Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.150.80.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.150.80.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 20:13:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
11.80.150.41.in-addr.arpa domain name pointer 8ta-150-80-11.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.80.150.41.in-addr.arpa	name = 8ta-150-80-11.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
143.0.140.62 attack
SASL PLAIN auth failed: ruser=...
2019-08-13 11:33:17
177.130.139.236 attackspambots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:11:29
131.100.79.141 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:38:33
49.234.42.79 attackbots
Aug 13 05:58:31 vibhu-HP-Z238-Microtower-Workstation sshd\[12171\]: Invalid user oracle from 49.234.42.79
Aug 13 05:58:31 vibhu-HP-Z238-Microtower-Workstation sshd\[12171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.42.79
Aug 13 05:58:33 vibhu-HP-Z238-Microtower-Workstation sshd\[12171\]: Failed password for invalid user oracle from 49.234.42.79 port 48500 ssh2
Aug 13 06:02:39 vibhu-HP-Z238-Microtower-Workstation sshd\[12340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.42.79  user=root
Aug 13 06:02:42 vibhu-HP-Z238-Microtower-Workstation sshd\[12340\]: Failed password for root from 49.234.42.79 port 36954 ssh2
...
2019-08-13 11:41:53
131.100.76.221 attackbots
Aug 12 20:19:28 web1 postfix/smtpd[29377]: warning: 221-76-100-131.internetcentral.com.br[131.100.76.221]: SASL PLAIN authentication failed: authentication failure
...
2019-08-13 11:39:15
177.129.205.146 attackbots
failed_logins
2019-08-13 11:18:13
177.11.17.16 attackspambots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:28:02
177.130.137.33 attackbotsspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:13:02
177.154.237.253 attackspambots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:03:10
177.154.230.120 attackbots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:09:15
212.200.26.226 attackbots
5555/tcp 23/tcp...
[2019-07-14/08-12]4pkt,2pt.(tcp)
2019-08-13 11:47:38
207.107.67.67 attack
SSH Brute Force, server-1 sshd[7464]: Failed password for invalid user test from 207.107.67.67 port 55584 ssh2
2019-08-13 11:48:45
177.154.236.243 attackbotsspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:05:58
167.250.219.142 attackbots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:29:17
177.154.237.136 attackbots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:04:55

Recently Reported IPs

164.233.7.112 28.227.5.114 97.99.41.43 88.161.241.161
76.217.156.199 166.13.144.198 239.94.139.83 76.115.79.247
237.84.225.124 42.41.254.69 232.23.220.183 30.162.12.29
86.127.69.192 139.73.47.125 242.30.49.249 33.163.205.129
92.206.77.196 255.16.91.69 127.40.95.51 62.189.88.16