user from 46.102.114.246 via telnet
Oct 15 11:44:51 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:52 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:55 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:45:01 system,error,critical: login failure for user mother from 46.102.114.246 via telnet
2019-10-15 21:42:42
89.248.168.176 attackspam
10/15/2019-13:45:31.471364 89.248.168.176 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-15 21:21:09
118.144.155.254 attackspam
2019-10-15T12:46:23.451418abusebot-5.cloudsearch.cf sshd\[5775\]: Invalid user rowland from 118.144.155.254 port 48533
2019-10-15 21:14:42
104.236.230.165 attackspam
Oct 15 08:41:50 firewall sshd[1053]: Invalid user zhaozheng from 104.236.230.165
Oct 15 08:41:52 firewall sshd[1053]: Failed password for invalid user zhaozheng from 104.236.230.165 port 50015 ssh2
Oct 15 08:45:30 firewall sshd[1158]: Invalid user cmschef123 from 104.236.230.165
...
2019-10-15 21:20:37
202.131.126.142 attackspambots
Oct 15 09:21:14 plusreed sshd[25328]: Invalid user nathan1 from 202.131.126.142
...
2019-10-15 21:41:16
211.193.13.111 attack
Oct 15 15:04:16 vps647732 sshd[9578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.13.111
Oct 15 15:04:18 vps647732 sshd[9578]: Failed password for invalid user freeswitch from 211.193.13.111 port 48934 ssh2
...
2019-10-15 21:30:27
163.172.204.185 attack
Oct 15 10:11:10 firewall sshd[11514]: Invalid user Password123456 from 163.172.204.185
Oct 15 10:11:11 firewall sshd[11514]: Failed password for invalid user Password123456 from 163.172.204.185 port 42030 ssh2
Oct 15 10:20:46 firewall sshd[11734]: Invalid user sonhn123 from 163.172.204.185
...
2019-10-15 21:27:13
188.254.14.146 attack
2019-10-15 06:34:55 H=(dynamicip-94-180-105-38.pppoe.nsk.ertelecom.ru) [188.254.14.146]:37257 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/188.254.14.146)
2019-10-15 06:44:52 H=(dynamicip-94-180-105-38.pppoe.nsk.ertelecom.ru) [188.254.14.146]:33742 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-10-15 06:44:52 H=(dynamicip-94-180-105-38.pppoe.nsk.ertelecom.ru) [188.254.14.146]:33742 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-10-15 21:47:40

Recently Reported IPs

105.213.189.82 105.213.180.106 105.213.180.101 105.213.180.12
105.213.64.106 105.213.159.111 104.22.78.176 105.213.64.172
105.213.64.178 105.213.64.166 105.213.64.19 105.213.64.190
105.213.64.110 105.213.64.186 105.213.190.190 105.213.64.181
105.213.64.212 104.22.79.176 105.213.64.205 105.213.64.219