Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.4.197.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.4.197.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:21:57 CST 2025
;; MSG SIZE  rcvd: 105
Host info
241.197.4.41.in-addr.arpa domain name pointer vc-cpt-41-4-197-241.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.197.4.41.in-addr.arpa	name = vc-cpt-41-4-197-241.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
137.74.109.206 attackbots
firewall-block, port(s): 5060/udp
2020-05-01 07:11:11
203.146.102.2 attackbotsspam
445/tcp 445/tcp 445/tcp
[2020-04-14/30]3pkt
2020-05-01 07:04:57
117.193.79.162 attackspam
2020-04-30T22:31:22.132968ns386461 sshd\[29955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=int1.tvstyres.com  user=root
2020-04-30T22:31:23.645132ns386461 sshd\[29955\]: Failed password for root from 117.193.79.162 port 1810 ssh2
2020-04-30T22:53:27.899100ns386461 sshd\[17931\]: Invalid user postgres from 117.193.79.162 port 1340
2020-04-30T22:53:27.905271ns386461 sshd\[17931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=int1.tvstyres.com
2020-04-30T22:53:29.652770ns386461 sshd\[17931\]: Failed password for invalid user postgres from 117.193.79.162 port 1340 ssh2
...
2020-05-01 06:48:13
207.166.130.229 attackbots
5060/udp 5060/udp 5060/udp...
[2020-03-10/04-30]13pkt,1pt.(udp)
2020-05-01 07:02:56
13.81.200.14 attackbots
Invalid user redmon from 13.81.200.14 port 42406
2020-05-01 07:01:00
206.189.155.195 attackbots
Invalid user am from 206.189.155.195 port 33750
2020-05-01 07:04:28
83.97.190.53 attackbotsspam
Honeypot attack, port: 5555, PTR: cm-83-97-190-53.telecable.es.
2020-05-01 07:03:34
202.107.188.197 attack
Brute-Force
2020-05-01 07:21:59
124.76.237.124 attackspam
37215/tcp 23/tcp...
[2020-04-13/30]14pkt,2pt.(tcp)
2020-05-01 06:44:47
106.54.200.209 attackbots
Invalid user fujimoto from 106.54.200.209 port 52320
2020-05-01 07:22:41
46.25.31.59 attackspam
23/tcp 23/tcp 23/tcp...
[2020-03-23/04-30]4pkt,1pt.(tcp)
2020-05-01 06:53:42
96.64.7.59 attack
Apr 30 15:51:44 pixelmemory sshd[9683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.64.7.59
Apr 30 15:51:46 pixelmemory sshd[9683]: Failed password for invalid user oracle from 96.64.7.59 port 41972 ssh2
Apr 30 16:05:24 pixelmemory sshd[12374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.64.7.59
...
2020-05-01 07:09:05
193.32.68.17 attackbotsspam
3389/tcp 3389/tcp 3389/tcp
[2020-03-14/04-30]3pkt
2020-05-01 07:15:16
139.162.116.22 attackspam
firewall-block, port(s): 1755/tcp
2020-05-01 06:55:12
219.144.68.15 attackbotsspam
Invalid user voip from 219.144.68.15 port 58728
2020-05-01 07:19:59

Recently Reported IPs

179.128.58.150 47.8.22.49 221.219.74.135 146.68.238.115
133.6.236.3 85.148.113.93 21.23.86.228 131.9.149.203
19.148.148.34 204.218.149.208 17.90.197.65 99.75.46.53
179.46.190.104 25.86.43.21 201.39.177.99 65.186.78.186
228.155.164.9 224.19.187.244 220.255.75.216 141.36.88.116