Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.31.204.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.31.204.197.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 20:03:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
197.204.31.41.in-addr.arpa domain name pointer vc-gp-s-41-31-204-197.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.204.31.41.in-addr.arpa	name = vc-gp-s-41-31-204-197.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
151.20.85.226 attackspambots
Unauthorized connection attempt detected from IP address 151.20.85.226 to port 85
2020-01-14 21:59:36
106.13.98.148 attackspam
Jan 14 15:20:14 vps691689 sshd[28649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.148
Jan 14 15:20:16 vps691689 sshd[28649]: Failed password for invalid user lester from 106.13.98.148 port 59220 ssh2
Jan 14 15:22:49 vps691689 sshd[28724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.148
...
2020-01-14 22:43:02
188.93.64.46 attackbots
1579007068 - 01/14/2020 14:04:28 Host: 188.93.64.46/188.93.64.46 Port: 445 TCP Blocked
2020-01-14 22:01:58
109.244.1.6 attackbots
ICMP MH Probe, Scan /Distributed -
2020-01-14 22:44:52
167.114.226.137 attackspambots
Unauthorized connection attempt detected from IP address 167.114.226.137 to port 2220 [J]
2020-01-14 22:29:19
176.232.181.179 attackbots
Unauthorized connection attempt detected from IP address 176.232.181.179 to port 23 [J]
2020-01-14 22:28:56
51.68.200.151 attackspambots
Port scan on 2 port(s): 139 445
2020-01-14 22:05:13
110.53.234.105 attackbots
ICMP MH Probe, Scan /Distributed -
2020-01-14 22:38:45
64.225.74.145 attack
Jan 14 14:26:18 pi sshd[22432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.74.145 
Jan 14 14:26:20 pi sshd[22432]: Failed password for invalid user butter from 64.225.74.145 port 58618 ssh2
2020-01-14 22:37:10
77.42.73.40 attack
Automatic report - Port Scan Attack
2020-01-14 22:30:06
175.111.182.26 attackspam
invalid login attempt (user)
2020-01-14 22:31:23
112.85.42.180 attackbots
Jan 14 14:53:06 server sshd[22457]: Failed none for root from 112.85.42.180 port 41098 ssh2
Jan 14 14:53:08 server sshd[22457]: Failed password for root from 112.85.42.180 port 41098 ssh2
Jan 14 14:53:13 server sshd[22457]: Failed password for root from 112.85.42.180 port 41098 ssh2
2020-01-14 22:00:09
205.185.113.140 attackspambots
2020-01-14T13:52:07.462473shield sshd\[16715\]: Invalid user daniel from 205.185.113.140 port 60206
2020-01-14T13:52:07.468932shield sshd\[16715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140
2020-01-14T13:52:08.680158shield sshd\[16715\]: Failed password for invalid user daniel from 205.185.113.140 port 60206 ssh2
2020-01-14T13:53:56.137717shield sshd\[17059\]: Invalid user ubuntu from 205.185.113.140 port 48374
2020-01-14T13:53:56.144365shield sshd\[17059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140
2020-01-14 22:12:38
82.51.203.10 attackspam
port scan and connect, tcp 8080 (http-proxy)
2020-01-14 22:28:10
182.245.138.38 attack
port scan and connect, tcp 8888 (sun-answerbook)
2020-01-14 22:17:02

Recently Reported IPs

114.71.17.48 210.89.217.91 205.64.191.75 208.149.73.216
7.181.219.172 14.33.70.32 133.204.168.178 72.200.146.109
41.14.97.217 95.215.201.141 129.53.150.86 37.18.203.213
199.228.119.201 117.122.161.251 250.183.132.136 132.145.123.64
165.132.85.89 87.148.207.231 76.126.217.181 73.246.162.220