Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: MTN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.85.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.85.182.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030100 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 15:49:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
182.85.213.105.in-addr.arpa domain name pointer 105-213-85-182.access.mtnbusiness.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
182.85.213.105.in-addr.arpa	name = 105-213-85-182.access.mtnbusiness.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.83.38 attackbots
$f2bV_matches
2020-06-20 17:39:29
46.8.22.23 spamattack
Włamał się na konto Steam
2020-06-20 17:43:32
45.14.150.51 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-20 17:51:00
152.67.35.185 attackspambots
Invalid user rails from 152.67.35.185 port 59620
2020-06-20 17:56:50
150.109.151.136 attackspambots
Brute force SMTP login attempted.
...
2020-06-20 17:50:10
41.33.52.38 attackbotsspam
20/6/19@23:48:30: FAIL: Alarm-Network address from=41.33.52.38
...
2020-06-20 17:52:22
74.82.47.23 attack
srv02 Mass scanning activity detected Target: 10001  ..
2020-06-20 17:26:32
151.73.182.184 attackspambots
Hits on port : 8080
2020-06-20 17:28:52
175.24.81.207 attackbotsspam
Invalid user roman from 175.24.81.207 port 46582
2020-06-20 17:19:01
177.38.32.190 attackbotsspam
20/6/19@23:48:57: FAIL: Alarm-Network address from=177.38.32.190
...
2020-06-20 17:30:39
176.126.167.111 attack
Hits on port : 445
2020-06-20 17:28:05
27.254.130.67 attackbotsspam
$f2bV_matches
2020-06-20 17:21:53
183.238.0.242 attackbots
detected by Fail2Ban
2020-06-20 17:23:23
84.17.57.123 attackspam
84.17.57.123 - - [20/Jun/2020:04:38:47 +0100] "POST /wp-login.php HTTP/1.1" 200 6662 "http://wpeagleonepage.com/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
84.17.57.123 - - [20/Jun/2020:04:48:56 +0100] "POST /wp-login.php HTTP/1.1" 200 6649 "http://wpeagleonepage.com/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
84.17.57.123 - - [20/Jun/2020:04:48:57 +0100] "POST /wp-login.php HTTP/1.1" 200 6662 "http://wpeagleonepage.com/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
...
2020-06-20 17:32:57
124.239.148.63 attackbotsspam
DATE:2020-06-20 10:21:59, IP:124.239.148.63, PORT:ssh SSH brute force auth (docker-dc)
2020-06-20 17:45:02

Recently Reported IPs

105.213.85.154 105.213.85.188 105.213.93.187 105.213.93.19
105.213.93.238 105.213.93.222 105.213.93.215 105.213.93.240
105.213.93.228 105.213.93.244 105.213.93.233 105.213.93.63
105.213.93.39 105.213.93.70 105.213.93.78 12.235.95.132
105.226.179.29 105.226.175.66 105.226.175.134 105.226.183.37