Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: MTN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '41.122.0.0 - 41.122.127.255'

% No abuse contact registered for 41.122.0.0 - 41.122.127.255

inetnum:        41.122.0.0 - 41.122.127.255
netname:        MTNSA-41-122-0-0-17
descr:          Mobile Broadband Internet - Randburg
country:        ZA
admin-c:        MBIP-AFRINIC
tech-c:         MBIP-AFRINIC
status:         ASSIGNED PA
remarks:        report abuse to abuse@mtnbusiness.co.za
mnt-by:         MTNBUSINESS-MNT
source:         AFRINIC # Filtered
parent:         41.112.0.0 - 41.127.255.255

role:           MTN Business IP Maintainer
address:        MTN Business
address:        Heron Place
address:        c/o Century Boulevard and Heron Crescent
address:        Stand no 6465
address:        Century City
address:        Cape Town
address:        South Africa
admin-c:        AT32-AFRINIC
tech-c:         AT32-AFRINIC
nic-hdl:        MBIP-AFRINIC
mnt-by:         MTNBUSINESS-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.122.73.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37607
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.122.73.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031800 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 18 15:00:08 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 13.73.122.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.73.122.41.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
208.100.26.230 attackspam
Nmap.Script.Scanner
2020-08-14 20:39:09
51.141.39.1 attackbotsspam
2020-08-14 21:11:17
84.17.49.101 attackspambots
2020-08-14 21:00:18
68.183.51.233 attackspambots
2020-08-14 21:05:50
138.68.176.38 attack
Aug 14 09:22:45 firewall sshd[16513]: Failed password for root from 138.68.176.38 port 49364 ssh2
Aug 14 09:26:38 firewall sshd[16684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.176.38  user=root
Aug 14 09:26:39 firewall sshd[16684]: Failed password for root from 138.68.176.38 port 60716 ssh2
...
2020-08-14 20:46:53
218.92.0.221 attackbots
sshd jail - ssh hack attempt
2020-08-14 20:55:44
51.15.230.98 attackbots
2020-08-14 21:12:32
5.196.92.219 attack
1597408004 - 08/14/2020 19:26:44 Host: ns376045.ip-5-196-92.eu/5.196.92.219 Port: 8080 UDP Blocked
...
2020-08-14 20:35:36
64.227.94.25 attackbotsspam
Nmap.Script.Scanner
2020-08-14 20:36:42
89.187.168.171 attackbotsspam
2020-08-14 20:51:06
84.17.51.8 attackbotsspam
2020-08-14 20:55:12
31.220.3.106 attack
Aug 14 14:34:00 eventyay sshd[2399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.3.106
Aug 14 14:34:02 eventyay sshd[2399]: Failed password for invalid user admin from 31.220.3.106 port 45577 ssh2
Aug 14 14:34:03 eventyay sshd[2401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.3.106
...
2020-08-14 20:38:35
89.238.154.184 attackbots
2020-08-14 20:48:15
84.17.49.138 attackspam
2020-08-14 20:59:59
195.70.59.121 attack
Aug 14 14:26:50 ns382633 sshd\[17412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.70.59.121  user=root
Aug 14 14:26:52 ns382633 sshd\[17412\]: Failed password for root from 195.70.59.121 port 41106 ssh2
Aug 14 14:41:09 ns382633 sshd\[20170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.70.59.121  user=root
Aug 14 14:41:11 ns382633 sshd\[20170\]: Failed password for root from 195.70.59.121 port 44766 ssh2
Aug 14 14:44:58 ns382633 sshd\[20460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.70.59.121  user=root
2020-08-14 20:52:03

Recently Reported IPs

65.119.226.144 2606:4700:10::6814:4993 2606:4700:10::6814:6384 2606:4700:10::6814:7740
2606:4700:10::6816:4061 2606:4700:10::6816:576 2606:4700:10::6814:5612 2606:4700:10::6814:9009
2606:4700:10::6816:2923 124.225.14.28 116.136.204.96 119.188.172.236
38.244.79.210 193.32.162.204 74.7.230.38 2606:4700:10::6814:8404
134.35.157.112 110.77.248.119 2606:4700:10::ac43:1062 2606:4700:10::6814:6416