Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.246.20.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.246.20.67.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 13:44:41 CST 2025
;; MSG SIZE  rcvd: 105
Host info
67.20.246.41.in-addr.arpa domain name pointer 8ta-246-20-67.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
67.20.246.41.in-addr.arpa	name = 8ta-246-20-67.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.84.96.139 attack
Port 22 Scan, PTR: None
2020-02-08 04:17:30
113.22.186.168 attackbots
Unauthorized connection attempt from IP address 113.22.186.168 on Port 445(SMB)
2020-02-08 03:56:39
178.134.232.39 attackspam
Feb  7 09:28:53 hostnameproxy sshd[27925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.134.232.39  user=r.r
Feb  7 09:28:55 hostnameproxy sshd[27925]: Failed password for r.r from 178.134.232.39 port 51539 ssh2
Feb  7 09:29:01 hostnameproxy sshd[27930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.134.232.39  user=r.r
Feb  7 09:29:03 hostnameproxy sshd[27930]: Failed password for r.r from 178.134.232.39 port 53323 ssh2
Feb  7 09:29:12 hostnameproxy sshd[27946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.134.232.39  user=r.r
Feb  7 09:29:14 hostnameproxy sshd[27946]: Failed password for r.r from 178.134.232.39 port 55751 ssh2
Feb  7 09:29:28 hostnameproxy sshd[27955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.134.232.39  user=r.r
Feb  7 09:29:30 hostnameproxy sshd[27955]: Failed pa........
------------------------------
2020-02-08 03:59:05
162.14.12.143 attack
ICMP MH Probe, Scan /Distributed -
2020-02-08 04:00:00
194.27.125.32 attackbots
Unauthorized connection attempt from IP address 194.27.125.32 on Port 445(SMB)
2020-02-08 04:16:35
195.54.166.9 attackspambots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-08 04:01:59
37.194.225.222 attackspam
imap-login: Disconnected \(auth failed, 1 attempts in 5
2020-02-08 03:48:44
162.14.10.227 attackspam
ICMP MH Probe, Scan /Distributed -
2020-02-08 04:18:54
195.239.237.190 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-08 04:16:23
94.25.229.100 attack
Unauthorized connection attempt from IP address 94.25.229.100 on Port 445(SMB)
2020-02-08 03:55:04
187.188.166.28 attack
Unauthorized connection attempt from IP address 187.188.166.28 on Port 445(SMB)
2020-02-08 04:13:56
119.29.170.120 attackspam
Automatic report - Banned IP Access
2020-02-08 03:46:28
162.14.10.94 attack
ICMP MH Probe, Scan /Distributed -
2020-02-08 04:14:15
106.51.85.154 attackspambots
Unauthorized connection attempt from IP address 106.51.85.154 on Port 445(SMB)
2020-02-08 04:23:03
201.190.176.19 attackbotsspam
Feb  7 19:44:22 163-172-32-151 sshd[6986]: Invalid user ftpuser from 201.190.176.19 port 40572
...
2020-02-08 03:51:24

Recently Reported IPs

204.84.162.204 8.74.41.92 47.91.250.205 75.76.66.154
223.83.135.62 85.7.1.90 233.131.80.66 140.59.160.83
52.139.109.78 16.148.181.52 28.169.128.160 202.83.42.116
16.74.23.191 85.164.86.221 222.118.167.89 245.250.245.4
2.106.219.217 74.165.223.97 147.111.249.79 59.84.97.101