Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kinshasa

Region: Kinshasa

Country: Democratic Republic of the Congo

Internet Service Provider: Orange RDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.243.40.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.243.40.13.			IN	A

;; AUTHORITY SECTION:
.			138	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122301 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 24 06:31:44 CST 2022
;; MSG SIZE  rcvd: 105
Host info
13.40.243.41.in-addr.arpa domain name pointer 13-40-243-41.r.airtel.cd.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.40.243.41.in-addr.arpa	name = 13-40-243-41.r.airtel.cd.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.231.70.154 attack
Invalid user oracle from 195.231.70.154 port 47852
2020-02-12 15:03:18
164.132.145.22 attackspambots
Brute force VPN server
2020-02-12 15:05:01
185.176.27.254 attackbots
02/12/2020-02:34:40.457620 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-12 15:36:47
185.209.0.143 attackspambots
ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 10000 proto: TCP cat: Attempted Information Leak
2020-02-12 15:24:47
198.108.67.53 attack
firewall-block, port(s): 8851/tcp
2020-02-12 15:26:40
14.162.30.29 attack
Automatic report - Port Scan Attack
2020-02-12 15:01:43
64.225.24.239 attack
Fail2Ban - SSH Bruteforce Attempt
2020-02-12 14:25:59
185.209.0.90 attackspambots
firewall-block, port(s): 3922/tcp, 3932/tcp
2020-02-12 15:09:16
77.42.120.135 attackbotsspam
Automatic report - Port Scan Attack
2020-02-12 15:39:18
171.103.49.122 attackspambots
Feb 12 05:55:44 mail sshd[7654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.103.49.122
Feb 12 05:55:46 mail sshd[7654]: Failed password for invalid user ubnt from 171.103.49.122 port 65108 ssh2
...
2020-02-12 15:40:12
159.65.146.141 attack
Feb 12 05:55:50 sso sshd[23602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.146.141
Feb 12 05:55:52 sso sshd[23602]: Failed password for invalid user media from 159.65.146.141 port 60532 ssh2
...
2020-02-12 15:34:39
139.198.191.86 attackbots
Feb 11 21:09:17 web1 sshd\[23331\]: Invalid user leng123 from 139.198.191.86
Feb 11 21:09:17 web1 sshd\[23331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.86
Feb 11 21:09:19 web1 sshd\[23331\]: Failed password for invalid user leng123 from 139.198.191.86 port 34861 ssh2
Feb 11 21:12:36 web1 sshd\[23632\]: Invalid user bronte from 139.198.191.86
Feb 11 21:12:36 web1 sshd\[23632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.86
2020-02-12 15:23:45
180.247.39.227 attackbotsspam
1581483372 - 02/12/2020 05:56:12 Host: 180.247.39.227/180.247.39.227 Port: 445 TCP Blocked
2020-02-12 15:16:55
177.125.183.21 spam
Used since many times by the same "Ribeiro" for SPAM, PHISHING and SCAM on STOLLEN list we don't know where without our agreement, as usual with LIERS and ROBERS !
2020-02-12 15:25:33
118.100.117.178 attack
DATE:2020-02-12 05:54:50, IP:118.100.117.178, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-12 15:13:10

Recently Reported IPs

51.49.59.223 252.200.249.224 218.110.84.174 196.128.252.215
187.161.116.40 115.223.224.23 65.67.187.45 133.90.24.36
121.245.155.130 62.87.12.15 223.134.56.195 144.251.235.157
170.67.233.82 107.173.39.9 30.95.60.80 125.54.60.37
89.181.250.150 86.124.101.27 56.30.204.106 181.13.177.211