Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.30.119.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.30.119.39.			IN	A

;; AUTHORITY SECTION:
.			28	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 01 18:01:56 CST 2022
;; MSG SIZE  rcvd: 105
Host info
b'39.119.30.41.in-addr.arpa domain name pointer vc-gp-s-41-30-119-39.umts.vodacom.co.za.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.119.30.41.in-addr.arpa	name = vc-gp-s-41-30-119-39.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.156.252.94 attack
RDP Brute-Force (honeypot 12)
2020-09-23 02:59:33
180.249.165.6 attack
Sep 21 16:21:50 XXXXXX sshd[12434]: Invalid user postgres from 180.249.165.6 port 2256
2020-09-23 02:52:33
185.234.217.123 attackbots
RDP Bruteforce
2020-09-23 02:58:32
49.206.53.213 attack
Unauthorized connection attempt from IP address 49.206.53.213 on Port 445(SMB)
2020-09-23 02:43:30
51.81.83.139 attackspam
Time:     Mon Sep 21 13:53:49 2020 -0300
IP:       51.81.83.139 (US/United States/vps-71d3f2c3.vps.ovh.us)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-09-23 03:02:38
104.140.188.58 attackbots
 TCP (SYN) 104.140.188.58:50906 -> port 21, len 44
2020-09-23 02:43:03
106.12.8.149 attackspam
Sep 22 17:58:29 rotator sshd\[1230\]: Invalid user test from 106.12.8.149Sep 22 17:58:31 rotator sshd\[1230\]: Failed password for invalid user test from 106.12.8.149 port 34162 ssh2Sep 22 18:03:02 rotator sshd\[2050\]: Invalid user robot from 106.12.8.149Sep 22 18:03:03 rotator sshd\[2050\]: Failed password for invalid user robot from 106.12.8.149 port 57146 ssh2Sep 22 18:07:42 rotator sshd\[2843\]: Invalid user sap from 106.12.8.149Sep 22 18:07:44 rotator sshd\[2843\]: Failed password for invalid user sap from 106.12.8.149 port 51878 ssh2
...
2020-09-23 03:12:35
167.71.159.195 attackspam
TCP port : 3679
2020-09-23 02:55:54
61.62.4.28 attackspam
Email rejected due to spam filtering
2020-09-23 02:39:29
154.8.144.203 attackspambots
SSH Bruteforce Attempt on Honeypot
2020-09-23 03:06:37
174.138.27.165 attackspam
Failed password for invalid user anna from 174.138.27.165 port 48504 ssh2
2020-09-23 02:55:31
115.42.127.133 attackspambots
Sep 22 18:58:27 rancher-0 sshd[217963]: Invalid user admin from 115.42.127.133 port 40960
...
2020-09-23 02:45:55
81.68.118.120 attackspam
Sep 22 18:46:55 IngegnereFirenze sshd[17208]: Failed password for invalid user esadmin from 81.68.118.120 port 42416 ssh2
...
2020-09-23 02:54:49
185.202.1.122 attackspam
RDP Bruteforce
2020-09-23 02:58:46
192.241.214.180 attackspambots
 TCP (SYN) 192.241.214.180:48380 -> port 465, len 40
2020-09-23 03:07:49

Recently Reported IPs

28.67.39.224 236.248.32.199 62.15.21.33 246.44.96.83
186.174.88.82 170.10.111.168 147.169.164.0 8.155.44.133
253.20.58.178 196.191.53.232 246.151.199.207 200.218.233.224
169.20.189.111 120.48.87.242 141.107.2.170 50.23.74.51
122.171.182.245 205.215.244.38 161.90.227.89 60.119.166.191