Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.16.214.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.16.214.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:41:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
21.214.16.41.in-addr.arpa domain name pointer vc-gp-n-41-16-214-21.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.214.16.41.in-addr.arpa	name = vc-gp-n-41-16-214-21.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.75.142.177 attackbotsspam
Sep 26 19:54:19 SilenceServices sshd[27192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.142.177
Sep 26 19:54:20 SilenceServices sshd[27192]: Failed password for invalid user umulus from 51.75.142.177 port 43338 ssh2
Sep 26 19:57:57 SilenceServices sshd[29427]: Failed password for root from 51.75.142.177 port 56450 ssh2
2019-09-27 02:08:56
198.108.67.59 attackspam
" "
2019-09-27 02:37:00
45.80.65.76 attackbots
Sep 26 19:48:16 core sshd[26196]: Invalid user test2 from 45.80.65.76 port 37438
Sep 26 19:48:18 core sshd[26196]: Failed password for invalid user test2 from 45.80.65.76 port 37438 ssh2
...
2019-09-27 02:02:17
42.104.97.228 attack
SSH Brute Force, server-1 sshd[27009]: Failed password for root from 42.104.97.228 port 28846 ssh2
2019-09-27 02:33:14
142.44.211.229 attack
SSH Brute Force, server-1 sshd[27112]: Failed password for invalid user wiki from 142.44.211.229 port 33684 ssh2
2019-09-27 02:26:08
222.186.180.20 attack
SSH brutforce
2019-09-27 02:22:00
125.129.92.96 attackspam
Sep 26 14:34:27 lnxded64 sshd[5845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.92.96
2019-09-27 02:36:37
112.85.42.232 attack
F2B jail: sshd. Time: 2019-09-26 19:59:38, Reported by: VKReport
2019-09-27 02:28:16
159.65.176.156 attack
SSH Brute Force, server-1 sshd[30282]: Failed password for invalid user test from 159.65.176.156 port 56735 ssh2
2019-09-27 02:25:21
62.234.141.187 attackspam
Sep 26 15:23:11 dedicated sshd[26241]: Invalid user nagios from 62.234.141.187 port 60648
2019-09-27 02:44:11
136.37.18.230 attackbotsspam
Sep 26 14:35:03 fr01 sshd[8173]: Invalid user baba from 136.37.18.230
...
2019-09-27 02:05:03
41.78.201.48 attackbotsspam
SSH Brute Force, server-1 sshd[30242]: Failed password for root from 41.78.201.48 port 54224 ssh2
2019-09-27 02:33:55
103.1.251.104 attack
" "
2019-09-27 02:20:12
23.129.64.167 attack
Sep 26 20:14:06 km20725 sshd\[24884\]: Invalid user abass from 23.129.64.167Sep 26 20:14:08 km20725 sshd\[24884\]: Failed password for invalid user abass from 23.129.64.167 port 59388 ssh2Sep 26 20:14:12 km20725 sshd\[24884\]: Failed password for invalid user abass from 23.129.64.167 port 59388 ssh2Sep 26 20:14:15 km20725 sshd\[24884\]: Failed password for invalid user abass from 23.129.64.167 port 59388 ssh2
...
2019-09-27 02:37:43
191.255.228.105 attackbots
Automatic report - Port Scan Attack
2019-09-27 02:05:34

Recently Reported IPs

92.101.137.70 32.112.184.33 131.79.211.40 89.177.135.128
61.240.26.82 211.160.179.61 34.175.151.94 187.187.222.208
69.157.20.165 206.180.111.223 36.232.130.249 245.235.203.45
69.109.48.11 163.218.178.182 85.49.211.91 47.69.166.168
119.180.188.217 78.233.46.183 247.157.93.223 237.224.248.220