Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.149.144.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.149.144.225.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025071100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 11 15:46:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 225.144.149.41.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 225.144.149.41.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
188.162.132.250 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-16 20:35:13,486 INFO [amun_request_handler] PortScan Detected on Port: 445 (188.162.132.250)
2019-07-17 08:08:08
112.85.42.237 attackbots
Jul 17 05:11:17 areeb-Workstation sshd\[12937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul 17 05:11:19 areeb-Workstation sshd\[12937\]: Failed password for root from 112.85.42.237 port 10418 ssh2
Jul 17 05:11:55 areeb-Workstation sshd\[13019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2019-07-17 07:54:02
186.89.253.179 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-16 20:36:30,145 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.89.253.179)
2019-07-17 07:50:39
71.6.199.23 attackspambots
Honeypot hit.
2019-07-17 07:43:39
141.98.80.71 attackbots
Jul 17 01:19:34 srv-4 sshd\[5897\]: Invalid user admin from 141.98.80.71
Jul 17 01:19:34 srv-4 sshd\[5897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.71
Jul 17 01:19:34 srv-4 sshd\[5896\]: Invalid user admin from 141.98.80.71
Jul 17 01:19:34 srv-4 sshd\[5896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.71
...
2019-07-17 07:28:12
109.230.47.100 attackspam
WordPress wp-login brute force :: 109.230.47.100 0.104 BYPASS [17/Jul/2019:07:08:51  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-17 07:43:07
37.49.224.123 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-16 21:58:53,082 INFO [amun_request_handler] unknown vuln (Attacker: 37.49.224.123 Port: 25, Mess: ['QUIT
'] (6) Stages: ['IMAIL_STAGE2'])
2019-07-17 07:45:34
117.102.88.119 attackspam
2019-07-16T23:26:49.099558abusebot-5.cloudsearch.cf sshd\[32435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.88.119  user=root
2019-07-17 07:27:01
181.48.29.35 attackbotsspam
Jul 17 01:31:27 giegler sshd[11846]: Invalid user sftp from 181.48.29.35 port 42559
2019-07-17 07:40:33
54.38.47.28 attackbots
2019-07-17T00:12:58.676809abusebot-5.cloudsearch.cf sshd\[32610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3115987.ip-54-38-47.eu  user=root
2019-07-17 08:13:02
120.52.120.166 attackspam
May 27 18:16:55 server sshd\[57119\]: Invalid user fm from 120.52.120.166
May 27 18:16:55 server sshd\[57119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.166
May 27 18:16:56 server sshd\[57119\]: Failed password for invalid user fm from 120.52.120.166 port 53424 ssh2
...
2019-07-17 07:38:05
113.160.150.233 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-16 20:35:11,928 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.160.150.233)
2019-07-17 08:11:38
141.98.80.61 attackspambots
Jul 17 01:01:30 mail postfix/smtpd\[6229\]: warning: unknown\[141.98.80.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 17 01:01:42 mail postfix/smtpd\[6229\]: warning: unknown\[141.98.80.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 17 01:21:48 mail postfix/smtpd\[6426\]: warning: unknown\[141.98.80.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 17 02:00:22 mail postfix/smtpd\[8596\]: warning: unknown\[141.98.80.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-17 08:07:06
112.140.185.64 attack
Jul 17 00:02:29 cvbmail sshd\[26922\]: Invalid user kbecker from 112.140.185.64
Jul 17 00:02:29 cvbmail sshd\[26922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.140.185.64
Jul 17 00:02:31 cvbmail sshd\[26922\]: Failed password for invalid user kbecker from 112.140.185.64 port 56062 ssh2
2019-07-17 07:36:16
64.113.32.29 attackbotsspam
Jul 17 00:27:39 km20725 sshd\[27559\]: Failed password for root from 64.113.32.29 port 40282 ssh2Jul 17 00:27:42 km20725 sshd\[27559\]: Failed password for root from 64.113.32.29 port 40282 ssh2Jul 17 00:27:45 km20725 sshd\[27559\]: Failed password for root from 64.113.32.29 port 40282 ssh2Jul 17 00:27:48 km20725 sshd\[27559\]: Failed password for root from 64.113.32.29 port 40282 ssh2
...
2019-07-17 08:04:54

Recently Reported IPs

137.22.109.131 149.88.197.4 3.49.230.25 115.169.16.52
202.96.128.85 197.147.207.141 184.198.147.18 1.47.152.63
70.46.55.211 167.73.91.212 124.59.206.75 10.102.213.77
87.121.84.157 111.118.139.80 33.110.235.50 73.245.150.255
13.47.56.188 84.186.129.231 36.40.136.74 39.148.22.203