Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.45.150.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.45.150.48.			IN	A

;; AUTHORITY SECTION:
.			131	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:28:16 CST 2022
;; MSG SIZE  rcvd: 105
Host info
48.150.45.41.in-addr.arpa domain name pointer host-41.45.150.48.tedata.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.150.45.41.in-addr.arpa	name = host-41.45.150.48.tedata.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.105.163.140 attack
port scan and connect, tcp 23 (telnet)
2020-01-11 08:24:58
139.99.40.27 attack
Jan 10 04:33:58 : SSH login attempts with invalid user
2020-01-11 08:04:56
80.82.64.127 attackspambots
01/10/2020-18:55:21.464127 80.82.64.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2020-01-11 08:08:03
14.225.3.47 attack
Tried to connect to Port 22 (12x)
2020-01-11 08:08:46
39.98.46.32 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-01-11 08:19:00
41.221.168.167 attackbots
Failed password for invalid user relational from 41.221.168.167 port 58743 ssh2
Invalid user fks from 41.221.168.167 port 46743
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167
Failed password for invalid user fks from 41.221.168.167 port 46743 ssh2
Invalid user Joanna from 41.221.168.167 port 34746
2020-01-11 08:25:24
198.98.52.141 attackspam
Jan 11 01:08:39 *host* sshd\[12289\]: Invalid user zabbix from 198.98.52.141 port 42950 ...
2020-01-11 08:15:41
200.37.200.157 attackbots
20/1/10@16:08:09: FAIL: Alarm-Network address from=200.37.200.157
20/1/10@16:08:09: FAIL: Alarm-Network address from=200.37.200.157
...
2020-01-11 08:31:15
218.92.0.191 attackspambots
Jan 11 01:20:31 dcd-gentoo sshd[21660]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 11 01:20:34 dcd-gentoo sshd[21660]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 11 01:20:31 dcd-gentoo sshd[21660]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 11 01:20:34 dcd-gentoo sshd[21660]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 11 01:20:31 dcd-gentoo sshd[21660]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 11 01:20:34 dcd-gentoo sshd[21660]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 11 01:20:34 dcd-gentoo sshd[21660]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 20485 ssh2
...
2020-01-11 08:23:31
104.248.122.143 attackspam
Invalid user joyce from 104.248.122.143 port 51380
2020-01-11 08:40:03
180.76.235.219 attackbots
SASL PLAIN auth failed: ruser=...
2020-01-11 08:41:20
71.62.129.30 attackbots
Jan 10 18:27:55 ny01 sshd[25345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.62.129.30
Jan 10 18:27:57 ny01 sshd[25345]: Failed password for invalid user www from 71.62.129.30 port 58236 ssh2
Jan 10 18:35:57 ny01 sshd[26288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.62.129.30
2020-01-11 08:02:05
77.247.110.73 attackbots
Brute force attack stopped by firewall
2020-01-11 08:04:26
185.156.73.42 attackspam
01/10/2020-18:24:07.791920 185.156.73.42 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-11 08:15:00
185.214.164.10 attackbotsspam
22 attempts against mh-misbehave-ban on web.noxion.com
2020-01-11 08:17:09

Recently Reported IPs

152.136.19.130 58.255.134.212 122.160.197.253 162.253.68.220
106.117.8.249 46.166.105.79 190.152.5.17 91.238.72.73
120.29.121.72 66.11.120.48 94.254.37.50 187.58.133.114
103.214.156.209 68.175.106.97 162.216.18.165 58.153.214.112
110.153.73.178 121.123.60.233 223.197.143.46 202.124.224.42