Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Vodacom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.2.249.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.2.249.124.			IN	A

;; AUTHORITY SECTION:
.			468	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010400 1800 900 604800 86400

;; Query time: 125 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 03:37:45 CST 2020
;; MSG SIZE  rcvd: 116
Host info
124.249.2.41.in-addr.arpa domain name pointer vc-cpt-41-2-249-124.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
124.249.2.41.in-addr.arpa	name = vc-cpt-41-2-249-124.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
191.6.68.142 attackspambots
Email rejected due to spam filtering
2020-02-02 19:31:18
14.236.41.176 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-02 18:54:14
223.100.82.155 attack
02/01/2020-23:51:14.351909 223.100.82.155 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-02 19:17:47
110.93.200.118 attackspam
Feb  2 00:56:18 hpm sshd\[29267\]: Invalid user admin from 110.93.200.118
Feb  2 00:56:18 hpm sshd\[29267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.93.200.118
Feb  2 00:56:20 hpm sshd\[29267\]: Failed password for invalid user admin from 110.93.200.118 port 29283 ssh2
Feb  2 00:59:46 hpm sshd\[29463\]: Invalid user test from 110.93.200.118
Feb  2 00:59:46 hpm sshd\[29463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.93.200.118
2020-02-02 19:09:01
116.108.28.144 attack
trying to access non-authorized port
2020-02-02 18:54:46
218.78.54.80 attack
Invalid user atmadhika from 218.78.54.80 port 45900
2020-02-02 19:01:29
222.186.15.166 attack
Unauthorized connection attempt detected from IP address 222.186.15.166 to port 22 [J]
2020-02-02 18:55:34
159.203.98.92 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 18:49:05
185.6.9.208 attackspam
Web App Attack
2020-02-02 19:04:56
175.126.73.16 attack
Unauthorized connection attempt detected from IP address 175.126.73.16 to port 2220 [J]
2020-02-02 18:59:59
103.66.96.254 attackspambots
Automatic report - SSH Brute-Force Attack
2020-02-02 19:12:48
66.119.108.44 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-02 19:02:08
157.245.149.110 attackspam
$f2bV_matches
2020-02-02 19:28:13
117.206.130.190 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 19:12:25
110.45.147.77 attackbots
Unauthorized connection attempt detected from IP address 110.45.147.77 to port 2220 [J]
2020-02-02 18:53:51

Recently Reported IPs

218.64.216.71 30.9.145.178 96.165.220.96 232.97.235.30
54.49.234.233 182.36.33.248 210.216.223.96 210.201.118.103
82.37.129.143 36.12.96.23 180.167.235.57 106.138.237.95
217.213.29.198 161.180.40.181 214.147.161.151 23.216.103.15
71.115.107.143 104.83.215.155 190.239.178.226 109.185.38.40