Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.114.217.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.114.217.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 17:50:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 99.217.114.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.217.114.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.251.115 attack
Aug  7 09:33:23 mx sshd[20606]: Failed password for root from 157.230.251.115 port 40018 ssh2
2020-08-08 03:25:20
105.112.28.33 attackbotsspam
Unauthorized connection attempt from IP address 105.112.28.33 on Port 445(SMB)
2020-08-08 03:29:23
128.199.204.26 attackspambots
Aug  7 13:41:21 Tower sshd[20523]: Connection from 128.199.204.26 port 45204 on 192.168.10.220 port 22 rdomain ""
Aug  7 13:41:27 Tower sshd[20523]: Failed password for root from 128.199.204.26 port 45204 ssh2
Aug  7 13:41:27 Tower sshd[20523]: Received disconnect from 128.199.204.26 port 45204:11: Bye Bye [preauth]
Aug  7 13:41:27 Tower sshd[20523]: Disconnected from authenticating user root 128.199.204.26 port 45204 [preauth]
2020-08-08 03:50:58
141.98.10.200 attack
Aug  7 14:52:41 plusreed sshd[13017]: Invalid user admin from 141.98.10.200
...
2020-08-08 03:46:48
76.190.111.244 attack
DATE:2020-08-07 14:00:34, IP:76.190.111.244, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-08-08 03:38:53
123.19.196.167 attackspam
Unauthorized connection attempt from IP address 123.19.196.167 on Port 445(SMB)
2020-08-08 03:14:49
190.152.245.102 attack
RDP Bruteforce
2020-08-08 03:45:24
43.247.41.81 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-08 03:18:53
190.36.38.28 attackspambots
Unauthorized connection attempt from IP address 190.36.38.28 on Port 445(SMB)
2020-08-08 03:43:05
41.204.202.45 attack
Subject:	Power
2020-08-08 03:33:57
201.170.132.60 attackspambots
Automatic report - Port Scan Attack
2020-08-08 03:53:28
1.47.228.115 attack
Unauthorized connection attempt from IP address 1.47.228.115 on Port 445(SMB)
2020-08-08 03:31:08
79.113.213.166 attackbots
Port Scan detected!
...
2020-08-08 03:31:30
95.91.76.109 attackspam
Automatic report - Banned IP Access
2020-08-08 03:21:32
197.50.11.98 attack
Unauthorized connection attempt from IP address 197.50.11.98 on Port 445(SMB)
2020-08-08 03:20:20

Recently Reported IPs

68.14.42.76 37.170.230.70 140.92.74.206 168.192.47.93
171.85.204.199 118.173.162.246 15.1.230.87 229.32.16.237
86.100.71.17 87.141.142.174 75.3.133.109 136.151.125.64
208.99.205.8 157.62.198.38 141.191.170.205 161.55.20.38
31.104.133.27 175.144.178.73 173.62.116.102 117.167.0.213