Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dar es Salaam

Region: Dar es Salaam

Country: Tanzania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
41.59.227.49 attackspam
Jul 19 07:50:52 plex-server sshd[3660830]: Invalid user status from 41.59.227.49 port 52714
Jul 19 07:50:52 plex-server sshd[3660830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.59.227.49 
Jul 19 07:50:52 plex-server sshd[3660830]: Invalid user status from 41.59.227.49 port 52714
Jul 19 07:50:54 plex-server sshd[3660830]: Failed password for invalid user status from 41.59.227.49 port 52714 ssh2
Jul 19 07:55:44 plex-server sshd[3662456]: Invalid user igor from 41.59.227.49 port 52715
...
2020-07-19 16:14:58
41.59.227.49 attackbotsspam
Invalid user roundcube from 41.59.227.49 port 8691
2020-07-17 05:33:18
41.59.227.49 attackbots
Jul 16 00:39:15 web1 sshd\[23837\]: Invalid user matrix from 41.59.227.49
Jul 16 00:39:15 web1 sshd\[23837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.59.227.49
Jul 16 00:39:17 web1 sshd\[23837\]: Failed password for invalid user matrix from 41.59.227.49 port 12213 ssh2
Jul 16 00:43:05 web1 sshd\[24023\]: Invalid user portal from 41.59.227.49
Jul 16 00:43:05 web1 sshd\[24023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.59.227.49
2020-07-16 07:33:51
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '41.59.0.0 - 41.59.255.255'

% No abuse contact registered for 41.59.0.0 - 41.59.255.255

inetnum:        41.59.0.0 - 41.59.255.255
netname:        TTCL-20100413
descr:          TANZANIA TELECOMMUNICATIONS CO. LTD
country:        TZ
org:            ORG-TTCL1-AFRINIC
admin-c:        NM71-AFRINIC
admin-c:        FM71-AFRINIC
admin-c:        OM44-AFRINIC
tech-c:         KM49-AFRINIC
tech-c:         NM71-AFRINIC
tech-c:         OM44-AFRINIC
status:         ALLOCATED PA
mnt-by:         AFRINIC-HM-MNT
mnt-lower:      TTCLDATA-MNT
mnt-routes:     TTCLDATA-MNT
source:         AFRINIC # Filtered
parent:         41.0.0.0 - 41.255.255.255

organisation:   ORG-TTCL1-AFRINIC
org-name:       TANZANIA TELECOMMUNICATIONS CO. LTD
org-type:       LIR
country:        TZ
address:        4th Floor,
address:        Extelecomms Building, Samora Avenue
address:        Dar Es Salaam PO Box 9070
phone:          tel:+255-738-261-212
phone:          tel:+255-739-202-255
phone:          tel:+255-22-214-2250
phone:          tel:+255-738-261-220
fax-no:         tel:+255-22213488
admin-c:        NM71-AFRINIC
admin-c:        OM44-AFRINIC
admin-c:        FM71-AFRINIC
tech-c:         NM71-AFRINIC
tech-c:         KM49-AFRINIC
tech-c:         OM44-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        TTCLDATA-MNT
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         Frank Maginga
address:        TTCL Corporation HQ,
address:        4th Floor,Extelecomms Building,
address:        Samora Avenue
address:        Dar Es Salaam PO Box 9070
address:        Tanzania
phone:          tel:+255-735-158-365
nic-hdl:        FM71-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-99UQIWDZ5QRYGZOJ4LPUQEEZSE19VDJ1-MNT

person:         Kajiru Mntambo
address:        4th Floor,Extelecomms Building,
address:        Samora Avenue
address:        Dar Es Salaam PO Box 9070
address:        Tanzania
phone:          tel:+255-738-261-220
nic-hdl:        KM49-AFRINIC
mnt-by:         GENERATED-7LII7XL0XENU0UL0TGN1YXPWNZUHMI5K-MNT
source:         AFRINIC # Filtered

person:         Nkonze Masuha
address:        IP Data Networks Operations
address:        Tanzania Telecommunications Corporation
address:        Telephone House, Zanaki/Kaluta Street
address:        P.O.Box 9070, Dar es Salaam
address:        Tanzania
phone:          tel:+255-22-214-2250
phone:          tel:+255-739-202-255
nic-hdl:        NM71-AFRINIC
mnt-by:         GENERATED-JOU1BVE4O0ZGNWHFAD0ZBWWUKSPKJFFZ-MNT
source:         AFRINIC # Filtered

person:         Oscar Masamu
address:        4th Floor,Extelecomms Building,
address:        Samora Avenue
address:        Dar Es Salaam PO Box 9070
address:        Tanzania
phone:          tel:+255-738-261-787
nic-hdl:        OM44-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-CYINSQ6CAX5ZF97TTVJGDQTWPV2N99AV-MNT

% Information related to '41.59.0.0/16AS33765'

route:          41.59.0.0/16
descr:          TTCL-IP BLOCK-1
origin:         AS33765
mnt-by:         TTCLDATA-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.59.227.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.59.227.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031001 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 11 02:44:29 CST 2026
;; MSG SIZE  rcvd: 105
Host info
69.227.59.41.in-addr.arpa domain name pointer 69.227-59-41.static-zone.ttcldata.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.227.59.41.in-addr.arpa	name = 69.227-59-41.static-zone.ttcldata.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.221.98.63 attackbots
failed_logins
2019-08-04 09:44:55
203.110.215.219 attack
Aug  4 01:43:16 yesfletchmain sshd\[24813\]: Invalid user union from 203.110.215.219 port 43160
Aug  4 01:43:16 yesfletchmain sshd\[24813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.215.219
Aug  4 01:43:19 yesfletchmain sshd\[24813\]: Failed password for invalid user union from 203.110.215.219 port 43160 ssh2
Aug  4 01:52:55 yesfletchmain sshd\[24977\]: Invalid user odoo from 203.110.215.219 port 37638
Aug  4 01:52:55 yesfletchmain sshd\[24977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.215.219
...
2019-08-04 09:41:10
65.51.216.95 attackbotsspam
Aug  1 07:15:23 josie sshd[9144]: Bad protocol version identification '' from 65.51.216.95
Aug  1 07:15:37 josie sshd[9224]: Invalid user pi from 65.51.216.95
Aug  1 07:15:37 josie sshd[9224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.51.216.95 
Aug  1 07:15:40 josie sshd[9224]: Failed password for invalid user pi from 65.51.216.95 port 43338 ssh2
Aug  1 07:15:40 josie sshd[9225]: Connection closed by 65.51.216.95
Aug  1 07:16:14 josie sshd[9453]: Invalid user openhabian from 65.51.216.95
Aug  1 07:16:14 josie sshd[9453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.51.216.95 
Aug  1 07:16:16 josie sshd[9453]: Failed password for invalid user openhabian from 65.51.216.95 port 47434 ssh2
Aug  1 07:16:16 josie sshd[9454]: Connection closed by 65.51.216.95
Aug  1 07:16:41 josie sshd[9745]: Invalid user netscreen from 65.51.216.95
Aug  1 07:16:41 josie sshd[9745]: pam_unix(sshd:au........
-------------------------------
2019-08-04 09:38:42
184.148.249.38 attackspam
Lines containing failures of 184.148.249.38
Aug  1 06:38:58 metroid sshd[20874]: Bad protocol version identification '' from 184.148.249.38 port 47768
Aug  1 06:38:58 metroid sshd[20875]: Invalid user openhabian from 184.148.249.38 port 47914
Aug  1 06:38:58 metroid sshd[20875]: Connection closed by invalid user openhabian 184.148.249.38 port 47914 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=184.148.249.38
2019-08-04 09:44:23
103.24.75.50 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:46:23,401 INFO [amun_request_handler] PortScan Detected on Port: 445 (103.24.75.50)
2019-08-04 09:27:23
167.114.227.94 attackbots
SS1,DEF GET /w00tw00t.at.ISC.SANS.DFind:)
2019-08-04 09:33:46
128.199.206.119 attackspam
Aug  4 03:31:03 minden010 sshd[23982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.206.119
Aug  4 03:31:05 minden010 sshd[23982]: Failed password for invalid user mcserver from 128.199.206.119 port 59332 ssh2
Aug  4 03:35:39 minden010 sshd[25565]: Failed password for root from 128.199.206.119 port 54332 ssh2
...
2019-08-04 09:41:34
191.53.254.90 attackbots
failed_logins
2019-08-04 09:55:59
211.25.231.52 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:40:55,023 INFO [amun_request_handler] PortScan Detected on Port: 445 (211.25.231.52)
2019-08-04 09:50:11
117.198.164.174 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:41:45,259 INFO [amun_request_handler] PortScan Detected on Port: 445 (117.198.164.174)
2019-08-04 09:47:17
81.218.138.213 attack
Aug  3 22:06:18 xtremcommunity sshd\[23413\]: Invalid user ubuntu from 81.218.138.213 port 46150
Aug  3 22:06:18 xtremcommunity sshd\[23413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.218.138.213
Aug  3 22:06:20 xtremcommunity sshd\[23413\]: Failed password for invalid user ubuntu from 81.218.138.213 port 46150 ssh2
Aug  3 22:10:54 xtremcommunity sshd\[23594\]: Invalid user zahid from 81.218.138.213 port 40120
Aug  3 22:10:54 xtremcommunity sshd\[23594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.218.138.213
...
2019-08-04 10:16:51
23.129.64.163 attackspam
2019-08-03T20:51:47.564187WS-Zach sshd[14870]: Invalid user eurek from 23.129.64.163 port 41495
2019-08-03T20:51:47.569738WS-Zach sshd[14870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.163
2019-08-03T20:51:47.564187WS-Zach sshd[14870]: Invalid user eurek from 23.129.64.163 port 41495
2019-08-03T20:51:49.468359WS-Zach sshd[14870]: Failed password for invalid user eurek from 23.129.64.163 port 41495 ssh2
2019-08-03T20:51:55.584402WS-Zach sshd[14978]: Invalid user netscreen from 23.129.64.163 port 58319
...
2019-08-04 10:13:06
147.135.161.142 attackspambots
Aug  4 02:48:58 v22018076622670303 sshd\[18681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.161.142  user=mysql
Aug  4 02:48:59 v22018076622670303 sshd\[18681\]: Failed password for mysql from 147.135.161.142 port 50222 ssh2
Aug  4 02:53:07 v22018076622670303 sshd\[18697\]: Invalid user smbuser from 147.135.161.142 port 45670
...
2019-08-04 09:34:43
104.244.74.97 attackspambots
20 attempts against mh-misbehave-ban on ice.magehost.pro
2019-08-04 09:26:14
177.69.26.97 attack
Aug  4 00:53:09 MK-Soft-VM3 sshd\[8281\]: Invalid user plano from 177.69.26.97 port 53086
Aug  4 00:53:09 MK-Soft-VM3 sshd\[8281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.26.97
Aug  4 00:53:12 MK-Soft-VM3 sshd\[8281\]: Failed password for invalid user plano from 177.69.26.97 port 53086 ssh2
...
2019-08-04 09:32:36

Recently Reported IPs

157.245.108.89 38.34.8.202 52.87.243.92 139.59.66.30
157.245.243.118 139.59.89.35 116.76.37.65 216.167.1.158
34.58.19.223 192.81.168.2 167.71.230.20 159.65.156.134
216.167.83.137 1.9.4.61 58.35.19.126 91.196.152.185
165.245.191.110 3.84.110.134 120.28.169.1 149.86.227.60