Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Telkom SA Ltd.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.146.7.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2678
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.146.7.58.			IN	A

;; AUTHORITY SECTION:
.			3497	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 22 21:02:13 CST 2019
;; MSG SIZE  rcvd: 115
Host info
58.7.146.41.in-addr.arpa domain name pointer 8ta-146-7-58.telkomadsl.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
58.7.146.41.in-addr.arpa	name = 8ta-146-7-58.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.92.138.124 attackbots
Jan 10 04:58:35 *** sshd[24228]: User root from 120.92.138.124 not allowed because not listed in AllowUsers
2020-01-10 13:23:54
103.214.129.204 attackbots
Jan  9 17:26:35 server sshd\[18616\]: Invalid user vke from 103.214.129.204
Jan  9 17:26:35 server sshd\[18616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.214.129.204 
Jan  9 17:26:37 server sshd\[18616\]: Failed password for invalid user vke from 103.214.129.204 port 43154 ssh2
Jan 10 07:58:24 server sshd\[4027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.214.129.204  user=root
Jan 10 07:58:26 server sshd\[4027\]: Failed password for root from 103.214.129.204 port 32928 ssh2
...
2020-01-10 13:29:30
113.141.70.204 attack
repeated attempts to login to Voip server - unauthorized
2020-01-10 10:10:08
113.141.70.184 attack
repeated attempts to login to Voip server - unauthorized
2020-01-10 10:11:33
112.85.42.237 attackbotsspam
Jan 10 04:57:35 localhost sshd\[367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jan 10 04:57:37 localhost sshd\[367\]: Failed password for root from 112.85.42.237 port 35083 ssh2
Jan 10 04:57:39 localhost sshd\[367\]: Failed password for root from 112.85.42.237 port 35083 ssh2
Jan 10 04:57:41 localhost sshd\[367\]: Failed password for root from 112.85.42.237 port 35083 ssh2
Jan 10 04:58:43 localhost sshd\[378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2020-01-10 13:21:18
114.97.186.145 attackbotsspam
Brute force attempt
2020-01-10 13:03:23
173.252.127.12 attackspambots
2 Blacklist Status
2020-01-10 13:02:12
185.46.84.172 attackbotsspam
B: Magento admin pass test (wrong country)
2020-01-10 13:31:29
175.107.198.23 attackbotsspam
Jan 10 05:58:52 herz-der-gamer sshd[30421]: Invalid user chef from 175.107.198.23 port 51660
Jan 10 05:58:52 herz-der-gamer sshd[30421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.107.198.23
Jan 10 05:58:52 herz-der-gamer sshd[30421]: Invalid user chef from 175.107.198.23 port 51660
Jan 10 05:58:54 herz-der-gamer sshd[30421]: Failed password for invalid user chef from 175.107.198.23 port 51660 ssh2
...
2020-01-10 13:14:42
35.195.238.142 attackspam
Jan 10 04:52:49 ip-172-31-62-245 sshd\[29844\]: Invalid user tester from 35.195.238.142\
Jan 10 04:52:51 ip-172-31-62-245 sshd\[29844\]: Failed password for invalid user tester from 35.195.238.142 port 40762 ssh2\
Jan 10 04:55:59 ip-172-31-62-245 sshd\[29924\]: Failed password for root from 35.195.238.142 port 43060 ssh2\
Jan 10 04:58:45 ip-172-31-62-245 sshd\[29989\]: Invalid user maxime from 35.195.238.142\
Jan 10 04:58:47 ip-172-31-62-245 sshd\[29989\]: Failed password for invalid user maxime from 35.195.238.142 port 45370 ssh2\
2020-01-10 13:19:14
36.76.220.4 attackspambots
1578632355 - 01/10/2020 05:59:15 Host: 36.76.220.4/36.76.220.4 Port: 445 TCP Blocked
2020-01-10 13:02:32
5.135.177.168 attack
Jan 10 10:12:07 gw1 sshd[3633]: Failed password for root from 5.135.177.168 port 45868 ssh2
...
2020-01-10 13:17:30
222.186.175.169 attack
Jan 10 05:59:16 * sshd[29011]: Failed password for root from 222.186.175.169 port 7060 ssh2
Jan 10 05:59:31 * sshd[29011]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 7060 ssh2 [preauth]
2020-01-10 13:28:22
213.232.211.253 attack
1578605011 - 01/09/2020 22:23:31 Host: 213.232.211.253/213.232.211.253 Port: 445 TCP Blocked
2020-01-10 09:34:49
61.95.233.61 attack
Jan  9 18:52:40 hanapaa sshd\[21833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61  user=root
Jan  9 18:52:42 hanapaa sshd\[21833\]: Failed password for root from 61.95.233.61 port 35420 ssh2
Jan  9 18:55:50 hanapaa sshd\[22155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61  user=root
Jan  9 18:55:52 hanapaa sshd\[22155\]: Failed password for root from 61.95.233.61 port 32980 ssh2
Jan  9 18:58:58 hanapaa sshd\[22408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61  user=root
2020-01-10 13:12:52

Recently Reported IPs

103.229.72.72 182.23.62.195 203.156.216.202 41.206.62.174
170.0.125.147 209.141.40.86 77.48.137.3 113.4.101.64
169.255.10.106 45.56.173.25 200.233.72.225 209.107.216.89
62.147.254.185 25.166.155.135 12.132.229.57 198.177.157.14
241.248.79.74 106.12.93.12 188.166.7.24 162.241.141.143