Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: MTN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.125.81.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.125.81.133.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112802 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 29 06:38:05 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 133.81.125.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.81.125.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.86.110.239 attack
Failed password for root from 167.86.110.239 port 53924 ssh2
2020-09-24 21:49:52
156.206.95.238 attackbotsspam
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=46583  .  dstport=23  .     (2894)
2020-09-24 22:14:32
84.178.177.212 attack
Invalid user customer1 from 84.178.177.212 port 42539
2020-09-24 21:53:45
191.5.97.240 attack
Lines containing failures of 191.5.97.240
Sep 23 18:48:36 matrix01 sshd[1844]: reveeclipse mapping checking getaddrinfo for 191-5-97-240.redeglobaltelecom.net.br [191.5.97.240] failed.
Sep 23 18:48:36 matrix01 sshd[1844]: Invalid user admin from 191.5.97.240 port 36339
Sep 23 18:48:37 matrix01 sshd[1844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.97.240 
Sep 23 18:48:37 matrix01 sshd[1844]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.97.240 user=admin
Sep 23 18:48:39 matrix01 sshd[1844]: Failed password for invalid user admin from 191.5.97.240 port 36339 ssh2
Sep 23 18:48:41 matrix01 sshd[1844]: Connection closed by invalid user admin 191.5.97.240 port 36339 [preauth]
Sep 23 18:48:45 matrix01 sshd[1846]: reveeclipse mapping checking getaddrinfo for 191-5-97-240.redeglobaltelecom.net.br [191.5.97.240] failed.
Sep 23 18:48:45 matrix01 sshd[1846]: Invalid user admin from 191........
------------------------------
2020-09-24 22:12:08
58.87.72.42 attackbots
2020-09-24 08:18:00.701599-0500  localhost sshd[98965]: Failed password for invalid user produccion from 58.87.72.42 port 24928 ssh2
2020-09-24 21:56:27
172.105.104.115 attack
SSH Scan
2020-09-24 22:01:41
219.76.200.27 attack
$f2bV_matches
2020-09-24 21:50:25
67.205.143.140 attackspambots
67.205.143.140 - - [24/Sep/2020:12:19:47 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
67.205.143.140 - - [24/Sep/2020:12:19:49 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
67.205.143.140 - - [24/Sep/2020:12:19:55 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-24 21:55:43
219.246.187.32 attack
2020-09-23T22:19:35.332190correo.[domain] sshd[20230]: Invalid user tibco from 219.246.187.32 port 41988 2020-09-23T22:19:37.210944correo.[domain] sshd[20230]: Failed password for invalid user tibco from 219.246.187.32 port 41988 ssh2 2020-09-23T22:31:48.782287correo.[domain] sshd[21501]: Invalid user sg from 219.246.187.32 port 58730 ...
2020-09-24 22:13:35
164.132.196.98 attack
Invalid user git from 164.132.196.98 port 60111
2020-09-24 22:25:51
52.143.71.231 attack
Sep 24 15:58:46 theomazars sshd[5750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.143.71.231  user=root
Sep 24 15:58:48 theomazars sshd[5750]: Failed password for root from 52.143.71.231 port 61402 ssh2
2020-09-24 22:09:52
114.24.231.195 attackbotsspam
Sep 23 19:00:47 www sshd[13623]: Invalid user ubnt from 114.24.231.195
Sep 23 19:00:48 www sshd[13623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-24-231-195.dynamic-ip.hinet.net 
Sep 23 19:00:49 www sshd[13625]: Invalid user ubuntu from 114.24.231.195
Sep 23 19:00:50 www sshd[13625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-24-231-195.dynamic-ip.hinet.net 
Sep 23 19:00:50 www sshd[13623]: Failed password for invalid user ubnt from 114.24.231.195 port 40024 ssh2
Sep 23 19:00:50 www sshd[13623]: Connection closed by 114.24.231.195 [preauth]
Sep 23 19:00:52 www sshd[13625]: Failed password for invalid user ubuntu from 114.24.231.195 port 40503 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.24.231.195
2020-09-24 22:06:23
67.205.137.155 attack
$f2bV_matches
2020-09-24 22:11:14
111.230.204.113 attackbots
Sep 24 14:20:25 markkoudstaal sshd[2698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.204.113
Sep 24 14:20:27 markkoudstaal sshd[2698]: Failed password for invalid user front from 111.230.204.113 port 53738 ssh2
Sep 24 14:22:48 markkoudstaal sshd[3418]: Failed password for root from 111.230.204.113 port 51348 ssh2
...
2020-09-24 21:52:39
112.164.242.29 attackspam
Sep 24 11:47:59 pve1 sshd[19203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.164.242.29 
...
2020-09-24 21:53:04

Recently Reported IPs

149.163.236.251 103.84.44.119 37.1.229.186 154.72.98.217
32.172.101.119 30.93.181.181 30.90.115.5 56.4.29.218
169.57.220.214 29.225.3.220 106.196.167.97 6.90.66.178
109.206.241.233 26.66.253.242 41.113.86.61 33.83.56.32
30.102.112.39 176.15.235.100 18.37.189.34 213.222.228.104