Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dakar

Region: Dakar

Country: Senegal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.214.80.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.214.80.131.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010301 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 04 12:21:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 131.80.214.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.80.214.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.51.106.76 attack
Icarus honeypot on github
2020-02-20 15:23:50
51.91.19.92 attackbots
xmlrpc attack
2020-02-20 15:44:11
67.198.232.59 attack
Icarus honeypot on github
2020-02-20 15:31:10
49.146.41.62 attack
20/2/19@23:54:28: FAIL: Alarm-Network address from=49.146.41.62
20/2/19@23:54:28: FAIL: Alarm-Network address from=49.146.41.62
...
2020-02-20 15:46:51
139.170.150.252 attackspambots
Feb 19 20:29:19 sachi sshd\[7113\]: Invalid user ubuntu from 139.170.150.252
Feb 19 20:29:19 sachi sshd\[7113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.252
Feb 19 20:29:20 sachi sshd\[7113\]: Failed password for invalid user ubuntu from 139.170.150.252 port 52169 ssh2
Feb 19 20:36:22 sachi sshd\[7713\]: Invalid user user from 139.170.150.252
Feb 19 20:36:23 sachi sshd\[7713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.252
2020-02-20 15:38:50
220.129.17.150 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-20 15:30:25
113.190.174.251 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-02-20 15:33:39
115.178.96.74 attackbots
Honeypot attack, port: 445, PTR: 115.178.96.74.kota.kappa.net.in.
2020-02-20 15:40:42
93.126.176.132 attackspam
Feb 20 05:55:03 debian-2gb-nbg1-2 kernel: \[4433714.691469\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.126.176.132 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=30959 PROTO=TCP SPT=17048 DPT=5555 WINDOW=61399 RES=0x00 SYN URGP=0
2020-02-20 15:11:31
106.12.182.142 attack
Feb 20 01:51:48 firewall sshd[20375]: Invalid user user from 106.12.182.142
Feb 20 01:51:49 firewall sshd[20375]: Failed password for invalid user user from 106.12.182.142 port 35216 ssh2
Feb 20 01:54:59 firewall sshd[20520]: Invalid user fzs from 106.12.182.142
...
2020-02-20 15:17:55
220.133.158.104 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-20 15:15:49
121.178.212.67 attack
Feb 20 05:25:25 XXXXXX sshd[61859]: Invalid user admin from 121.178.212.67 port 44372
2020-02-20 15:36:38
35.234.62.4 attackspam
Invalid user teamspeak from 35.234.62.4 port 12346
2020-02-20 15:31:29
92.118.37.99 attack
Feb 20 07:44:31 debian-2gb-nbg1-2 kernel: \[4440283.039736\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.99 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=422 PROTO=TCP SPT=52101 DPT=1802 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-20 15:27:55
117.161.92.2 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-02-20 15:45:02

Recently Reported IPs

180.63.228.104 147.134.51.190 217.138.194.76 236.71.246.121
139.126.145.13 106.170.99.13 132.21.157.186 145.239.2.100
39.24.115.83 118.152.144.201 74.151.194.97 79.190.102.119
58.217.202.35 158.63.53.240 103.67.19.15 21.97.16.248
161.78.29.56 24.187.227.213 5.198.8.137 140.24.169.127