Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.11.14.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 112
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.11.14.47.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:49:34 CST 2025
;; MSG SIZE  rcvd: 104
Host info
47.14.11.41.in-addr.arpa domain name pointer vc-kzn-41-11-14-47.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.14.11.41.in-addr.arpa	name = vc-kzn-41-11-14-47.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
196.249.102.17 attack
Unauthorized connection attempt from IP address 196.249.102.17 on Port 445(SMB)
2020-08-29 04:13:24
84.208.137.213 attackbotsspam
Total attacks: 2
2020-08-29 04:22:09
186.147.236.20 attackbotsspam
Aug 28 22:13:34 dev0-dcde-rnet sshd[2145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.236.20
Aug 28 22:13:36 dev0-dcde-rnet sshd[2145]: Failed password for invalid user bkp from 186.147.236.20 port 56708 ssh2
Aug 28 22:25:33 dev0-dcde-rnet sshd[2202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.236.20
2020-08-29 04:29:49
103.240.210.102 attack
Port Scan
...
2020-08-29 03:54:33
111.93.200.50 attackbotsspam
Repeated brute force against a port
2020-08-29 04:00:53
122.2.108.194 attack
Unauthorized connection attempt from IP address 122.2.108.194 on Port 445(SMB)
2020-08-29 04:03:25
116.236.189.134 attackbots
2020-08-28T20:24:47.115259shield sshd\[15665\]: Invalid user demo from 116.236.189.134 port 42146
2020-08-28T20:24:47.124255shield sshd\[15665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.189.134
2020-08-28T20:24:48.909794shield sshd\[15665\]: Failed password for invalid user demo from 116.236.189.134 port 42146 ssh2
2020-08-28T20:25:36.705690shield sshd\[15963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.189.134  user=root
2020-08-28T20:25:38.542289shield sshd\[15963\]: Failed password for root from 116.236.189.134 port 48578 ssh2
2020-08-29 04:25:42
58.26.243.3 attack
Unauthorized connection attempt from IP address 58.26.243.3 on Port 445(SMB)
2020-08-29 04:19:29
85.105.212.240 attackspam
Automatic report - Port Scan Attack
2020-08-29 04:24:54
84.2.139.224 attackbotsspam
IP 84.2.139.224 attacked honeypot on port: 81 at 8/28/2020 5:01:24 AM
2020-08-29 04:15:57
122.51.83.175 attack
Aug 28 21:42:10 home sshd[2194119]: Invalid user nadav from 122.51.83.175 port 40202
Aug 28 21:42:10 home sshd[2194119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.175 
Aug 28 21:42:10 home sshd[2194119]: Invalid user nadav from 122.51.83.175 port 40202
Aug 28 21:42:12 home sshd[2194119]: Failed password for invalid user nadav from 122.51.83.175 port 40202 ssh2
Aug 28 21:46:53 home sshd[2195630]: Invalid user mailer from 122.51.83.175 port 40360
...
2020-08-29 04:09:10
181.177.254.238 attackspambots
Unauthorized connection attempt from IP address 181.177.254.238 on Port 445(SMB)
2020-08-29 03:58:57
212.98.97.152 attackspam
sshd jail - ssh hack attempt
2020-08-29 03:56:18
122.160.111.124 attack
Unauthorized connection attempt from IP address 122.160.111.124 on Port 445(SMB)
2020-08-29 04:08:39
54.84.3.64 attackbotsspam
techno.ws 54.84.3.64 [28/Aug/2020:22:25:34 +0200] "POST /wp-login.php HTTP/1.1" 200 6131 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
techno.ws 54.84.3.64 [28/Aug/2020:22:25:35 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4036 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-29 04:29:29

Recently Reported IPs

103.36.252.53 84.236.98.8 130.254.247.73 7.51.131.24
103.70.30.117 214.34.205.219 219.83.85.12 28.28.219.116
19.196.170.123 196.34.229.103 54.33.91.236 100.184.47.19
198.138.134.119 35.52.247.225 40.63.255.189 199.240.28.253
202.84.83.159 80.167.214.23 164.75.245.221 95.156.199.155