Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: TICSA-ASN

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.124.30.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55998
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.124.30.112.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 23:01:43 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 112.30.124.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 112.30.124.41.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.37 attackspam
10/18/2019-23:57:53.684923 198.108.67.37 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-19 12:38:50
124.47.14.14 attackspambots
Oct 19 10:29:35 areeb-Workstation sshd[8563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.47.14.14
Oct 19 10:29:37 areeb-Workstation sshd[8563]: Failed password for invalid user adine from 124.47.14.14 port 39546 ssh2
...
2019-10-19 13:10:57
184.30.210.217 attackspambots
10/19/2019-06:45:02.295354 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-19 12:57:17
181.143.221.76 attackspam
Automatic report - XMLRPC Attack
2019-10-19 13:02:48
49.88.112.112 attackbotsspam
Oct 19 05:57:54 MK-Soft-Root2 sshd[13885]: Failed password for root from 49.88.112.112 port 46566 ssh2
Oct 19 05:57:57 MK-Soft-Root2 sshd[13885]: Failed password for root from 49.88.112.112 port 46566 ssh2
...
2019-10-19 12:36:27
138.197.5.191 attackspam
Invalid user umcapasocanoas from 138.197.5.191 port 59074
2019-10-19 13:03:11
103.126.100.179 attackspambots
Oct 19 06:03:04 v22018076622670303 sshd\[21457\]: Invalid user Tiger123 from 103.126.100.179 port 46722
Oct 19 06:03:04 v22018076622670303 sshd\[21457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.179
Oct 19 06:03:06 v22018076622670303 sshd\[21457\]: Failed password for invalid user Tiger123 from 103.126.100.179 port 46722 ssh2
...
2019-10-19 12:51:27
207.154.218.16 attack
SSH Brute-Forcing (ownc)
2019-10-19 13:06:36
211.159.150.10 attackspam
Oct 17 12:23:50 nexus sshd[24595]: Invalid user sinusbot from 211.159.150.10 port 60049
Oct 17 12:23:50 nexus sshd[24595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.150.10
Oct 17 12:23:52 nexus sshd[24595]: Failed password for invalid user sinusbot from 211.159.150.10 port 60049 ssh2
Oct 17 12:23:52 nexus sshd[24595]: Received disconnect from 211.159.150.10 port 60049:11: Bye Bye [preauth]
Oct 17 12:23:52 nexus sshd[24595]: Disconnected from 211.159.150.10 port 60049 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=211.159.150.10
2019-10-19 12:37:36
63.143.75.142 attackspam
Oct 19 06:14:46 microserver sshd[8710]: Invalid user mark from 63.143.75.142 port 49297
Oct 19 06:14:46 microserver sshd[8710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.143.75.142
Oct 19 06:14:47 microserver sshd[8710]: Failed password for invalid user mark from 63.143.75.142 port 49297 ssh2
Oct 19 06:18:25 microserver sshd[9322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.143.75.142  user=root
Oct 19 06:18:27 microserver sshd[9322]: Failed password for root from 63.143.75.142 port 39574 ssh2
Oct 19 06:29:33 microserver sshd[10817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.143.75.142  user=root
Oct 19 06:29:35 microserver sshd[10817]: Failed password for root from 63.143.75.142 port 38631 ssh2
Oct 19 06:33:28 microserver sshd[11443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.143.75.142  user=root
Oct 19 06:33:29 mic
2019-10-19 12:53:51
180.250.140.74 attackspam
Oct 19 04:44:42 localhost sshd\[19791\]: Invalid user dimel from 180.250.140.74 port 38274
Oct 19 04:44:42 localhost sshd\[19791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.140.74
Oct 19 04:44:44 localhost sshd\[19791\]: Failed password for invalid user dimel from 180.250.140.74 port 38274 ssh2
Oct 19 04:52:39 localhost sshd\[20028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.140.74  user=mail
Oct 19 04:52:41 localhost sshd\[20028\]: Failed password for mail from 180.250.140.74 port 38294 ssh2
...
2019-10-19 13:22:37
193.32.160.154 attackbotsspam
2019-10-19 06:27:46 H=\(\[193.32.160.146\]\) \[193.32.160.154\] F=\<2g3t6oyidqkm0ah@npmsopau.ru\> rejected RCPT \: Unrouteable address
2019-10-19 06:27:46 H=\(\[193.32.160.146\]\) \[193.32.160.154\] F=\<2g3t6oyidqkm0ah@npmsopau.ru\> rejected RCPT \: Unrouteable address
2019-10-19 06:27:46 H=\(\[193.32.160.146\]\) \[193.32.160.154\] F=\<2g3t6oyidqkm0ah@npmsopau.ru\> rejected RCPT \: Unrouteable address
2019-10-19 06:27:46 H=\(\[193.32.160.146\]\) \[193.32.160.154\] F=\<2g3t6oyidqkm0ah@npmsopau.ru\> rejected RCPT \: Unrouteable address
2019-10-19 06:27:46 H=\(\[193.32.160.146\]\) \[193.32.160.154\] F=\<2g3t6oyidqkm0ah@npmsopau.ru\> rejected RCPT \: Unrouteable address
2019-10-19 06:27:46 H=\(\[193.32.160.146\]\) \[193.32.160.154\] F=\<2g3t6oyidqkm0ah@npmsopau.ru\> rejected RCPT \: Unrouteable address
2019-10-19 06:27:46 H=\(\[193.32.160.146\]\) \[193.32.16
2019-10-19 12:44:25
115.238.236.74 attackspam
Oct 19 06:33:03 [host] sshd[29580]: Invalid user bkp from 115.238.236.74
Oct 19 06:33:03 [host] sshd[29580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74
Oct 19 06:33:05 [host] sshd[29580]: Failed password for invalid user bkp from 115.238.236.74 port 34826 ssh2
2019-10-19 12:38:04
45.143.221.4 attackbotsspam
firewall-block, port(s): 69/udp
2019-10-19 12:47:09
115.203.204.107 attackbotsspam
Unauthorised access (Oct 19) SRC=115.203.204.107 LEN=40 TTL=49 ID=38715 TCP DPT=8080 WINDOW=51228 SYN
2019-10-19 12:41:07

Recently Reported IPs

104.177.221.228 18.123.201.39 77.137.79.30 1.129.108.36
67.205.139.234 97.13.143.39 1.10.185.131 52.101.62.46
148.85.192.215 162.215.59.230 95.204.141.210 46.100.126.151
67.149.205.207 131.125.23.35 74.27.10.158 185.254.122.37
53.137.220.69 177.38.240.202 219.68.99.49 45.133.49.130