Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.247.144.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.247.144.146.		IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:13:46 CST 2023
;; MSG SIZE  rcvd: 108
Host info
146.144.247.105.in-addr.arpa domain name pointer vc-vb-105-247-144-146.ens.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.144.247.105.in-addr.arpa	name = vc-vb-105-247-144-146.ens.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.62.198.142 attackspambots
Fail2Ban Ban Triggered
2020-04-30 03:16:24
192.241.201.182 attackspambots
SSH bruteforce
2020-04-30 03:13:14
80.81.0.94 attack
Failed password for root from 80.81.0.94 port 51180 ssh2
2020-04-30 03:35:18
69.229.6.44 attackspambots
Invalid user fa from 69.229.6.44 port 58012
2020-04-30 03:02:58
85.121.89.192 attackspam
Failed password for root from 85.121.89.192 port 47198 ssh2
2020-04-30 03:35:03
71.189.47.10 attack
Apr 29 21:10:40 ns381471 sshd[3647]: Failed password for root from 71.189.47.10 port 61307 ssh2
Apr 29 21:16:02 ns381471 sshd[3784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.189.47.10
2020-04-30 03:36:04
180.76.175.211 attack
Failed password for root from 180.76.175.211 port 54308 ssh2
2020-04-30 03:15:46
134.209.50.169 attackbotsspam
Apr 29 13:03:37 server1 sshd\[27379\]: Invalid user alex from 134.209.50.169
Apr 29 13:03:37 server1 sshd\[27379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.50.169 
Apr 29 13:03:38 server1 sshd\[27379\]: Failed password for invalid user alex from 134.209.50.169 port 54644 ssh2
Apr 29 13:09:04 server1 sshd\[29556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.50.169  user=minecraft
Apr 29 13:09:06 server1 sshd\[29556\]: Failed password for minecraft from 134.209.50.169 port 37594 ssh2
...
2020-04-30 03:25:20
120.71.145.189 attackspam
Invalid user oracle from 120.71.145.189 port 49248
2020-04-30 03:27:50
178.128.58.117 attackbotsspam
Invalid user dossie from 178.128.58.117 port 52848
2020-04-30 03:15:57
54.38.42.63 attackbots
2020-04-27 18:16:10 server sshd[55080]: Failed password for invalid user root from 54.38.42.63 port 41692 ssh2
2020-04-30 03:04:27
119.139.199.169 attack
Invalid user in from 119.139.199.169 port 39462
2020-04-30 03:28:17
58.213.116.170 attackbots
2020-04-29T20:02:50.421984v22018076590370373 sshd[7358]: Failed password for root from 58.213.116.170 port 60388 ssh2
2020-04-29T20:04:45.044444v22018076590370373 sshd[23580]: Invalid user rbp from 58.213.116.170 port 59276
2020-04-29T20:04:45.050330v22018076590370373 sshd[23580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.116.170
2020-04-29T20:04:45.044444v22018076590370373 sshd[23580]: Invalid user rbp from 58.213.116.170 port 59276
2020-04-29T20:04:47.004942v22018076590370373 sshd[23580]: Failed password for invalid user rbp from 58.213.116.170 port 59276 ssh2
...
2020-04-30 03:38:32
140.190.37.110 attackspambots
Invalid user ui from 140.190.37.110 port 39018
2020-04-30 03:22:37
194.5.192.83 attack
Invalid user mt from 194.5.192.83 port 59660
2020-04-30 03:12:56

Recently Reported IPs

105.247.101.252 105.246.52.95 105.246.192.250 105.246.159.100
105.246.177.199 105.246.147.177 105.246.16.4 105.246.235.211
105.246.105.227 105.246.133.139 105.246.140.32 105.246.208.72
105.246.172.125 105.246.93.99 105.246.225.34 105.245.54.40
105.245.33.178 105.246.188.240 105.245.90.190 105.246.125.99