Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.45.216.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.45.216.247.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 01:00:21 CST 2025
;; MSG SIZE  rcvd: 106
Host info
247.216.45.41.in-addr.arpa domain name pointer host-41.45.216.247.tedata.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
247.216.45.41.in-addr.arpa	name = host-41.45.216.247.tedata.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.201.154.215 attackspam
Brute force attack stopped by firewall
2019-06-27 09:32:23
85.163.67.150 attackspambots
Brute force attack stopped by firewall
2019-06-27 09:41:09
218.4.214.115 attack
Brute force attack to crack SMTP password (port 25 / 587)
2019-06-27 09:24:26
221.4.197.154 attackbots
Brute force attack stopped by firewall
2019-06-27 09:15:14
138.197.195.52 attack
Reported by AbuseIPDB proxy server.
2019-06-27 09:29:07
167.99.75.174 attackspambots
2019-06-26 UTC: 1x - root
2019-06-27 09:22:40
139.162.124.90 attackbotsspam
" "
2019-06-27 09:36:14
132.232.74.106 attackbotsspam
Jun 27 00:48:09 server sshd[29760]: Failed password for invalid user jzapata from 132.232.74.106 port 33836 ssh2
Jun 27 00:50:22 server sshd[30324]: Failed password for invalid user app from 132.232.74.106 port 54464 ssh2
Jun 27 00:52:08 server sshd[30784]: Failed password for invalid user steph from 132.232.74.106 port 43268 ssh2
2019-06-27 09:50:05
109.201.154.223 attackspam
Brute force attack stopped by firewall
2019-06-27 09:31:54
94.228.182.244 attackspambots
Jun 26 22:52:34 MK-Soft-VM5 sshd\[11198\]: Invalid user test2 from 94.228.182.244 port 52260
Jun 26 22:52:34 MK-Soft-VM5 sshd\[11198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.228.182.244
Jun 26 22:52:36 MK-Soft-VM5 sshd\[11198\]: Failed password for invalid user test2 from 94.228.182.244 port 52260 ssh2
...
2019-06-27 09:22:10
170.0.125.26 attackbots
Brute force attack stopped by firewall
2019-06-27 09:43:09
122.228.19.80 attackspam
27.06.2019 00:32:33 Connection to port 27016 blocked by firewall
2019-06-27 09:10:48
108.178.61.58 attack
Brute force attack stopped by firewall
2019-06-27 09:42:37
125.70.227.38 attackbotsspam
Jun 26 19:31:12 mailman dovecot: imap-login: Disconnected (auth failed, 1 attempts): user=, method=PLAIN, rip=125.70.227.38, lip=[munged], TLS: Disconnected
2019-06-27 09:25:12
222.87.139.44 attackbotsspam
Brute force attack to crack SMTP password (port 25 / 587)
2019-06-27 09:17:22

Recently Reported IPs

127.161.163.166 27.35.50.143 80.255.206.145 220.128.103.123
109.236.228.66 198.217.249.154 124.60.222.247 63.183.221.90
138.184.18.207 38.185.26.44 218.85.93.1 123.119.154.43
100.73.207.0 71.242.9.190 88.21.33.45 220.243.208.230
89.154.80.21 71.94.154.37 84.94.43.97 125.215.255.219