Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.246.42.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38659
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.246.42.183.			IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:13:44 CST 2023
;; MSG SIZE  rcvd: 107
Host info
183.42.246.105.in-addr.arpa domain name pointer vc-gp-n-105-246-42-183.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
183.42.246.105.in-addr.arpa	name = vc-gp-n-105-246-42-183.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.68.11.199 attackspam
Brute force attack stopped by firewall
2020-09-02 20:09:16
106.12.120.19 attackbotsspam
Apr 20 08:15:50 ms-srv sshd[19895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.19
Apr 20 08:15:53 ms-srv sshd[19895]: Failed password for invalid user test from 106.12.120.19 port 46330 ssh2
2020-09-02 19:53:26
186.167.51.10 attack
 TCP (SYN) 186.167.51.10:52203 -> port 1433, len 48
2020-09-02 19:50:55
117.107.213.246 attack
Invalid user ti from 117.107.213.246 port 59022
2020-09-02 20:06:24
49.235.193.207 attackspambots
Sep  2 04:43:34 *** sshd[18540]: Invalid user gloria from 49.235.193.207
2020-09-02 19:48:44
137.74.41.119 attackbotsspam
Invalid user testuser2 from 137.74.41.119 port 60834
2020-09-02 19:46:36
217.170.206.138 attack
Sep  2 10:53:47 instance-2 sshd[15607]: Failed password for root from 217.170.206.138 port 18639 ssh2
Sep  2 10:53:51 instance-2 sshd[15607]: Failed password for root from 217.170.206.138 port 18639 ssh2
Sep  2 10:53:55 instance-2 sshd[15607]: Failed password for root from 217.170.206.138 port 18639 ssh2
Sep  2 10:53:59 instance-2 sshd[15607]: Failed password for root from 217.170.206.138 port 18639 ssh2
2020-09-02 20:16:53
213.32.67.160 attackspam
Sep  2 07:47:44 jumpserver sshd[166000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.67.160  user=root
Sep  2 07:47:46 jumpserver sshd[166000]: Failed password for root from 213.32.67.160 port 42670 ssh2
Sep  2 07:51:37 jumpserver sshd[166048]: Invalid user test from 213.32.67.160 port 45408
...
2020-09-02 19:43:00
45.236.105.5 attackspam
45 x 45.236.105.5 in under a minute on port 23
2020-09-02 19:51:21
27.37.244.244 attackspam
Invalid user ubuntu from 27.37.244.244 port 16880
2020-09-02 20:06:41
211.253.27.146 attackspam
Failed password for invalid user nexus from 211.253.27.146 port 44801 ssh2
2020-09-02 20:17:31
178.151.27.223 attackbots
Port probing on unauthorized port 445
2020-09-02 20:04:47
187.162.61.168 attack
Automatic report - Port Scan Attack
2020-09-02 20:00:57
122.51.91.191 attackbots
(sshd) Failed SSH login from 122.51.91.191 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  2 05:12:39 server2 sshd[21288]: Invalid user leon from 122.51.91.191
Sep  2 05:12:39 server2 sshd[21288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.91.191 
Sep  2 05:12:41 server2 sshd[21288]: Failed password for invalid user leon from 122.51.91.191 port 44498 ssh2
Sep  2 05:18:00 server2 sshd[24896]: Invalid user roy from 122.51.91.191
Sep  2 05:18:00 server2 sshd[24896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.91.191
2020-09-02 20:09:47
1.192.192.4 attack
firewall-block, port(s): 11211/tcp
2020-09-02 19:59:45

Recently Reported IPs

105.247.13.131 105.246.99.54 105.246.53.15 105.247.100.36
105.247.101.252 105.247.144.146 105.246.52.95 105.246.192.250
105.246.159.100 105.246.177.199 105.246.147.177 105.246.16.4
105.246.235.211 105.246.105.227 105.246.133.139 105.246.140.32
105.246.208.72 105.246.172.125 105.246.93.99 105.246.225.34