Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: OPTINET

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.94.81.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37853
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;197.94.81.41.			IN	A

;; AUTHORITY SECTION:
.			2840	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 22:34:30 CST 2019
;; MSG SIZE  rcvd: 116

Host info
41.81.94.197.in-addr.arpa domain name pointer 197-94-81-41.hff.mweb.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
41.81.94.197.in-addr.arpa	name = 197-94-81-41.hff.mweb.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
185.200.118.51 attackbotsspam
Port scan denied
2020-10-06 13:59:53
77.222.108.207 attackspam
Port Scan
...
2020-10-06 13:17:20
46.145.163.130 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-10-06 13:55:36
139.155.94.250 attackbots
Lines containing failures of 139.155.94.250
Oct  5 06:05:04 newdogma sshd[5943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.94.250  user=r.r
Oct  5 06:05:06 newdogma sshd[5943]: Failed password for r.r from 139.155.94.250 port 49576 ssh2
Oct  5 06:05:07 newdogma sshd[5943]: Received disconnect from 139.155.94.250 port 49576:11: Bye Bye [preauth]
Oct  5 06:05:07 newdogma sshd[5943]: Disconnected from authenticating user r.r 139.155.94.250 port 49576 [preauth]
Oct  5 06:15:10 newdogma sshd[6663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.94.250  user=r.r
Oct  5 06:15:12 newdogma sshd[6663]: Failed password for r.r from 139.155.94.250 port 46184 ssh2
Oct  5 06:15:14 newdogma sshd[6663]: Received disconnect from 139.155.94.250 port 46184:11: Bye Bye [preauth]
Oct  5 06:15:14 newdogma sshd[6663]: Disconnected from authenticating user r.r 139.155.94.250 port 46184 [preaut........
------------------------------
2020-10-06 13:20:03
138.121.170.194 attackbots
2020-10-06T01:02[Censored Hostname] sshd[19018]: Failed password for root from 138.121.170.194 port 57792 ssh2
2020-10-06T01:06[Censored Hostname] sshd[19857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.170.194.dnsgigas.es  user=root
2020-10-06T01:06[Censored Hostname] sshd[19857]: Failed password for root from 138.121.170.194 port 60174 ssh2[...]
2020-10-06 13:56:47
212.156.87.194 attack
Oct  6 05:34:43 gospond sshd[5948]: Failed password for root from 212.156.87.194 port 52134 ssh2
Oct  6 05:34:41 gospond sshd[5948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.87.194  user=root
Oct  6 05:34:43 gospond sshd[5948]: Failed password for root from 212.156.87.194 port 52134 ssh2
...
2020-10-06 13:58:33
192.35.168.218 attackbots
Icarus honeypot on github
2020-10-06 13:20:28
45.142.120.33 attack
Attempted Brute Force (dovecot)
2020-10-06 13:41:01
111.21.99.227 attackspam
Oct  6 00:53:47 jane sshd[2943]: Failed password for root from 111.21.99.227 port 46680 ssh2
...
2020-10-06 13:23:22
14.161.6.201 attackbots
Automatic report - Banned IP Access
2020-10-06 13:54:48
101.231.146.34 attackspambots
Oct  6 06:44:39 pornomens sshd\[29824\]: Invalid user 1q2w3e4r5t5678 from 101.231.146.34 port 59203
Oct  6 06:44:39 pornomens sshd\[29824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.146.34
Oct  6 06:44:41 pornomens sshd\[29824\]: Failed password for invalid user 1q2w3e4r5t5678 from 101.231.146.34 port 59203 ssh2
...
2020-10-06 13:38:27
222.107.156.227 attackbotsspam
Oct  6 07:36:06 PorscheCustomer sshd[14014]: Failed password for root from 222.107.156.227 port 58600 ssh2
Oct  6 07:38:43 PorscheCustomer sshd[14085]: Failed password for root from 222.107.156.227 port 21880 ssh2
...
2020-10-06 13:49:30
218.92.0.248 attack
Oct  6 07:12:24 dev0-dcde-rnet sshd[30290]: Failed password for root from 218.92.0.248 port 1469 ssh2
Oct  6 07:12:38 dev0-dcde-rnet sshd[30290]: error: maximum authentication attempts exceeded for root from 218.92.0.248 port 1469 ssh2 [preauth]
Oct  6 07:12:50 dev0-dcde-rnet sshd[30293]: Failed password for root from 218.92.0.248 port 34400 ssh2
2020-10-06 13:14:50
36.148.12.251 attack
Oct  5 23:13:09 [host] sshd[9259]: pam_unix(sshd:a
Oct  5 23:13:11 [host] sshd[9259]: Failed password
Oct  5 23:17:51 [host] sshd[9379]: pam_unix(sshd:a
2020-10-06 13:52:24
111.19.129.38 attackbotsspam
RDPBruteGam24
2020-10-06 13:38:03

Recently Reported IPs

129.71.207.118 204.14.176.111 68.65.2.17 3.179.41.184
112.55.102.27 185.166.205.185 24.138.72.16 113.164.159.10
120.72.21.49 197.29.201.100 211.158.169.183 180.64.134.175
43.224.36.186 102.165.49.194 85.54.6.78 100.51.167.119
60.68.165.126 79.68.203.131 120.234.137.10 119.91.115.28