Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.12.173.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.12.173.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:18:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
28.173.12.41.in-addr.arpa domain name pointer vc-kzn-41-12-173-28.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
28.173.12.41.in-addr.arpa	name = vc-kzn-41-12-173-28.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.141.40.194 attackbotsspam
Honeypot attack, port: 5555, PTR: sr-194-40-141-118-on-nets.com.
2020-05-01 06:03:18
198.108.66.232 attackbots
12470/tcp 9851/tcp 9901/tcp...
[2020-03-02/04-30]282pkt,244pt.(tcp)
2020-05-01 06:33:45
82.221.105.6 attack
[Wed Apr 22 08:07:19 2020] - DDoS Attack From IP: 82.221.105.6 Port: 28693
2020-05-01 06:28:38
157.245.91.72 attackspambots
Invalid user git from 157.245.91.72 port 52410
2020-05-01 06:13:44
192.207.202.2 attackspam
Invalid user yz from 192.207.202.2 port 39618
2020-05-01 06:12:45
94.200.86.70 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-05-01 06:15:21
92.118.161.1 attack
2323/tcp 8000/tcp 8888/tcp...
[2020-02-29/04-30]71pkt,48pt.(tcp),5pt.(udp)
2020-05-01 06:14:22
140.143.130.52 attackbots
May  1 00:11:12 legacy sshd[9150]: Failed password for root from 140.143.130.52 port 45690 ssh2
May  1 00:16:15 legacy sshd[9267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.130.52
May  1 00:16:17 legacy sshd[9267]: Failed password for invalid user qswang from 140.143.130.52 port 47296 ssh2
...
2020-05-01 06:22:05
190.144.119.70 attack
Automatic report - Banned IP Access
2020-05-01 06:33:58
222.186.31.83 attackbotsspam
30.04.2020 22:16:21 SSH access blocked by firewall
2020-05-01 06:18:45
45.172.108.60 attack
Invalid user dingo from 45.172.108.60 port 33374
2020-05-01 06:11:42
162.243.164.246 attack
prod11
...
2020-05-01 06:05:08
138.68.21.128 attack
31481/tcp 21504/tcp 3514/tcp...
[2020-04-12/30]66pkt,23pt.(tcp)
2020-05-01 06:01:25
49.88.112.75 attackbotsspam
May  1 02:57:23 gw1 sshd[31811]: Failed password for root from 49.88.112.75 port 52423 ssh2
...
2020-05-01 06:11:14
198.108.66.228 attack
12362/tcp 9234/tcp 9107/tcp...
[2020-03-02/04-30]310pkt,263pt.(tcp)
2020-05-01 06:36:41

Recently Reported IPs

120.255.164.239 92.96.14.189 136.46.173.97 215.153.45.108
55.116.105.28 50.19.69.145 21.236.221.163 240.180.134.242
15.233.230.101 221.53.97.251 219.186.92.31 230.84.192.100
13.220.36.115 7.55.105.123 123.25.24.26 5.104.79.243
229.83.241.124 200.141.234.181 246.134.106.55 38.110.145.93