Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.132.247.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.132.247.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:04:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 2.247.132.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.247.132.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
164.132.47.139 attack
Jul  7 06:32:31 server sshd\[37026\]: Invalid user sybase from 164.132.47.139
Jul  7 06:32:31 server sshd\[37026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139
Jul  7 06:32:34 server sshd\[37026\]: Failed password for invalid user sybase from 164.132.47.139 port 48776 ssh2
...
2019-10-09 15:24:56
222.186.175.183 attackbots
Brute force attempt
2019-10-09 15:32:59
164.132.80.139 attack
Aug 18 20:11:25 server sshd\[148991\]: Invalid user sss from 164.132.80.139
Aug 18 20:11:25 server sshd\[148991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Aug 18 20:11:27 server sshd\[148991\]: Failed password for invalid user sss from 164.132.80.139 port 32862 ssh2
...
2019-10-09 15:22:22
103.214.185.30 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 09-10-2019 04:55:16.
2019-10-09 15:02:25
131.196.7.234 attackspam
Oct  9 08:08:54 * sshd[23286]: Failed password for root from 131.196.7.234 port 60475 ssh2
2019-10-09 15:10:55
164.132.98.75 attack
Jul 22 05:28:24 server sshd\[215831\]: Invalid user arun from 164.132.98.75
Jul 22 05:28:24 server sshd\[215831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75
Jul 22 05:28:26 server sshd\[215831\]: Failed password for invalid user arun from 164.132.98.75 port 60973 ssh2
...
2019-10-09 15:21:59
164.132.42.32 attackspam
Oct  9 07:11:10 web8 sshd\[2777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.42.32  user=root
Oct  9 07:11:12 web8 sshd\[2777\]: Failed password for root from 164.132.42.32 port 54298 ssh2
Oct  9 07:14:38 web8 sshd\[4442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.42.32  user=root
Oct  9 07:14:40 web8 sshd\[4442\]: Failed password for root from 164.132.42.32 port 37464 ssh2
Oct  9 07:18:09 web8 sshd\[6125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.42.32  user=root
2019-10-09 15:26:44
117.0.32.231 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 09-10-2019 04:55:17.
2019-10-09 15:00:28
124.41.215.76 attack
*Port Scan* detected from 124.41.215.76 (NP/Nepal/-). 4 hits in the last 110 seconds
2019-10-09 15:14:47
164.77.77.251 attack
Jul 24 14:41:38 server sshd\[214821\]: Invalid user waldo from 164.77.77.251
Jul 24 14:41:38 server sshd\[214821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.77.251
Jul 24 14:41:40 server sshd\[214821\]: Failed password for invalid user waldo from 164.77.77.251 port 48192 ssh2
...
2019-10-09 15:14:28
125.64.94.211 attackspambots
09.10.2019 04:28:42 Connection to port 5984 blocked by firewall
2019-10-09 15:34:11
45.82.153.37 attackbots
SMTP invalid logins 298 and blocked 859 Dates: 2-10-2019 till 9-10-2019
2019-10-09 15:22:53
164.160.142.85 attack
Apr 11 03:03:03 server sshd\[98531\]: Invalid user www from 164.160.142.85
Apr 11 03:03:03 server sshd\[98531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.160.142.85
Apr 11 03:03:05 server sshd\[98531\]: Failed password for invalid user www from 164.160.142.85 port 23434 ssh2
...
2019-10-09 15:19:49
51.254.131.137 attack
Oct  9 03:54:52 sshgateway sshd\[18398\]: Invalid user 123 from 51.254.131.137
Oct  9 03:54:52 sshgateway sshd\[18398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.131.137
Oct  9 03:54:54 sshgateway sshd\[18398\]: Failed password for invalid user 123 from 51.254.131.137 port 51644 ssh2
2019-10-09 15:25:27
164.163.99.10 attackspambots
May 18 20:36:07 server sshd\[195685\]: Invalid user anastacia from 164.163.99.10
May 18 20:36:07 server sshd\[195685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.99.10
May 18 20:36:08 server sshd\[195685\]: Failed password for invalid user anastacia from 164.163.99.10 port 46792 ssh2
...
2019-10-09 15:18:10

Recently Reported IPs

9.88.52.27 14.169.13.232 41.159.205.249 135.179.237.218
4.29.171.113 57.127.56.73 44.163.131.124 12.100.244.230
22.197.31.8 154.186.250.128 115.92.31.115 95.175.151.168
20.190.217.5 236.179.206.122 231.119.97.231 41.157.5.55
65.41.142.133 78.6.122.205 78.184.189.96 219.97.45.1