Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Vodacom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.2.149.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.2.149.53.			IN	A

;; AUTHORITY SECTION:
.			409	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121701 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 18 04:36:32 CST 2019
;; MSG SIZE  rcvd: 115
Host info
53.149.2.41.in-addr.arpa domain name pointer vc-cpt-41-2-149-53.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.149.2.41.in-addr.arpa	name = vc-cpt-41-2-149-53.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.228.136.212 attackspambots
1590897085 - 05/31/2020 05:51:25 Host: 49.228.136.212/49.228.136.212 Port: 445 TCP Blocked
2020-05-31 16:01:59
46.101.112.205 attack
46.101.112.205 - - [31/May/2020:05:30:59 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.112.205 - - [31/May/2020:05:50:54 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16470 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-05-31 16:21:00
51.91.125.179 attackbots
May 31 03:44:00 game-panel sshd[32343]: Failed password for root from 51.91.125.179 port 51764 ssh2
May 31 03:47:33 game-panel sshd[32519]: Failed password for root from 51.91.125.179 port 56934 ssh2
2020-05-31 16:13:02
87.246.7.70 attack
May 31 09:58:26 srv01 postfix/smtpd\[11217\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 31 09:58:36 srv01 postfix/smtpd\[22314\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 31 09:58:38 srv01 postfix/smtpd\[25420\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 31 09:58:39 srv01 postfix/smtpd\[11217\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 31 09:59:12 srv01 postfix/smtpd\[11217\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-31 16:01:08
106.13.106.27 attackbotsspam
Bruteforce detected by fail2ban
2020-05-31 16:22:38
162.243.136.194 attackspam
Port Scan detected!
...
2020-05-31 16:11:38
20.188.32.46 attackspam
Wordpress malicious attack:[octablocked]
2020-05-31 16:08:07
122.51.204.45 attackspambots
May 31 12:31:17 gw1 sshd[18190]: Failed password for root from 122.51.204.45 port 7434 ssh2
...
2020-05-31 15:55:20
186.122.148.9 attack
Invalid user mky from 186.122.148.9 port 35234
2020-05-31 16:25:43
185.91.142.202 attackbotsspam
Invalid user omn from 185.91.142.202 port 37039
2020-05-31 16:09:46
181.30.8.146 attack
May 31 10:20:40 journals sshd\[107167\]: Invalid user wss from 181.30.8.146
May 31 10:20:40 journals sshd\[107167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.8.146
May 31 10:20:42 journals sshd\[107167\]: Failed password for invalid user wss from 181.30.8.146 port 57232 ssh2
May 31 10:25:42 journals sshd\[108461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.8.146  user=root
May 31 10:25:44 journals sshd\[108461\]: Failed password for root from 181.30.8.146 port 45980 ssh2
...
2020-05-31 16:02:43
103.145.12.121 attackspambots
05/30/2020-23:51:07.530167 103.145.12.121 Protocol: 17 ET VOIP Modified Sipvicious Asterisk PBX User-Agent
2020-05-31 16:10:55
61.93.201.198 attackbotsspam
Invalid user julien from 61.93.201.198 port 33194
2020-05-31 16:03:36
222.186.180.130 attackspambots
May 31 10:09:47 mellenthin sshd[24949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
May 31 10:09:49 mellenthin sshd[24949]: Failed password for invalid user root from 222.186.180.130 port 37922 ssh2
2020-05-31 16:17:52
185.143.74.49 attack
2020-05-31T02:15:22.512071linuxbox-skyline auth[43121]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=ha rhost=185.143.74.49
...
2020-05-31 16:18:04

Recently Reported IPs

222.200.246.155 123.245.57.34 63.105.139.188 40.92.253.39
176.46.85.82 5.249.154.206 78.154.122.77 71.112.98.121
191.122.76.96 95.40.208.176 90.199.110.12 159.138.157.193
137.142.101.222 196.187.159.34 37.178.242.111 119.170.33.9
67.116.88.30 94.178.108.193 18.178.120.58 179.217.41.77