Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: Vodacom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
41.13.44.24 attackbotsspam
Attempted connection to port 80.
2020-04-05 06:28:15
41.13.44.11 attackspam
Black market oil scam
2019-07-29 02:53:05
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.13.4.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.13.4.140.			IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020110800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 100.100.2.138#53(100.100.2.138)
;; WHEN: Sun Nov 08 19:09:04 CST 2020
;; MSG SIZE  rcvd: 115

Host info
140.4.13.41.in-addr.arpa domain name pointer vc-nat-gp-s-41-13-4-140.umts.vodacom.co.za.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
140.4.13.41.in-addr.arpa	name = vc-nat-gp-s-41-13-4-140.umts.vodacom.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
178.57.62.120 attack
port scan and connect, tcp 23 (telnet)
2019-12-07 09:15:19
185.175.93.107 attackbots
12/06/2019-19:44:14.124959 185.175.93.107 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-07 08:49:56
185.153.196.97 attackspambots
Brute force attack stopped by firewall
2019-12-07 09:00:02
185.156.73.11 attack
Multiport scan : 10 ports scanned 18118 18120 18859 18860 18861 34105 34107 35734 35735 35736
2019-12-07 08:59:15
185.176.27.26 attack
12/07/2019-01:33:53.960790 185.176.27.26 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-07 08:46:22
185.175.93.45 attack
54548/tcp 54550/tcp 54547/tcp...
[2019-10-08/12-06]630pkt,217pt.(tcp)
2019-12-07 08:52:48
51.75.52.195 attack
Dec  7 04:19:25 vibhu-HP-Z238-Microtower-Workstation sshd\[11450\]: Invalid user P@ssword from 51.75.52.195
Dec  7 04:19:25 vibhu-HP-Z238-Microtower-Workstation sshd\[11450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.195
Dec  7 04:19:27 vibhu-HP-Z238-Microtower-Workstation sshd\[11450\]: Failed password for invalid user P@ssword from 51.75.52.195 port 38408 ssh2
Dec  7 04:25:21 vibhu-HP-Z238-Microtower-Workstation sshd\[11921\]: Invalid user 8888888888 from 51.75.52.195
Dec  7 04:25:21 vibhu-HP-Z238-Microtower-Workstation sshd\[11921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.195
...
2019-12-07 08:54:53
185.176.27.94 attackbotsspam
Multiport scan : 7 ports scanned 1000 2000 3392 3397 10000 13389 33890
2019-12-07 08:43:36
185.143.223.144 attackspambots
Multiport scan : 29 ports scanned 1055 1075 1370 1999 3115 3145 3364 3480 3590 4365 4389 4492 5175 5340 6435 6510 9944 10820 10895 11155 14541 14941 15851 20102 41014 53035 53835 58000 63336
2019-12-07 09:04:22
118.24.158.42 attack
2019-12-07T00:55:09.625219abusebot-3.cloudsearch.cf sshd\[5320\]: Invalid user smotherman from 118.24.158.42 port 35224
2019-12-07 09:11:05
51.15.84.255 attackbotsspam
Dec  6 18:29:41 dallas01 sshd[32275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.84.255
Dec  6 18:29:43 dallas01 sshd[32275]: Failed password for invalid user billie from 51.15.84.255 port 48732 ssh2
Dec  6 18:38:39 dallas01 sshd[2866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.84.255
2019-12-07 09:13:49
185.143.223.104 attack
firewall-block, port(s): 1167/tcp, 1233/tcp, 2211/tcp, 4345/tcp, 5123/tcp, 5235/tcp, 7896/tcp, 7898/tcp, 8904/tcp, 8907/tcp, 14344/tcp, 18687/tcp, 19999/tcp, 33894/tcp, 53940/tcp
2019-12-07 09:07:50
185.143.223.129 attack
2019-12-07T01:45:46.997313+01:00 lumpi kernel: [969498.365618] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.129 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=27813 PROTO=TCP SPT=42199 DPT=11865 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-07 09:05:56
180.163.220.125 attackspambots
Multiport scan : 13 ports scanned 146 254 1049 3128 3826 4445 5033 6112 9040 9110 15002 50389 65000
2019-12-07 09:08:36
79.192.229.159 attack
Chat Spam
2019-12-07 09:10:00

Recently Reported IPs

37.150.116.228 69.4.93.211 140.213.15.98 139.138.209.82
144.217.80.144 82.19.145.3 162.158.183.167 186.146.51.189
87.103.55.137 217.138.209.53 128.199.182.128 167.172.131.253
112.53.68.114 76.117.137.11 111.43.41.96 51.222.43.123
104.248.42.128 218.77.46.228 169.239.11.196 206.127.201.28