Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: MTN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.112.149.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.112.149.172.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081302 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 14 08:57:58 CST 2020
;; MSG SIZE  rcvd: 118
Host info
172.149.112.41.in-addr.arpa domain name pointer 41-112-149-172.flte-wholesale.mtn.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
172.149.112.41.in-addr.arpa	name = 41-112-149-172.flte-wholesale.mtn.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
156.207.180.53 attack
Invalid user admin from 156.207.180.53 port 54504
2020-04-22 00:52:44
200.225.120.89 attackbots
Apr 21 15:59:51 ws26vmsma01 sshd[204033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.225.120.89
Apr 21 15:59:53 ws26vmsma01 sshd[204033]: Failed password for invalid user cz from 200.225.120.89 port 53062 ssh2
...
2020-04-22 00:35:23
5.228.204.121 attackspam
Invalid user admin from 5.228.204.121 port 49401
2020-04-22 00:21:13
217.217.90.149 attack
21 attempts against mh-ssh on cloud
2020-04-22 00:28:24
206.189.71.79 attack
Invalid user test03 from 206.189.71.79 port 58866
2020-04-22 00:31:49
222.239.90.61 attackspambots
Invalid user pokemon from 222.239.90.61 port 34057
2020-04-22 00:23:56
14.187.43.169 attackbots
Invalid user admin from 14.187.43.169 port 52795
2020-04-22 00:20:58
1.10.210.160 attackbotsspam
Invalid user service from 1.10.210.160 port 57171
2020-04-22 00:23:39
203.195.133.17 attackbotsspam
Invalid user ubuntu from 203.195.133.17 port 50348
2020-04-22 00:32:27
1.193.39.85 attackbots
Apr 21 14:26:11 * sshd[15904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.39.85
Apr 21 14:26:13 * sshd[15904]: Failed password for invalid user l from 1.193.39.85 port 57317 ssh2
2020-04-22 00:22:40
41.213.124.182 attackbots
Invalid user ubuntu from 41.213.124.182 port 43920
2020-04-22 00:16:09
178.128.213.91 attackspam
$f2bV_matches
2020-04-22 00:46:29
221.229.173.139 attack
Invalid user userftp from 221.229.173.139 port 9224
2020-04-22 00:25:24
91.220.81.213 spambotsattackproxynormal
steam account hacked. 
method : free skins link, if you enter login, password and code from your phone your accounts will be taken by them and automatically it will change password, email, phone number and delete steam guard.
IP is from russia
2020-04-22 00:46:45
41.207.81.182 attackbots
firewall-block, port(s): 25579/tcp
2020-04-22 00:17:10

Recently Reported IPs

92.200.207.196 190.77.20.245 179.91.29.246 194.57.25.84
109.212.112.160 14.121.158.67 193.121.214.127 210.147.37.187
212.157.170.162 117.69.170.16 76.105.195.148 54.255.246.128
60.211.159.147 52.42.254.201 106.244.98.137 116.46.154.220
187.83.78.179 176.249.125.218 32.145.149.215 182.148.187.97