Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pretoria

Region: Gauteng

Country: South Africa

Internet Service Provider: Vodacom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.18.124.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.18.124.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 17:05:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
106.124.18.41.in-addr.arpa domain name pointer vc-gp-n-41-18-124-106.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.124.18.41.in-addr.arpa	name = vc-gp-n-41-18-124-106.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.6.160.3 attackspambots
2019-09-12T11:57:14.114048enmeeting.mahidol.ac.th sshd\[6170\]: Invalid user admin from 117.6.160.3 port 55850
2019-09-12T11:57:14.133133enmeeting.mahidol.ac.th sshd\[6170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.6.160.3
2019-09-12T11:57:15.854955enmeeting.mahidol.ac.th sshd\[6170\]: Failed password for invalid user admin from 117.6.160.3 port 55850 ssh2
...
2019-09-12 20:26:03
112.160.43.64 attackbots
Sep 11 21:21:12 home sshd[7263]: Invalid user bots from 112.160.43.64 port 53286
Sep 11 21:21:12 home sshd[7263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.160.43.64
Sep 11 21:21:12 home sshd[7263]: Invalid user bots from 112.160.43.64 port 53286
Sep 11 21:21:13 home sshd[7263]: Failed password for invalid user bots from 112.160.43.64 port 53286 ssh2
Sep 11 21:30:09 home sshd[7282]: Invalid user server from 112.160.43.64 port 51548
Sep 11 21:30:09 home sshd[7282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.160.43.64
Sep 11 21:30:09 home sshd[7282]: Invalid user server from 112.160.43.64 port 51548
Sep 11 21:30:12 home sshd[7282]: Failed password for invalid user server from 112.160.43.64 port 51548 ssh2
Sep 11 21:36:41 home sshd[7292]: Invalid user oracle from 112.160.43.64 port 57288
Sep 11 21:36:41 home sshd[7292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.160.
2019-09-12 20:37:31
61.84.240.87 attack
firewall-block, port(s): 23/tcp
2019-09-12 20:29:16
185.123.193.53 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 02:17:28,755 INFO [amun_request_handler] PortScan Detected on Port: 445 (185.123.193.53)
2019-09-12 20:48:54
120.132.106.195 attack
2019-09-12T10:55:43.476359abusebot-6.cloudsearch.cf sshd\[20638\]: Invalid user abc@123 from 120.132.106.195 port 42056
2019-09-12 20:35:58
202.112.237.228 attackspam
Sep 12 06:02:04 legacy sshd[6088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.112.237.228
Sep 12 06:02:05 legacy sshd[6088]: Failed password for invalid user user from 202.112.237.228 port 34888 ssh2
Sep 12 06:06:22 legacy sshd[6146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.112.237.228
...
2019-09-12 20:31:36
77.247.109.29 attackspambots
6550/udp 6548/udp 6549/udp...
[2019-07-23/09-12]245pkt,99pt.(udp)
2019-09-12 20:28:18
189.91.5.7 attackbotsspam
$f2bV_matches
2019-09-12 20:59:51
82.146.58.219 attackspambots
Lines containing failures of 82.146.58.219
Sep 12 09:46:27 srv02 sshd[16488]: Invalid user deploy from 82.146.58.219 port 60642
Sep 12 09:46:27 srv02 sshd[16488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.146.58.219
Sep 12 09:46:29 srv02 sshd[16488]: Failed password for invalid user deploy from 82.146.58.219 port 60642 ssh2
Sep 12 09:46:29 srv02 sshd[16488]: Received disconnect from 82.146.58.219 port 60642:11: Bye Bye [preauth]
Sep 12 09:46:29 srv02 sshd[16488]: Disconnected from invalid user deploy 82.146.58.219 port 60642 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.146.58.219
2019-09-12 20:12:43
54.222.219.87 attack
Sep 12 12:40:34 server sshd\[8279\]: Invalid user webadmin from 54.222.219.87 port 38720
Sep 12 12:40:34 server sshd\[8279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.222.219.87
Sep 12 12:40:36 server sshd\[8279\]: Failed password for invalid user webadmin from 54.222.219.87 port 38720 ssh2
Sep 12 12:43:32 server sshd\[22297\]: Invalid user gpadmin from 54.222.219.87 port 36928
Sep 12 12:43:32 server sshd\[22297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.222.219.87
2019-09-12 20:13:23
64.52.22.45 attackspam
Sep 12 14:32:01 core sshd[2901]: Invalid user duser from 64.52.22.45 port 55434
Sep 12 14:32:03 core sshd[2901]: Failed password for invalid user duser from 64.52.22.45 port 55434 ssh2
...
2019-09-12 20:55:45
173.208.152.250 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(09120936)
2019-09-12 20:07:52
178.62.189.46 attackbotsspam
Invalid user tom from 178.62.189.46 port 46526
2019-09-12 20:17:36
86.98.152.136 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 02:16:43,686 INFO [amun_request_handler] PortScan Detected on Port: 445 (86.98.152.136)
2019-09-12 21:07:26
77.247.110.130 attackbotsspam
\[2019-09-12 08:34:40\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T08:34:40.515-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01550101148672520012",SessionID="0x7fd9a8936608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.130/55293",ACLName="no_extension_match"
\[2019-09-12 08:34:44\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T08:34:44.639-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="50501048778878010",SessionID="0x7fd9a8841048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.130/49817",ACLName="no_extension_match"
\[2019-09-12 08:34:58\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T08:34:58.966-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="6048297661004",SessionID="0x7fd9a8237fb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.130/60491",ACLName
2019-09-12 20:55:19

Recently Reported IPs

49.175.97.85 49.95.224.85 25.149.250.6 214.150.91.202
29.78.137.111 197.228.44.3 19.127.31.140 19.179.66.103
17.29.53.76 152.46.13.58 157.212.209.95 137.229.252.116
135.160.115.51 166.184.242.157 130.249.197.41 126.236.205.226
114.102.202.163 172.138.51.172 150.73.47.75 1.230.218.227