Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bothaville

Region: Orange Free State

Country: South Africa

Internet Service Provider: Liquid Telecommunications South Africa (Pty) Ltd

Hostname: unknown

Organization: Neotel Pty Ltd

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Sep 27 23:05:54 MK-Soft-Root1 sshd[8151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.162.162.34 
Sep 27 23:05:56 MK-Soft-Root1 sshd[8151]: Failed password for invalid user admin from 41.162.162.34 port 44356 ssh2
...
2019-09-28 09:30:53
attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-07-13 07:46:41
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.162.162.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30926
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.162.162.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 12 14:50:26 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 34.162.162.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 34.162.162.41.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
46.19.139.34 attack
1 attempts against mh-modsecurity-ban on pluto
2020-05-27 21:30:21
51.38.235.100 attack
May 27 13:56:03 h2829583 sshd[11975]: Failed password for root from 51.38.235.100 port 58102 ssh2
2020-05-27 21:28:55
106.54.65.228 attack
May 27 13:55:56  sshd\[29036\]: User root from 106.54.65.228 not allowed because not listed in AllowUsersMay 27 13:55:58  sshd\[29036\]: Failed password for invalid user root from 106.54.65.228 port 46758 ssh2
...
2020-05-27 21:31:14
87.251.74.121 attack
[H1.VM2] Blocked by UFW
2020-05-27 21:15:36
165.227.108.128 attack
(sshd) Failed SSH login from 165.227.108.128 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 27 14:13:55 amsweb01 sshd[29480]: Invalid user ssh from 165.227.108.128 port 51882
May 27 14:13:58 amsweb01 sshd[29480]: Failed password for invalid user ssh from 165.227.108.128 port 51882 ssh2
May 27 14:33:55 amsweb01 sshd[2273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.108.128  user=root
May 27 14:33:57 amsweb01 sshd[2273]: Failed password for root from 165.227.108.128 port 41782 ssh2
May 27 14:38:31 amsweb01 sshd[3498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.108.128  user=root
2020-05-27 21:15:24
223.233.106.73 attackbots
Repeated attempts against wp-login
2020-05-27 21:36:05
35.196.211.250 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-27 21:19:51
222.186.30.167 attack
Unauthorized connection attempt detected from IP address 222.186.30.167 to port 22
2020-05-27 21:40:34
129.204.15.121 attack
May 27 14:27:04 haigwepa sshd[5793]: Failed password for root from 129.204.15.121 port 52360 ssh2
...
2020-05-27 21:51:25
93.40.11.165 attackspambots
Unauthorized connection attempt detected from IP address 93.40.11.165 to port 80
2020-05-27 21:30:01
111.40.217.92 attackbots
(sshd) Failed SSH login from 111.40.217.92 (CN/China/-): 5 in the last 3600 secs
2020-05-27 21:25:00
160.153.154.28 attack
Automatic report - XMLRPC Attack
2020-05-27 21:43:25
144.217.243.216 attack
Invalid user matilda from 144.217.243.216 port 53998
2020-05-27 21:54:40
128.199.177.224 attack
Invalid user hammer from 128.199.177.224 port 47172
2020-05-27 21:26:57
190.145.254.138 attack
May 27 02:08:01 web9 sshd\[29104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.254.138  user=root
May 27 02:08:03 web9 sshd\[29104\]: Failed password for root from 190.145.254.138 port 62913 ssh2
May 27 02:11:01 web9 sshd\[29582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.254.138  user=root
May 27 02:11:02 web9 sshd\[29582\]: Failed password for root from 190.145.254.138 port 52173 ssh2
May 27 02:14:02 web9 sshd\[30082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.254.138  user=root
2020-05-27 21:18:33

Recently Reported IPs

50.244.150.38 196.52.43.122 139.199.133.111 83.219.143.254
212.156.98.210 198.108.66.128 183.88.215.75 177.69.21.162
103.111.52.57 124.217.227.90 176.121.14.179 112.253.8.106
85.175.97.57 84.241.34.129 213.168.63.50 223.31.165.65
77.204.213.180 162.243.139.8 119.145.171.199 50.63.13.254