Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.216.193.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.216.193.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 149 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 07:44:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
8.193.216.41.in-addr.arpa domain name pointer karoo.neology.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.193.216.41.in-addr.arpa	name = karoo.neology.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.134.140.242 attack
Nov 11 12:13:56 v22018086721571380 sshd[4977]: Failed password for invalid user cargill from 91.134.140.242 port 58776 ssh2
Nov 11 12:17:44 v22018086721571380 sshd[5138]: Failed password for invalid user lokman from 91.134.140.242 port 38990 ssh2
2019-11-11 20:22:04
218.39.45.93 attack
Nov 11 07:08:48 h2421860 postfix/postscreen[20838]: CONNECT from [218.39.45.93]:11236 to [85.214.119.52]:25
Nov 11 07:08:48 h2421860 postfix/dnsblog[20841]: addr 218.39.45.93 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 11 07:08:48 h2421860 postfix/dnsblog[20842]: addr 218.39.45.93 listed by domain bl.spamcop.net as 127.0.0.2
Nov 11 07:08:48 h2421860 postfix/dnsblog[20842]: addr 218.39.45.93 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 11 07:08:48 h2421860 postfix/dnsblog[20842]: addr 218.39.45.93 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 11 07:08:48 h2421860 postfix/dnsblog[20842]: addr 218.39.45.93 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 11 07:08:48 h2421860 postfix/dnsblog[20844]: addr 218.39.45.93 listed by domain bl.mailspike.net as 127.0.0.10
Nov 11 07:08:48 h2421860 postfix/dnsblog[20846]: addr 218.39.45.93 listed by domain dnsbl.sorbs.net as 127.0.0.6
Nov 11 07:08:48 h2421860 postfix/dnsblog[20846]: addr 218.39.45.93 listed by........
-------------------------------
2019-11-11 19:51:15
157.230.128.195 attackbots
157.230.128.195 was recorded 5 times by 5 hosts attempting to connect to the following ports: 10513. Incident counter (4h, 24h, all-time): 5, 27, 143
2019-11-11 20:06:33
120.244.110.242 attackspambots
Port 1433 Scan
2019-11-11 20:01:06
101.89.112.10 attack
Nov 11 01:38:40 auw2 sshd\[16408\]: Invalid user wolverin from 101.89.112.10
Nov 11 01:38:40 auw2 sshd\[16408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.112.10
Nov 11 01:38:43 auw2 sshd\[16408\]: Failed password for invalid user wolverin from 101.89.112.10 port 36756 ssh2
Nov 11 01:43:34 auw2 sshd\[16880\]: Invalid user demosthenes from 101.89.112.10
Nov 11 01:43:34 auw2 sshd\[16880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.112.10
2019-11-11 20:17:01
111.230.249.77 attackspam
Nov 11 13:17:23 itv-usvr-01 sshd[11845]: Invalid user jodine from 111.230.249.77
Nov 11 13:17:23 itv-usvr-01 sshd[11845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.249.77
Nov 11 13:17:23 itv-usvr-01 sshd[11845]: Invalid user jodine from 111.230.249.77
Nov 11 13:17:26 itv-usvr-01 sshd[11845]: Failed password for invalid user jodine from 111.230.249.77 port 47812 ssh2
Nov 11 13:22:05 itv-usvr-01 sshd[12018]: Invalid user hung from 111.230.249.77
2019-11-11 20:09:01
222.232.29.235 attackspambots
Nov 11 08:01:04 ks10 sshd[6891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.232.29.235  user=backup
Nov 11 08:01:07 ks10 sshd[6891]: Failed password for invalid user backup from 222.232.29.235 port 51418 ssh2
...
2019-11-11 19:55:56
151.243.29.200 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/151.243.29.200/ 
 
 AU - 1H : (21)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN31549 
 
 IP : 151.243.29.200 
 
 CIDR : 151.243.0.0/18 
 
 PREFIX COUNT : 228 
 
 UNIQUE IP COUNT : 1213952 
 
 
 ATTACKS DETECTED ASN31549 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-11-11 07:22:09 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-11 20:04:05
45.136.108.67 attackspambots
Connection by 45.136.108.67 on port: 5969 got caught by honeypot at 11/11/2019 11:21:38 AM
2019-11-11 20:27:22
203.109.82.104 attack
Automatic report - Port Scan Attack
2019-11-11 19:56:22
145.239.95.83 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.95.83
Failed password for invalid user stanley from 145.239.95.83 port 34736 ssh2
Invalid user home from 145.239.95.83 port 44270
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.95.83
Failed password for invalid user home from 145.239.95.83 port 44270 ssh2
2019-11-11 20:16:01
148.70.33.136 attackspambots
Nov 11 07:22:06 ns37 sshd[16974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.33.136
2019-11-11 20:07:24
94.45.149.101 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/94.45.149.101/ 
 
 UA - 1H : (35)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN29491 
 
 IP : 94.45.149.101 
 
 CIDR : 94.45.148.0/23 
 
 PREFIX COUNT : 16 
 
 UNIQUE IP COUNT : 10240 
 
 
 ATTACKS DETECTED ASN29491 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-11 07:22:18 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-11 19:57:10
42.104.97.228 attackspam
Nov 10 02:13:01 mail sshd[392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.228  user=root
Nov 10 02:13:04 mail sshd[392]: Failed password for root from 42.104.97.228 port 58479 ssh2
Nov 10 02:34:56 mail sshd[1476]: Invalid user com from 42.104.97.228
...
2019-11-11 19:53:34
140.143.249.234 attackspambots
Nov 11 14:01:31 vibhu-HP-Z238-Microtower-Workstation sshd\[781\]: Invalid user dovecot from 140.143.249.234
Nov 11 14:01:31 vibhu-HP-Z238-Microtower-Workstation sshd\[781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.234
Nov 11 14:01:33 vibhu-HP-Z238-Microtower-Workstation sshd\[781\]: Failed password for invalid user dovecot from 140.143.249.234 port 47048 ssh2
Nov 11 14:05:31 vibhu-HP-Z238-Microtower-Workstation sshd\[1164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.234  user=root
Nov 11 14:05:33 vibhu-HP-Z238-Microtower-Workstation sshd\[1164\]: Failed password for root from 140.143.249.234 port 50816 ssh2
...
2019-11-11 20:21:44

Recently Reported IPs

242.83.247.144 155.47.176.205 210.112.119.73 212.76.211.119
9.91.165.236 23.233.201.164 71.213.190.117 245.27.53.71
230.110.155.176 236.241.144.45 173.44.31.195 210.104.168.222
16.229.88.7 49.106.145.197 197.56.154.217 170.73.246.208
195.178.210.0 227.30.2.177 237.6.108.60 153.64.177.180