Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.145.192.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.145.192.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 17:24:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
55.192.145.41.in-addr.arpa domain name pointer 8ta-145-192-55.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.192.145.41.in-addr.arpa	name = 8ta-145-192-55.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.200.238.156 attackspambots
Attempted to connect 2 times to port 23 TCP
2019-07-10 04:12:57
104.238.116.94 attack
Automatic report - Web App Attack
2019-07-10 04:33:44
41.242.136.5 attack
Attempted to scam professionals in an online directory
2019-07-10 04:37:29
209.17.96.218 attackspambots
port scan and connect, tcp 8081 (blackice-icecap)
2019-07-10 04:38:12
106.13.6.61 attackspam
wget call in url
2019-07-10 03:59:18
45.7.230.193 attackspam
10 attempts against mh-misc-ban on creek.magehost.pro
2019-07-10 04:27:51
209.17.97.66 attack
port scan and connect, tcp 8080 (http-proxy)
2019-07-10 04:07:09
190.64.137.171 attackbotsspam
Jul  9 17:56:38 vps691689 sshd[4601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.137.171
Jul  9 17:56:40 vps691689 sshd[4601]: Failed password for invalid user test10 from 190.64.137.171 port 49926 ssh2
...
2019-07-10 04:42:21
1.227.93.172 attack
scan z
2019-07-10 03:57:15
206.189.134.83 attackspam
Jul  9 06:09:26 *** sshd[3375]: Failed password for invalid user tabatha from 206.189.134.83 port 41598 ssh2
Jul  9 08:16:29 *** sshd[4979]: Failed password for invalid user webadmin from 206.189.134.83 port 49490 ssh2
2019-07-10 04:24:53
64.183.118.227 attackspambots
Honeypot hit.
2019-07-10 04:43:23
167.86.119.191 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 04:40:41
85.209.0.115 attackbots
Port scan on 17 port(s): 10471 12249 15776 15903 17754 20143 21063 24648 32840 34675 35354 38720 46568 56235 57276 57459 58178
2019-07-10 04:28:41
209.17.97.10 attack
port scan and connect, tcp 8888 (sun-answerbook)
2019-07-10 04:25:11
217.79.101.53 attack
Unauthorized connection attempt from IP address 217.79.101.53 on Port 137(NETBIOS)
2019-07-10 04:19:52

Recently Reported IPs

17.96.152.5 57.35.218.101 29.112.217.207 73.105.111.115
32.12.25.141 199.186.3.35 125.170.35.181 233.41.101.94
200.18.197.115 13.0.244.147 221.36.147.207 91.146.49.231
83.179.218.102 135.115.134.176 217.250.187.8 164.145.176.88
193.111.79.36 137.49.98.87 26.213.76.200 118.178.184.182