Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.242.106.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.242.106.18.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:46:03 CST 2023
;; MSG SIZE  rcvd: 107
Host info
18.106.242.105.in-addr.arpa domain name pointer vc-gp-n-105-242-106-18.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.106.242.105.in-addr.arpa	name = vc-gp-n-105-242-106-18.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
206.189.128.215 attackbots
$f2bV_matches
2020-06-24 23:31:10
70.58.144.49 attack
21 attempts against mh-ssh on flow
2020-06-24 23:35:00
101.89.117.55 attackbotsspam
Jun 24 16:17:07 nextcloud sshd\[25858\]: Invalid user itadmin from 101.89.117.55
Jun 24 16:17:07 nextcloud sshd\[25858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.117.55
Jun 24 16:17:09 nextcloud sshd\[25858\]: Failed password for invalid user itadmin from 101.89.117.55 port 53340 ssh2
2020-06-24 23:59:19
188.86.28.146 attackbotsspam
Jun 24 18:04:46 piServer sshd[1653]: Failed password for root from 188.86.28.146 port 33710 ssh2
Jun 24 18:07:58 piServer sshd[1935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.86.28.146 
Jun 24 18:08:00 piServer sshd[1935]: Failed password for invalid user wuqianhan from 188.86.28.146 port 51822 ssh2
...
2020-06-25 00:12:32
14.231.203.32 attack
Icarus honeypot on github
2020-06-24 23:30:31
221.122.73.130 attack
sshd jail - ssh hack attempt
2020-06-25 00:01:05
222.186.15.158 attackspam
Jun 24 18:12:59 santamaria sshd\[27236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Jun 24 18:13:00 santamaria sshd\[27236\]: Failed password for root from 222.186.15.158 port 36817 ssh2
Jun 24 18:13:19 santamaria sshd\[27238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
...
2020-06-25 00:14:43
180.182.47.132 attack
SSH Brute-Forcing (server2)
2020-06-25 00:08:04
89.248.172.24 attack
06/24/2020-11:04:47.418493 89.248.172.24 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-24 23:44:55
190.106.107.130 attackbotsspam
Jun 24 14:19:08 localhost sshd\[12987\]: Invalid user test03 from 190.106.107.130
Jun 24 14:19:08 localhost sshd\[12987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.106.107.130
Jun 24 14:19:10 localhost sshd\[12987\]: Failed password for invalid user test03 from 190.106.107.130 port 54823 ssh2
Jun 24 14:23:35 localhost sshd\[13490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.106.107.130  user=root
Jun 24 14:23:38 localhost sshd\[13490\]: Failed password for root from 190.106.107.130 port 54709 ssh2
...
2020-06-25 00:13:22
192.241.228.9 attack
Hit honeypot r.
2020-06-24 23:27:51
157.245.204.153 attack
Jun 24 14:00:23 roki-contabo sshd\[26326\]: Invalid user ts3srv from 157.245.204.153
Jun 24 14:00:23 roki-contabo sshd\[26326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.204.153
Jun 24 14:00:25 roki-contabo sshd\[26326\]: Failed password for invalid user ts3srv from 157.245.204.153 port 16258 ssh2
Jun 24 14:05:59 roki-contabo sshd\[26452\]: Invalid user admin from 157.245.204.153
Jun 24 14:05:59 roki-contabo sshd\[26452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.204.153
...
2020-06-25 00:01:22
49.233.92.166 attackspambots
Jun 24 14:20:53 piServer sshd[12365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.92.166 
Jun 24 14:20:55 piServer sshd[12365]: Failed password for invalid user ibmuser from 49.233.92.166 port 42116 ssh2
Jun 24 14:24:28 piServer sshd[12650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.92.166 
...
2020-06-24 23:30:00
46.38.145.252 attackbots
Jun 24 17:32:20 [snip] postfix/submission/smtpd[23609]: warning: unknown[46.38.145.252]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 17:33:02 [snip] postfix/submission/smtpd[23609]: warning: unknown[46.38.145.252]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 17:33:40 [snip] postfix/submission/smtpd[23609]: warning: unknown[46.38.145.252]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 17:34:24 [snip] postfix/submission/smtpd[23609]: warning: unknown[46.38.145.252]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 17:35:02 [snip] postfix/submission/smtpd[23609]: warning: unknown[46.38.145.252]: SASL LOGIN authentication failed: UGFzc3dvcmQ6[...]
2020-06-24 23:35:22
62.99.54.90 attackbotsspam
Failed password for invalid user hms from 62.99.54.90 port 16107 ssh2
2020-06-25 00:10:21

Recently Reported IPs

105.241.198.133 105.241.83.213 105.241.188.1 105.241.247.45
105.241.35.213 105.241.49.254 105.241.197.246 105.242.207.77
105.241.191.184 105.242.156.173 105.241.102.143 105.242.196.236
105.241.214.61 105.241.103.236 105.241.227.194 105.241.186.74
105.241.76.149 105.242.135.62 105.241.228.83 105.241.167.247