Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: Swift

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.221.160.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.221.160.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 11:25:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 221.160.221.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.160.221.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
154.68.39.6 attackbots
fail2ban
2020-03-29 09:08:32
81.182.187.218 attackbotsspam
58115/udp
[2020-03-28]1pkt
2020-03-29 08:51:03
122.15.82.87 attack
bruteforce detected
2020-03-29 08:49:34
89.244.179.80 attack
fail2ban/Mar 28 21:27:00 h1962932 sshd[3432]: Invalid user shino from 89.244.179.80 port 48956
Mar 28 21:27:00 h1962932 sshd[3432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=i59f4b350.versanet.de
Mar 28 21:27:00 h1962932 sshd[3432]: Invalid user shino from 89.244.179.80 port 48956
Mar 28 21:27:02 h1962932 sshd[3432]: Failed password for invalid user shino from 89.244.179.80 port 48956 ssh2
Mar 28 21:34:40 h1962932 sshd[3676]: Invalid user qrx from 89.244.179.80 port 46794
2020-03-29 08:42:47
114.228.155.59 attackspambots
Automatic report - Port Scan Attack
2020-03-29 09:01:13
103.107.17.134 attack
Invalid user karen from 103.107.17.134 port 43182
2020-03-29 09:01:43
220.248.30.58 attack
Mar 29 01:29:48 eventyay sshd[25980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.30.58
Mar 29 01:29:50 eventyay sshd[25980]: Failed password for invalid user dcc from 220.248.30.58 port 62666 ssh2
Mar 29 01:33:38 eventyay sshd[26090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.30.58
...
2020-03-29 08:56:01
157.230.163.6 attackbots
(sshd) Failed SSH login from 157.230.163.6 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 29 00:28:31 amsweb01 sshd[23817]: Invalid user vqh from 157.230.163.6 port 51584
Mar 29 00:28:33 amsweb01 sshd[23817]: Failed password for invalid user vqh from 157.230.163.6 port 51584 ssh2
Mar 29 00:44:13 amsweb01 sshd[25389]: Invalid user fcb from 157.230.163.6 port 50898
Mar 29 00:44:15 amsweb01 sshd[25389]: Failed password for invalid user fcb from 157.230.163.6 port 50898 ssh2
Mar 29 00:49:12 amsweb01 sshd[26056]: Invalid user sci from 157.230.163.6 port 39852
2020-03-29 08:24:35
220.132.75.140 attackbots
Mar 28 23:51:10 vlre-nyc-1 sshd\[14285\]: Invalid user pia from 220.132.75.140
Mar 28 23:51:10 vlre-nyc-1 sshd\[14285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.75.140
Mar 28 23:51:12 vlre-nyc-1 sshd\[14285\]: Failed password for invalid user pia from 220.132.75.140 port 57082 ssh2
Mar 28 23:59:45 vlre-nyc-1 sshd\[14518\]: Invalid user wqe from 220.132.75.140
Mar 28 23:59:45 vlre-nyc-1 sshd\[14518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.75.140
...
2020-03-29 08:47:49
104.236.155.139 attackspam
4022/tcp
[2020-03-28]1pkt
2020-03-29 08:40:24
218.92.0.200 attackspam
Mar 29 01:22:35 silence02 sshd[23952]: Failed password for root from 218.92.0.200 port 57363 ssh2
Mar 29 01:22:37 silence02 sshd[23952]: Failed password for root from 218.92.0.200 port 57363 ssh2
Mar 29 01:22:39 silence02 sshd[23952]: Failed password for root from 218.92.0.200 port 57363 ssh2
2020-03-29 08:37:32
182.208.248.211 attackbots
Invalid user ooz from 182.208.248.211 port 55262
2020-03-29 08:32:01
179.83.5.96 attackspambots
Mar 29 09:17:00 ns01 sshd[27512]: Invalid user lovey from 179.83.5.96
Mar 29 09:17:00 ns01 sshd[27512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.83.5.96 
Mar 29 09:17:03 ns01 sshd[27512]: Failed password for invalid user lovey from 179.83.5.96 port 27527 ssh2
Mar 29 09:30:17 ns01 sshd[28047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.83.5.96  user=mail
Mar 29 09:30:19 ns01 sshd[28047]: Failed password for mail from 179.83.5.96 port 37628 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.83.5.96
2020-03-29 09:02:29
178.254.55.25 attack
$f2bV_matches
2020-03-29 08:39:58
106.12.156.236 attack
Automatic report BANNED IP
2020-03-29 09:05:50

Recently Reported IPs

120.87.137.239 34.247.32.118 34.216.143.181 153.251.197.161
95.63.151.224 167.4.119.17 222.150.7.151 189.197.205.237
212.14.137.228 6.93.188.114 38.187.79.234 24.139.144.2
167.28.40.246 212.131.18.2 21.123.92.180 189.40.237.48
57.21.133.102 219.152.150.5 59.217.202.165 199.112.133.246