Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Durban

Region: KwaZulu-Natal

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
41.162.10.156 attackspam
Invalid user admin2 from 41.162.10.156 port 49303
2020-05-29 02:24:07
41.162.125.226 attackspambots
T: f2b postfix aggressive 3x
2020-05-25 00:09:43
41.162.125.226 attack
spam
2020-04-06 13:58:29
41.162.125.226 attackspam
spam
2020-02-29 18:09:52
41.162.103.178 attackspambots
IP: 41.162.103.178
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS36937 Neotel Pty Ltd
   South Africa (ZA)
   CIDR 41.160.0.0/13
Log Date: 21/02/2020 8:43:31 PM UTC
2020-02-22 07:21:50
41.162.107.130 attackspam
email spam
2020-01-22 18:35:46
41.162.125.226 attack
spam
2020-01-22 16:00:41
41.162.186.124 attack
Unauthorized connection attempt from IP address 41.162.186.124 on Port 445(SMB)
2019-12-27 08:08:46
41.162.104.98 attackspam
1576990531 - 12/22/2019 05:55:31 Host: 41.162.104.98/41.162.104.98 Port: 445 TCP Blocked
2019-12-22 13:11:20
41.162.125.226 attackspambots
Absender hat Spam-Falle ausgel?st
2019-12-17 16:12:59
41.162.105.34 attack
Absender hat Spam-Falle ausgel?st
2019-11-27 22:49:37
41.162.162.34 attack
Sep 27 23:05:54 MK-Soft-Root1 sshd[8151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.162.162.34 
Sep 27 23:05:56 MK-Soft-Root1 sshd[8151]: Failed password for invalid user admin from 41.162.162.34 port 44356 ssh2
...
2019-09-28 09:30:53
41.162.104.98 attackbots
Unauthorized connection attempt from IP address 41.162.104.98 on Port 445(SMB)
2019-09-24 03:25:40
41.162.107.130 attack
postfix (unknown user, SPF fail or relay access denied)
2019-09-21 17:56:31
41.162.188.251 attackspambots
" "
2019-09-02 02:16:45
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.162.1.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.162.1.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010500 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 13:43:24 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 6.1.162.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.1.162.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.14.102 attackspam
Invalid user kds from 178.128.14.102 port 60106
2020-09-03 07:11:05
186.206.193.139 attack
Attempted connection to port 445.
2020-09-03 07:19:18
98.113.35.10 attack
Unauthorized connection attempt from IP address 98.113.35.10 on Port 445(SMB)
2020-09-03 07:07:30
198.98.49.181 attackbotsspam
SSH Login Bruteforce
2020-09-03 07:29:52
201.208.238.50 attack
Attempted connection to port 445.
2020-09-03 07:14:32
86.213.63.181 attackbotsspam
SSH invalid-user multiple login attempts
2020-09-03 07:26:11
165.227.201.226 attackbotsspam
Sep  2 20:07:20 ncomp sshd[30739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.201.226  user=root
Sep  2 20:07:22 ncomp sshd[30739]: Failed password for root from 165.227.201.226 port 52866 ssh2
Sep  2 20:12:34 ncomp sshd[32144]: Invalid user user2 from 165.227.201.226 port 33706
Sep  2 20:12:34 ncomp sshd[32144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.201.226
Sep  2 20:12:34 ncomp sshd[32144]: Invalid user user2 from 165.227.201.226 port 33706
Sep  2 20:12:35 ncomp sshd[32144]: Failed password for invalid user user2 from 165.227.201.226 port 33706 ssh2
2020-09-03 06:59:29
182.61.161.121 attackbotsspam
Sep  3 00:50:02 vps1 sshd[24899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.161.121  user=root
Sep  3 00:50:04 vps1 sshd[24899]: Failed password for invalid user root from 182.61.161.121 port 10890 ssh2
Sep  3 00:52:40 vps1 sshd[24913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.161.121 
Sep  3 00:52:42 vps1 sshd[24913]: Failed password for invalid user user1 from 182.61.161.121 port 53600 ssh2
Sep  3 00:55:22 vps1 sshd[24943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.161.121 
Sep  3 00:55:24 vps1 sshd[24943]: Failed password for invalid user ftpusr from 182.61.161.121 port 41549 ssh2
...
2020-09-03 07:04:45
222.186.173.201 attack
Sep  2 18:56:33 NPSTNNYC01T sshd[4438]: Failed password for root from 222.186.173.201 port 57614 ssh2
Sep  2 18:56:46 NPSTNNYC01T sshd[4438]: error: maximum authentication attempts exceeded for root from 222.186.173.201 port 57614 ssh2 [preauth]
Sep  2 18:56:52 NPSTNNYC01T sshd[4489]: Failed password for root from 222.186.173.201 port 40822 ssh2
...
2020-09-03 07:02:45
217.182.68.93 attackbotsspam
(sshd) Failed SSH login from 217.182.68.93 (FR/France/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  2 13:37:22 cvps sshd[21532]: Invalid user testmail from 217.182.68.93
Sep  2 13:37:24 cvps sshd[21532]: Failed password for invalid user testmail from 217.182.68.93 port 42694 ssh2
Sep  2 13:44:59 cvps sshd[24008]: Invalid user wenbo from 217.182.68.93
Sep  2 13:45:02 cvps sshd[24008]: Failed password for invalid user wenbo from 217.182.68.93 port 60226 ssh2
Sep  2 13:48:49 cvps sshd[25359]: Failed password for root from 217.182.68.93 port 36942 ssh2
2020-09-03 07:18:10
175.6.6.147 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-03 07:25:47
177.46.133.121 attack
Unauthorized connection attempt from IP address 177.46.133.121 on Port 445(SMB)
2020-09-03 07:09:30
200.72.147.186 attackspambots
Unauthorized connection attempt from IP address 200.72.147.186 on Port 445(SMB)
2020-09-03 07:01:01
196.179.232.130 attack
Unauthorized connection attempt from IP address 196.179.232.130 on Port 445(SMB)
2020-09-03 07:25:28
85.237.61.85 attack
Unauthorized connection attempt from IP address 85.237.61.85 on Port 445(SMB)
2020-09-03 07:07:08

Recently Reported IPs

38.78.185.127 149.187.230.147 168.121.125.234 91.234.182.189
4.236.135.104 45.56.200.114 171.237.210.245 230.211.12.64
250.15.218.109 39.162.138.3 200.118.184.151 241.199.14.145
135.199.153.223 60.69.202.6 61.54.237.214 164.123.112.57
224.11.176.218 166.223.77.19 115.18.95.84 108.167.51.98