Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uganda

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.138.213.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.138.213.105.			IN	A

;; AUTHORITY SECTION:
.			129	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112500 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 25 19:13:01 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 105.213.138.41.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
** server can't find 105.213.138.41.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
174.219.1.104 attackspambots
Brute forcing email accounts
2020-06-12 20:17:54
37.49.226.4 attack
Jun 12 14:09:52 debian-2gb-nbg1-2 kernel: \[14222513.704042\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.49.226.4 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=40786 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-12 20:13:07
144.172.73.41 attackbots
Invalid user honey from 144.172.73.41 port 56328
2020-06-12 20:07:05
112.84.94.148 attackbotsspam
spam (f2b h1)
2020-06-12 19:50:39
46.105.28.141 attackbotsspam
Jun 12 14:09:40 vps647732 sshd[25625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.28.141
Jun 12 14:09:42 vps647732 sshd[25625]: Failed password for invalid user jenkins from 46.105.28.141 port 60932 ssh2
...
2020-06-12 20:22:41
103.106.211.126 attack
Jun 12 12:05:32 web8 sshd\[15652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.106.211.126  user=root
Jun 12 12:05:33 web8 sshd\[15652\]: Failed password for root from 103.106.211.126 port 27434 ssh2
Jun 12 12:09:48 web8 sshd\[18094\]: Invalid user foxi from 103.106.211.126
Jun 12 12:09:48 web8 sshd\[18094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.106.211.126
Jun 12 12:09:50 web8 sshd\[18094\]: Failed password for invalid user foxi from 103.106.211.126 port 21506 ssh2
2020-06-12 20:15:13
123.207.34.86 attack
frenzy
2020-06-12 20:18:53
41.185.8.51 attack
Automatic report - XMLRPC Attack
2020-06-12 19:49:07
98.110.243.204 attack
Jun 12 08:53:56 eventyay sshd[14083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.110.243.204
Jun 12 08:53:56 eventyay sshd[14084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.110.243.204
Jun 12 08:53:58 eventyay sshd[14083]: Failed password for invalid user pi from 98.110.243.204 port 51026 ssh2
...
2020-06-12 19:52:42
103.129.223.98 attackspambots
Invalid user webuser from 103.129.223.98 port 54584
2020-06-12 20:00:52
202.155.217.150 attack
Jun 12 02:05:41 php1 sshd\[15391\]: Invalid user uhw from 202.155.217.150
Jun 12 02:05:41 php1 sshd\[15391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.155.217.150
Jun 12 02:05:43 php1 sshd\[15391\]: Failed password for invalid user uhw from 202.155.217.150 port 57402 ssh2
Jun 12 02:09:29 php1 sshd\[15874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.155.217.150  user=root
Jun 12 02:09:32 php1 sshd\[15874\]: Failed password for root from 202.155.217.150 port 22440 ssh2
2020-06-12 20:25:38
163.172.251.80 attackbotsspam
Invalid user mattermost from 163.172.251.80 port 53980
2020-06-12 19:58:37
164.138.23.149 attack
Jun 12 19:15:51 itv-usvr-01 sshd[30003]: Invalid user admin from 164.138.23.149
2020-06-12 20:24:35
94.31.181.195 attackbotsspam
Unauthorised access (Jun 12) SRC=94.31.181.195 LEN=52 PREC=0x20 TTL=116 ID=13394 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Jun  8) SRC=94.31.181.195 LEN=52 PREC=0x20 TTL=116 ID=32629 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-12 20:12:41
186.225.36.65 attack
Unauthorized IMAP connection attempt
2020-06-12 20:29:30

Recently Reported IPs

8.21.30.239 123.107.15.152 113.46.170.210 184.108.168.196
239.224.155.86 125.174.178.3 83.104.178.97 179.36.246.118
220.164.2.110 178.126.163.250 149.56.108.53 65.134.186.162
88.214.57.150 162.243.6.134 78.135.31.200 113.248.22.122
81.240.9.147 113.172.241.92 113.172.40.153 151.248.59.161