Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cape Town

Region: Western Cape

Country: South Africa

Internet Service Provider: Vodacom

Hostname: unknown

Organization: VODACOM

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.6.85.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17529
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.6.85.89.			IN	A

;; AUTHORITY SECTION:
.			2688	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051502 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 23:28:57 CST 2019
;; MSG SIZE  rcvd: 114

Host info
89.85.6.41.in-addr.arpa domain name pointer vc-41-6-85-89.umts.vodacom.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
89.85.6.41.in-addr.arpa	name = vc-41-6-85-89.umts.vodacom.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
123.161.72.3 attack
1592827249 - 06/22/2020 14:00:49 Host: 123.161.72.3/123.161.72.3 Port: 445 TCP Blocked
2020-06-23 04:11:50
106.12.5.48 attackbots
2020-06-22T22:14:21.114756+02:00  sshd[4863]: Failed password for invalid user ter from 106.12.5.48 port 47138 ssh2
2020-06-23 04:21:25
213.74.151.130 attack
Honeypot attack, port: 445, PTR: mail.alturoto.com.
2020-06-23 03:49:53
46.201.25.30 attackspam
Honeypot attack, port: 445, PTR: 30-25-201-46.pool.ukrtel.net.
2020-06-23 03:56:09
41.228.22.107 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-23 04:09:55
176.235.179.202 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-23 03:57:36
183.89.72.227 attack
Unauthorized connection attempt from IP address 183.89.72.227 on Port 445(SMB)
2020-06-23 04:01:21
52.172.156.159 attackspam
Jun 22 19:48:36 game-panel sshd[25587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.156.159
Jun 22 19:48:38 game-panel sshd[25587]: Failed password for invalid user pdx from 52.172.156.159 port 33280 ssh2
Jun 22 19:52:41 game-panel sshd[25792]: Failed password for root from 52.172.156.159 port 45564 ssh2
2020-06-23 04:09:05
218.92.0.184 attack
Jun 22 22:04:42 santamaria sshd\[14163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Jun 22 22:04:43 santamaria sshd\[14163\]: Failed password for root from 218.92.0.184 port 20500 ssh2
Jun 22 22:04:47 santamaria sshd\[14163\]: Failed password for root from 218.92.0.184 port 20500 ssh2
...
2020-06-23 04:10:21
197.1.88.133 attackspambots
Email rejected due to spam filtering
2020-06-23 04:18:43
112.200.109.56 attackspam
1592827264 - 06/22/2020 14:01:04 Host: 112.200.109.56/112.200.109.56 Port: 445 TCP Blocked
2020-06-23 03:52:09
141.98.80.204 attackbots
06/22/2020-14:38:50.931997 141.98.80.204 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-23 04:05:34
40.117.211.5 attack
Unauthorized connection attempt detected from IP address 40.117.211.5 to port 3389
2020-06-23 03:53:38
51.79.44.52 attack
Triggered by Fail2Ban at Ares web server
2020-06-23 04:00:27
88.101.168.214 attackspam
Email rejected due to spam filtering
2020-06-23 03:58:30

Recently Reported IPs

170.251.223.76 44.107.225.138 31.31.110.50 94.229.197.240
82.182.205.68 83.248.238.123 94.237.222.19 119.56.25.229
52.8.105.190 180.123.182.180 187.59.151.150 194.26.75.239
64.37.62.228 174.131.199.231 99.92.178.158 108.41.43.250
108.213.242.102 129.117.198.236 147.66.164.144 2.238.196.24