Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.147.97.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.147.97.105.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:40:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
105.97.147.41.in-addr.arpa domain name pointer 8ta-147-97-105.telkomadsl.co.za.
Nslookup info:
b'105.97.147.41.in-addr.arpa	name = 8ta-147-97-105.telkomadsl.co.za.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
36.90.82.21 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 04-01-2020 04:50:10.
2020-01-04 16:52:38
178.170.237.198 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-04 16:50:50
178.128.242.233 attack
Invalid user maverick from 178.128.242.233 port 41558
2020-01-04 16:38:38
14.245.2.30 attackspambots
Unauthorized connection attempt detected from IP address 14.245.2.30 to port 445
2020-01-04 16:40:55
189.126.168.43 attackspam
firewall-block, port(s): 1433/tcp
2020-01-04 16:49:21
61.245.161.85 attackspambots
SMTP/25/465/587 Probe, BadAuth, SPAM, Hack -
2020-01-04 16:55:21
222.186.190.2 attack
SSH auth scanning - multiple failed logins
2020-01-04 17:00:48
35.225.211.131 attack
35.225.211.131 - - \[04/Jan/2020:08:44:31 +0100\] "POST /wp-login.php HTTP/1.0" 200 7427 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.225.211.131 - - \[04/Jan/2020:08:44:33 +0100\] "POST /wp-login.php HTTP/1.0" 200 7242 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.225.211.131 - - \[04/Jan/2020:08:44:35 +0100\] "POST /wp-login.php HTTP/1.0" 200 7239 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-04 16:49:55
51.75.31.33 attackbots
Jan  4 06:57:56 ip-172-31-62-245 sshd\[9089\]: Invalid user kms from 51.75.31.33\
Jan  4 06:57:58 ip-172-31-62-245 sshd\[9089\]: Failed password for invalid user kms from 51.75.31.33 port 44192 ssh2\
Jan  4 07:01:17 ip-172-31-62-245 sshd\[9125\]: Invalid user ulva from 51.75.31.33\
Jan  4 07:01:19 ip-172-31-62-245 sshd\[9125\]: Failed password for invalid user ulva from 51.75.31.33 port 47824 ssh2\
Jan  4 07:04:26 ip-172-31-62-245 sshd\[9199\]: Invalid user zew from 51.75.31.33\
2020-01-04 16:28:24
89.40.59.174 attackspam
WordPress wp-login brute force :: 89.40.59.174 0.068 BYPASS [04/Jan/2020:04:50:24  0000] www.[censored_4] "POST /wp-login.php HTTP/1.1" 200 2063 "https://[censored_4]/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:63.0) Gecko/20100101 Firefox/63.0"
2020-01-04 16:44:38
129.213.63.120 attack
Jan  4 07:03:09 SilenceServices sshd[20921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120
Jan  4 07:03:11 SilenceServices sshd[20921]: Failed password for invalid user safeuser from 129.213.63.120 port 37056 ssh2
Jan  4 07:04:49 SilenceServices sshd[21383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120
2020-01-04 16:40:12
88.132.66.26 attack
Automatic report - SSH Brute-Force Attack
2020-01-04 16:29:19
59.50.140.41 attackbotsspam
Fail2Ban Ban Triggered
2020-01-04 16:39:40
92.118.160.13 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 96 - port: 8888 proto: TCP cat: Misc Attack
2020-01-04 16:59:19
196.202.127.190 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-01-04 17:10:23

Recently Reported IPs

79.23.43.164 98.45.189.52 4.181.219.81 230.212.158.2
121.212.38.155 87.32.104.145 22.146.106.79 98.140.126.136
247.254.13.205 67.167.40.36 46.24.244.7 20.139.52.161
174.220.234.8 103.42.143.247 57.115.242.87 72.152.91.171
144.242.207.211 149.124.91.104 179.47.113.233 133.74.111.11