Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cape Town

Region: Western Cape

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.134.98.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.134.98.2.			IN	A

;; AUTHORITY SECTION:
.			287	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120300 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 03 14:42:12 CST 2019
;; MSG SIZE  rcvd: 115
Host info
2.98.134.41.in-addr.arpa domain name pointer mail.abassa.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.98.134.41.in-addr.arpa	name = mail.abassa.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
31.170.62.22 attackspambots
Jun 18 12:03:24 mail.srvfarm.net postfix/smtps/smtpd[1428746]: warning: unknown[31.170.62.22]: SASL PLAIN authentication failed: 
Jun 18 12:03:26 mail.srvfarm.net postfix/smtps/smtpd[1428746]: lost connection after AUTH from unknown[31.170.62.22]
Jun 18 12:04:30 mail.srvfarm.net postfix/smtps/smtpd[1428295]: warning: unknown[31.170.62.22]: SASL PLAIN authentication failed: 
Jun 18 12:04:31 mail.srvfarm.net postfix/smtps/smtpd[1428295]: lost connection after AUTH from unknown[31.170.62.22]
Jun 18 12:05:04 mail.srvfarm.net postfix/smtps/smtpd[1443001]: warning: unknown[31.170.62.22]: SASL PLAIN authentication failed:
2020-06-19 01:57:04
106.13.61.165 attackbotsspam
2020-06-18T15:18:12.551768mail.standpoint.com.ua sshd[7991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.61.165
2020-06-18T15:18:12.549148mail.standpoint.com.ua sshd[7991]: Invalid user ts from 106.13.61.165 port 36382
2020-06-18T15:18:14.416198mail.standpoint.com.ua sshd[7991]: Failed password for invalid user ts from 106.13.61.165 port 36382 ssh2
2020-06-18T15:21:49.447186mail.standpoint.com.ua sshd[8541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.61.165  user=root
2020-06-18T15:21:51.436879mail.standpoint.com.ua sshd[8541]: Failed password for root from 106.13.61.165 port 57162 ssh2
...
2020-06-19 02:09:53
77.45.86.165 attackbotsspam
Jun 18 11:56:20 mail.srvfarm.net postfix/smtps/smtpd[1427307]: warning: 77-45-86-165.sta.asta-net.com.pl[77.45.86.165]: SASL PLAIN authentication failed: 
Jun 18 11:56:20 mail.srvfarm.net postfix/smtps/smtpd[1427307]: lost connection after AUTH from 77-45-86-165.sta.asta-net.com.pl[77.45.86.165]
Jun 18 11:56:41 mail.srvfarm.net postfix/smtps/smtpd[1428298]: warning: 77-45-86-165.sta.asta-net.com.pl[77.45.86.165]: SASL PLAIN authentication failed: 
Jun 18 11:56:41 mail.srvfarm.net postfix/smtps/smtpd[1428298]: lost connection after AUTH from 77-45-86-165.sta.asta-net.com.pl[77.45.86.165]
Jun 18 12:01:02 mail.srvfarm.net postfix/smtpd[1431695]: warning: 77-45-86-165.sta.asta-net.com.pl[77.45.86.165]: SASL PLAIN authentication failed:
2020-06-19 01:55:13
90.145.212.114 attackspambots
2020-06-18T18:44:00.011594mail.broermann.family sshd[25385]: Invalid user ricoh from 90.145.212.114 port 47276
2020-06-18T18:44:01.933194mail.broermann.family sshd[25385]: Failed password for invalid user ricoh from 90.145.212.114 port 47276 ssh2
2020-06-18T18:47:20.126722mail.broermann.family sshd[25705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90-145-212-114.bbserv.nl  user=root
2020-06-18T18:47:21.837899mail.broermann.family sshd[25705]: Failed password for root from 90.145.212.114 port 47350 ssh2
2020-06-18T18:50:26.947622mail.broermann.family sshd[25999]: Invalid user avinash from 90.145.212.114 port 47402
...
2020-06-19 01:48:04
45.228.254.168 attack
Jun 18 12:19:50 mail.srvfarm.net postfix/smtps/smtpd[1444027]: warning: unknown[45.228.254.168]: SASL PLAIN authentication failed: 
Jun 18 12:19:50 mail.srvfarm.net postfix/smtps/smtpd[1444027]: lost connection after AUTH from unknown[45.228.254.168]
Jun 18 12:22:16 mail.srvfarm.net postfix/smtps/smtpd[1445145]: warning: unknown[45.228.254.168]: SASL PLAIN authentication failed: 
Jun 18 12:22:16 mail.srvfarm.net postfix/smtps/smtpd[1445145]: lost connection after AUTH from unknown[45.228.254.168]
Jun 18 12:25:32 mail.srvfarm.net postfix/smtps/smtpd[1446443]: warning: unknown[45.228.254.168]: SASL PLAIN authentication failed:
2020-06-19 01:32:53
63.81.93.144 attackspambots
Jun 18 12:04:37 mail.srvfarm.net postfix/smtpd[1443688]: NOQUEUE: reject: RCPT from writer.ketabaneh.com[63.81.93.144]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 12:04:37 mail.srvfarm.net postfix/smtpd[1443692]: NOQUEUE: reject: RCPT from writer.ketabaneh.com[63.81.93.144]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 12:04:37 mail.srvfarm.net postfix/smtpd[1431696]: NOQUEUE: reject: RCPT from writer.ketabaneh.com[63.81.93.144]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Ju
2020-06-19 01:55:37
106.53.74.246 attackspambots
Jun 18 14:06:45 vps sshd[19074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.74.246 
Jun 18 14:06:47 vps sshd[19074]: Failed password for invalid user weblogic from 106.53.74.246 port 39250 ssh2
Jun 18 14:13:01 vps sshd[19601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.74.246 
...
2020-06-19 01:49:49
68.183.181.7 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-19 01:43:46
194.26.29.25 attackbotsspam
Jun 18 19:30:19 debian-2gb-nbg1-2 kernel: \[14760112.137790\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.25 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=24957 PROTO=TCP SPT=43538 DPT=5595 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-19 01:45:29
212.83.131.135 attackbotsspam
Jun 18 15:43:50 server sshd[32558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.131.135
Jun 18 15:43:52 server sshd[32558]: Failed password for invalid user apotre from 212.83.131.135 port 57176 ssh2
Jun 18 15:47:29 server sshd[623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.131.135
...
2020-06-19 02:09:01
92.55.237.181 attack
Jun 18 11:59:43 mail.srvfarm.net postfix/smtps/smtpd[1428297]: warning: unknown[92.55.237.181]: SASL PLAIN authentication failed: 
Jun 18 11:59:43 mail.srvfarm.net postfix/smtps/smtpd[1428297]: lost connection after AUTH from unknown[92.55.237.181]
Jun 18 12:00:21 mail.srvfarm.net postfix/smtps/smtpd[1427308]: warning: unknown[92.55.237.181]: SASL PLAIN authentication failed: 
Jun 18 12:00:21 mail.srvfarm.net postfix/smtps/smtpd[1427308]: lost connection after AUTH from unknown[92.55.237.181]
Jun 18 12:01:53 mail.srvfarm.net postfix/smtps/smtpd[1442968]: warning: unknown[92.55.237.181]: SASL PLAIN authentication failed:
2020-06-19 01:54:37
65.191.76.227 attack
odoo8
...
2020-06-19 01:39:34
58.213.155.227 attackbots
Jun 18 07:21:26 server1 sshd\[2828\]: Invalid user timo from 58.213.155.227
Jun 18 07:21:26 server1 sshd\[2828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.155.227 
Jun 18 07:21:28 server1 sshd\[2828\]: Failed password for invalid user timo from 58.213.155.227 port 10109 ssh2
Jun 18 07:29:16 server1 sshd\[8633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.155.227  user=root
Jun 18 07:29:18 server1 sshd\[8633\]: Failed password for root from 58.213.155.227 port 35845 ssh2
...
2020-06-19 02:17:05
218.92.0.133 attack
2020-06-18T13:44:09.490240xentho-1 sshd[431736]: Failed password for root from 218.92.0.133 port 19617 ssh2
2020-06-18T13:44:03.328468xentho-1 sshd[431736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-06-18T13:44:05.874063xentho-1 sshd[431736]: Failed password for root from 218.92.0.133 port 19617 ssh2
2020-06-18T13:44:09.490240xentho-1 sshd[431736]: Failed password for root from 218.92.0.133 port 19617 ssh2
2020-06-18T13:44:14.260078xentho-1 sshd[431736]: Failed password for root from 218.92.0.133 port 19617 ssh2
2020-06-18T13:44:03.328468xentho-1 sshd[431736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-06-18T13:44:05.874063xentho-1 sshd[431736]: Failed password for root from 218.92.0.133 port 19617 ssh2
2020-06-18T13:44:09.490240xentho-1 sshd[431736]: Failed password for root from 218.92.0.133 port 19617 ssh2
2020-06-18T13:44:14.260078xent
...
2020-06-19 01:45:03
36.57.40.159 attackspam
Jun 18 11:59:11 web01.agentur-b-2.de postfix/smtpd[1143989]: warning: unknown[36.57.40.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 11:59:11 web01.agentur-b-2.de postfix/smtpd[1143989]: lost connection after AUTH from unknown[36.57.40.159]
Jun 18 11:59:19 web01.agentur-b-2.de postfix/smtpd[1142666]: warning: unknown[36.57.40.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 11:59:19 web01.agentur-b-2.de postfix/smtpd[1142666]: lost connection after AUTH from unknown[36.57.40.159]
Jun 18 11:59:31 web01.agentur-b-2.de postfix/smtpd[1143989]: warning: unknown[36.57.40.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-19 01:56:37

Recently Reported IPs

51.83.105.201 42.67.77.128 202.136.207.225 221.248.47.13
70.175.90.86 221.214.218.5 81.255.165.86 62.95.40.83
33.51.1.113 186.216.29.98 38.192.168.141 37.35.173.165
202.205.160.240 212.15.181.137 36.233.167.193 250.192.193.182
156.194.166.72 193.185.92.123 49.73.31.59 166.147.247.206