Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.180.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29706
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.180.231.		IN	A

;; AUTHORITY SECTION:
.			346	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:51:15 CST 2022
;; MSG SIZE  rcvd: 108
Host info
231.180.213.105.in-addr.arpa domain name pointer 105-213-180-231.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
231.180.213.105.in-addr.arpa	name = 105-213-180-231.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.35.180.100 attackbotsspam
Brute force SMTP login attempted.
...
2020-04-06 15:47:54
157.230.231.39 attackspam
Apr  6 07:02:07 ns382633 sshd\[14408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.231.39  user=root
Apr  6 07:02:09 ns382633 sshd\[14408\]: Failed password for root from 157.230.231.39 port 59714 ssh2
Apr  6 07:12:40 ns382633 sshd\[16484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.231.39  user=root
Apr  6 07:12:42 ns382633 sshd\[16484\]: Failed password for root from 157.230.231.39 port 53046 ssh2
Apr  6 07:15:29 ns382633 sshd\[17226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.231.39  user=root
2020-04-06 16:04:56
114.69.249.194 attackbots
2020-04-06T08:44:16.549115  sshd[4234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.69.249.194  user=root
2020-04-06T08:44:18.776619  sshd[4234]: Failed password for root from 114.69.249.194 port 42741 ssh2
2020-04-06T08:52:43.354647  sshd[4432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.69.249.194  user=root
2020-04-06T08:52:44.850592  sshd[4432]: Failed password for root from 114.69.249.194 port 59798 ssh2
...
2020-04-06 16:16:26
36.84.113.120 attackbots
1586145242 - 04/06/2020 05:54:02 Host: 36.84.113.120/36.84.113.120 Port: 445 TCP Blocked
2020-04-06 15:32:31
49.88.112.55 attack
Apr  6 09:33:17 vps sshd[920785]: Failed password for root from 49.88.112.55 port 17088 ssh2
Apr  6 09:33:20 vps sshd[920785]: Failed password for root from 49.88.112.55 port 17088 ssh2
Apr  6 09:33:24 vps sshd[920785]: Failed password for root from 49.88.112.55 port 17088 ssh2
Apr  6 09:33:27 vps sshd[920785]: Failed password for root from 49.88.112.55 port 17088 ssh2
Apr  6 09:33:31 vps sshd[920785]: Failed password for root from 49.88.112.55 port 17088 ssh2
...
2020-04-06 15:45:32
159.203.166.132 attackspambots
(smtpauth) Failed SMTP AUTH login from 159.203.166.132 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-06 08:24:02 login authenticator failed for (ADMIN) [159.203.166.132]: 535 Incorrect authentication data (set_id=info@tookatarh.com)
2020-04-06 15:26:29
157.230.127.240 attackbots
(sshd) Failed SSH login from 157.230.127.240 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  6 06:50:41 srv sshd[32566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.127.240  user=root
Apr  6 06:50:42 srv sshd[32566]: Failed password for root from 157.230.127.240 port 57636 ssh2
Apr  6 06:54:23 srv sshd[32677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.127.240  user=root
Apr  6 06:54:25 srv sshd[32677]: Failed password for root from 157.230.127.240 port 35990 ssh2
Apr  6 06:57:18 srv sshd[32712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.127.240  user=root
2020-04-06 16:20:43
198.20.103.242 attackspambots
Unauthorized connection attempt detected from IP address 198.20.103.242 to port 8443
2020-04-06 16:00:21
49.236.195.150 attackspam
$f2bV_matches
2020-04-06 15:39:39
103.108.76.7 attack
20/4/5@23:53:57: FAIL: Alarm-Network address from=103.108.76.7
...
2020-04-06 15:34:53
85.51.12.244 attack
Triggered by Fail2Ban at Ares web server
2020-04-06 16:06:25
92.118.38.82 attackspam
Apr  6 10:01:53 srv01 postfix/smtpd\[21052\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 10:02:03 srv01 postfix/smtpd\[19842\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 10:02:11 srv01 postfix/smtpd\[21071\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 10:02:14 srv01 postfix/smtpd\[21052\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 10:02:27 srv01 postfix/smtpd\[24658\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-06 16:03:59
51.38.80.104 attackspambots
2020-04-06T07:24:58.003067vps773228.ovh.net sshd[19002]: Failed password for root from 51.38.80.104 port 34910 ssh2
2020-04-06T07:29:22.489223vps773228.ovh.net sshd[20712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.ip-51-38-80.eu  user=root
2020-04-06T07:29:24.777167vps773228.ovh.net sshd[20712]: Failed password for root from 51.38.80.104 port 50244 ssh2
2020-04-06T07:33:56.913967vps773228.ovh.net sshd[22503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.ip-51-38-80.eu  user=root
2020-04-06T07:33:59.152705vps773228.ovh.net sshd[22503]: Failed password for root from 51.38.80.104 port 37424 ssh2
...
2020-04-06 16:17:56
51.38.113.45 attack
Apr  6 04:47:15 game-panel sshd[6934]: Failed password for root from 51.38.113.45 port 37474 ssh2
Apr  6 04:51:16 game-panel sshd[7170]: Failed password for root from 51.38.113.45 port 49142 ssh2
2020-04-06 15:53:17
157.55.39.159 attackbotsspam
Automatic report - Banned IP Access
2020-04-06 16:01:12

Recently Reported IPs

105.213.180.29 105.213.180.189 105.213.180.176 105.213.180.8
105.213.180.86 105.213.180.93 105.213.180.174 105.213.180.50
105.213.181.105 105.213.181.18 105.213.180.96 105.213.180.95
101.132.193.192 105.213.181.23 105.213.181.213 105.213.181.245
105.213.181.34 105.213.181.3 105.213.181.65 105.213.181.62