Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Krugersdorp

Region: Gauteng

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.150.32.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.150.32.48.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021091702 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 18 05:59:44 CST 2021
;; MSG SIZE  rcvd: 105
Host info
48.32.150.41.in-addr.arpa domain name pointer 8ta-150-32-48.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.32.150.41.in-addr.arpa	name = 8ta-150-32-48.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.212 attackbotsspam
Feb  7 21:16:55 meumeu sshd[20996]: Failed password for root from 218.92.0.212 port 60121 ssh2
Feb  7 21:16:59 meumeu sshd[20996]: Failed password for root from 218.92.0.212 port 60121 ssh2
Feb  7 21:17:03 meumeu sshd[20996]: Failed password for root from 218.92.0.212 port 60121 ssh2
Feb  7 21:17:06 meumeu sshd[20996]: Failed password for root from 218.92.0.212 port 60121 ssh2
...
2020-02-08 04:21:21
200.89.178.209 attackspambots
wordpress hacker!!
2020-02-08 04:14:31
103.84.96.134 attackspambots
Port 22 Scan, PTR: None
2020-02-08 04:27:54
162.14.12.143 attack
ICMP MH Probe, Scan /Distributed -
2020-02-08 04:00:00
15.206.79.57 attackspam
SSH login attempts.
2020-02-08 04:29:44
103.84.96.150 attackspambots
Port 22 Scan, PTR: None
2020-02-08 04:26:08
139.189.199.7 attackbotsspam
GPON Home Routers Remote Code Execution Vulnerability CVE 2018-10562, PTR: PTR record not found
2020-02-08 03:49:19
197.63.179.107 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-08 04:09:54
112.198.75.153 attackbotsspam
Honeypot attack, port: 445, PTR: aua.athome.globe.com.ph.
2020-02-08 04:03:57
176.40.105.45 attackbotsspam
Unauthorized connection attempt from IP address 176.40.105.45 on Port 445(SMB)
2020-02-08 03:57:42
120.237.159.248 attack
Feb  7 19:59:06 silence02 sshd[28430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.159.248
Feb  7 19:59:08 silence02 sshd[28430]: Failed password for invalid user uv from 120.237.159.248 port 43666 ssh2
Feb  7 20:02:21 silence02 sshd[28730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.159.248
2020-02-08 03:50:53
162.14.12.152 attackbots
ICMP MH Probe, Scan /Distributed -
2020-02-08 03:55:46
197.43.30.78 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-08 04:12:45
163.23.83.75 attack
Microsoft SQL Server User Authentication Brute Force Attempt, PTR: PTR record not found
2020-02-08 03:53:24
1.20.147.23 attackbotsspam
Lines containing failures of 1.20.147.23 (max 1000)
Feb  7 14:41:38 HOSTNAME sshd[30749]: Did not receive identification string from 1.20.147.23 port 9891
Feb  7 14:41:42 HOSTNAME sshd[30750]: Invalid user user from 1.20.147.23 port 55761
Feb  7 14:41:43 HOSTNAME sshd[30750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.20.147.23
Feb  7 14:41:45 HOSTNAME sshd[30750]: Failed password for invalid user user from 1.20.147.23 port 55761 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1.20.147.23
2020-02-08 04:27:31

Recently Reported IPs

89.240.2.72 192.168.42.212 93.157.14.60 174.250.42.106
212.192.241.47 134.209.170.142 106.109.21.216 114.135.236.2
139.195.159.164 208.96.100.248 183.63.253.68 137.116.156.19
68.183.127.181 41.231.32.218 45.231.32.218 181.203.4.13
186.116.11.82 186.82.150.226 180.193.216.87 1.47.15.227