Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.16.6.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.16.6.138.			IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063000 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 30 20:57:37 CST 2022
;; MSG SIZE  rcvd: 104
Host info
b'138.6.16.41.in-addr.arpa domain name pointer vc-gp-n-41-16-6-138.umts.vodacom.co.za.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.6.16.41.in-addr.arpa	name = vc-gp-n-41-16-6-138.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
76.181.42.12 attack
Dec 11 11:54:11 vpn01 sshd[23260]: Failed password for root from 76.181.42.12 port 59996 ssh2
...
2019-12-11 20:17:53
202.169.169.62 attackspambots
Dec 11 06:54:46 hcbbdb sshd\[24205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dicos-ui-cryoem.grid.sinica.edu.tw  user=root
Dec 11 06:54:47 hcbbdb sshd\[24205\]: Failed password for root from 202.169.169.62 port 42982 ssh2
Dec 11 07:02:33 hcbbdb sshd\[25115\]: Invalid user ansible from 202.169.169.62
Dec 11 07:02:33 hcbbdb sshd\[25115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dicos-ui-cryoem.grid.sinica.edu.tw
Dec 11 07:02:35 hcbbdb sshd\[25115\]: Failed password for invalid user ansible from 202.169.169.62 port 51472 ssh2
2019-12-11 20:04:42
36.90.214.56 attack
Unauthorized connection attempt detected from IP address 36.90.214.56 to port 445
2019-12-11 19:56:17
121.224.61.75 attackbotsspam
FTP brute-force attack
2019-12-11 20:32:15
192.227.144.220 attackspam
192.227.144.220 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 5, 8, 25
2019-12-11 20:00:38
103.44.96.146 attackspambots
Unauthorized connection attempt detected from IP address 103.44.96.146 to port 445
2019-12-11 19:54:56
106.12.13.247 attackbotsspam
Dec 11 04:53:14 ny01 sshd[9819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
Dec 11 04:53:16 ny01 sshd[9819]: Failed password for invalid user http from 106.12.13.247 port 47258 ssh2
Dec 11 04:59:35 ny01 sshd[10918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
2019-12-11 20:15:12
171.213.12.251 attackbotsspam
2019-12-10 UTC: 2x - phion(2x)
2019-12-11 20:35:09
45.253.64.83 attack
firewall-block, port(s): 3388/tcp
2019-12-11 20:30:14
50.127.71.5 attackbotsspam
SSH Brute Force
2019-12-11 20:19:36
218.92.0.145 attackbotsspam
Dec 11 09:14:07 firewall sshd[29448]: Failed password for root from 218.92.0.145 port 51211 ssh2
Dec 11 09:14:20 firewall sshd[29448]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 51211 ssh2 [preauth]
Dec 11 09:14:20 firewall sshd[29448]: Disconnecting: Too many authentication failures [preauth]
...
2019-12-11 20:15:38
1.4.198.252 attackbotsspam
Honeypot attack, port: 445, PTR: node-e0s.pool-1-4.dynamic.totinternet.net.
2019-12-11 20:16:13
139.59.41.154 attack
Dec 11 12:39:43 mail sshd\[19828\]: Invalid user batham from 139.59.41.154
Dec 11 12:39:43 mail sshd\[19828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154
Dec 11 12:39:45 mail sshd\[19828\]: Failed password for invalid user batham from 139.59.41.154 port 60660 ssh2
...
2019-12-11 20:20:13
198.245.63.94 attack
SSH bruteforce (Triggered fail2ban)
2019-12-11 20:23:45
159.192.139.106 attackbotsspam
SSH invalid-user multiple login attempts
2019-12-11 20:08:09

Recently Reported IPs

9.83.58.124 98.3.84.115 7.81.20.148 110.6.43.37
88.131.7.12 63.50.2.111 94.102.59.144 179.117.92.235
188.212.34.36 180.76.12.180 180.76.12.151 137.226.156.185
180.76.12.135 180.76.12.128 180.76.13.145 80.82.65.134
180.76.90.160 137.226.248.14 177.53.152.138 80.82.66.78