Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.149.25.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.149.25.201.			IN	A

;; AUTHORITY SECTION:
.			428	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100401 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 05 03:03:01 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 201.25.149.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.25.149.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.90.21.49 attack
Invalid user faridah from 165.90.21.49 port 27988
2019-08-01 02:42:44
79.137.87.44 attack
Jul 31 16:45:25 jupiter sshd\[17501\]: Invalid user reward from 79.137.87.44
Jul 31 16:45:25 jupiter sshd\[17501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.87.44
Jul 31 16:45:27 jupiter sshd\[17501\]: Failed password for invalid user reward from 79.137.87.44 port 42335 ssh2
...
2019-08-01 02:18:05
111.223.73.20 attackspam
Jul 31 16:13:17 lnxded64 sshd[22909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.223.73.20
2019-08-01 01:57:33
121.190.197.205 attack
2019-06-12T17:46:25.461Z CLOSE host=121.190.197.205 port=49322 fd=4 time=43.776 bytes=7951
...
2019-08-01 02:35:04
177.83.13.194 attack
Invalid user vero from 177.83.13.194 port 41375
2019-08-01 01:55:13
83.54.43.246 attackspam
blacklist username nux
Invalid user nux from 83.54.43.246 port 55862
2019-08-01 02:37:27
213.152.161.74 attackbotsspam
Invalid user admin from 213.152.161.74 port 34850
2019-08-01 01:50:42
142.93.47.74 attack
Jul 31 14:58:55 XXXXXX sshd[25340]: Invalid user teamspeak from 142.93.47.74 port 56508
2019-08-01 02:33:20
67.207.91.133 attackspam
Invalid user may from 67.207.91.133 port 37688
2019-08-01 02:38:09
150.223.15.234 attackbots
Jul 31 12:34:51 [host] sshd[28141]: Invalid user admin from 150.223.15.234
Jul 31 12:34:51 [host] sshd[28141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.15.234
Jul 31 12:34:54 [host] sshd[28141]: Failed password for invalid user admin from 150.223.15.234 port 39795 ssh2
2019-08-01 01:56:46
51.254.39.23 attack
Invalid user helen from 51.254.39.23 port 46898
2019-08-01 01:48:13
193.188.22.188 attackspambots
kp-sea2-01 recorded 2 login violations from 193.188.22.188 and was blocked at 2019-07-31 18:25:45. 193.188.22.188 has been blocked on 1 previous occasions. 193.188.22.188's first attempt was recorded at 2019-07-28 18:22:48
2019-08-01 02:40:52
35.199.74.148 attack
SSH Brute Force, server-1 sshd[19819]: Failed password for invalid user dev from 35.199.74.148 port 39026 ssh2
2019-08-01 02:05:46
222.180.162.8 attackbots
Invalid user user03 from 222.180.162.8 port 52713
2019-08-01 02:40:01
128.199.54.252 attackbotsspam
Automatic report - Banned IP Access
2019-08-01 02:11:07

Recently Reported IPs

32.240.6.131 184.254.105.32 204.234.23.120 156.143.220.161
126.208.150.150 152.191.37.141 198.199.72.42 108.213.21.37
204.96.91.71 144.74.159.51 113.91.176.162 203.119.13.54
87.36.87.135 67.123.83.220 102.49.100.185 96.230.104.90
186.153.250.47 32.173.233.227 175.50.184.143 67.120.92.73