Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: TICSA-ASN

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.113.121.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38533
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.113.121.245.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051502 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 23:21:24 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 245.121.113.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 245.121.113.41.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
41.220.13.103 attack
5x Failed Password
2019-11-07 04:16:08
113.171.23.119 attackspambots
Nov  6 20:24:27 bouncer sshd\[23052\]: Invalid user test from 113.171.23.119 port 41640
Nov  6 20:24:27 bouncer sshd\[23052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.171.23.119 
Nov  6 20:24:30 bouncer sshd\[23052\]: Failed password for invalid user test from 113.171.23.119 port 41640 ssh2
...
2019-11-07 04:28:59
185.132.228.226 attackspam
postfix
2019-11-07 04:50:07
110.9.204.194 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/110.9.204.194/ 
 
 KR - 1H : (95)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN9318 
 
 IP : 110.9.204.194 
 
 CIDR : 110.9.0.0/16 
 
 PREFIX COUNT : 2487 
 
 UNIQUE IP COUNT : 14360064 
 
 
 ATTACKS DETECTED ASN9318 :  
  1H - 5 
  3H - 10 
  6H - 17 
 12H - 30 
 24H - 31 
 
 DateTime : 2019-11-06 15:33:13 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 04:48:06
181.123.9.3 attackbotsspam
Nov  6 17:11:23 localhost sshd\[23046\]: Invalid user adonix from 181.123.9.3 port 56028
Nov  6 17:11:23 localhost sshd\[23046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.3
Nov  6 17:11:26 localhost sshd\[23046\]: Failed password for invalid user adonix from 181.123.9.3 port 56028 ssh2
2019-11-07 04:16:24
81.22.45.0 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-07 04:29:41
118.222.249.158 attackspambots
DATE:2019-11-06 15:56:52, IP:118.222.249.158, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-11-07 04:31:17
212.232.25.224 attackbotsspam
Nov  6 21:23:53 server sshd\[16502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=11379-02.root.nessus.at  user=root
Nov  6 21:23:55 server sshd\[16502\]: Failed password for root from 212.232.25.224 port 46272 ssh2
Nov  6 21:35:32 server sshd\[19665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=11379-02.root.nessus.at  user=root
Nov  6 21:35:34 server sshd\[19665\]: Failed password for root from 212.232.25.224 port 57496 ssh2
Nov  6 21:39:22 server sshd\[20271\]: Invalid user william from 212.232.25.224
Nov  6 21:39:22 server sshd\[20271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=11379-02.root.nessus.at 
...
2019-11-07 04:17:11
217.165.223.79 attackbotsspam
Unauthorised access (Nov  6) SRC=217.165.223.79 LEN=52 TTL=117 ID=3669 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-07 04:39:30
138.197.78.121 attackspam
Nov  6 21:26:43 hosting sshd[25048]: Invalid user rtvcm from 138.197.78.121 port 34344
...
2019-11-07 04:15:01
78.134.6.82 attack
Nov  7 00:38:46 gw1 sshd[4265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.134.6.82
Nov  7 00:38:48 gw1 sshd[4265]: Failed password for invalid user user1 from 78.134.6.82 port 52902 ssh2
...
2019-11-07 04:46:52
188.242.194.236 attack
Chat Spam
2019-11-07 04:37:30
128.199.162.2 attack
Nov  6 15:44:11 venus sshd\[5268\]: Invalid user macarena from 128.199.162.2 port 56472
Nov  6 15:44:11 venus sshd\[5268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2
Nov  6 15:44:13 venus sshd\[5268\]: Failed password for invalid user macarena from 128.199.162.2 port 56472 ssh2
...
2019-11-07 04:27:43
120.224.72.89 attackbotsspam
Nov  6 15:34:19 [host] sshd[23339]: Invalid user ubuntu from 120.224.72.89
Nov  6 15:34:19 [host] sshd[23339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.224.72.89
Nov  6 15:34:21 [host] sshd[23339]: Failed password for invalid user ubuntu from 120.224.72.89 port 48150 ssh2
2019-11-07 04:13:02
206.189.149.9 attackspambots
Nov  6 10:13:01 eddieflores sshd\[28294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.149.9  user=root
Nov  6 10:13:03 eddieflores sshd\[28294\]: Failed password for root from 206.189.149.9 port 57750 ssh2
Nov  6 10:17:23 eddieflores sshd\[28660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.149.9  user=root
Nov  6 10:17:24 eddieflores sshd\[28660\]: Failed password for root from 206.189.149.9 port 36862 ssh2
Nov  6 10:21:41 eddieflores sshd\[29008\]: Invalid user jaimie from 206.189.149.9
2019-11-07 04:32:04

Recently Reported IPs

251.21.254.19 156.144.82.222 122.61.155.13 212.49.34.101
89.46.105.125 149.176.88.17 248.173.194.10 6.130.255.147
81.139.45.232 200.73.156.120 220.20.54.188 49.102.59.207
158.202.95.96 110.97.73.71 224.32.203.33 97.191.46.94
16.209.243.246 52.58.249.87 47.188.242.13 90.90.99.221