Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ghana

Internet Service Provider: Ghana Telecommunications Company Limited

Hostname: unknown

Organization: VODAFONE GHANA AS INTERNATIONAL TRANSIT

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attack
Scanning random ports - tries to find possible vulnerable services
2019-09-01 18:53:12
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.66.206.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41529
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.66.206.146.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 07 05:51:13 +08 2019
;; MSG SIZE  rcvd: 117

Host info
146.206.66.41.in-addr.arpa domain name pointer 41-66-206-146-dedicated.4u.com.gh.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
146.206.66.41.in-addr.arpa	name = 41-66-206-146-dedicated.4u.com.gh.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
91.57.17.252 attackspambots
Port Scan: TCP/5555
2019-08-05 10:11:03
64.90.72.66 attack
Port Scan: UDP/137
2019-08-05 10:17:13
91.219.166.75 attackspambots
Autoban   91.219.166.75 AUTH/CONNECT
2019-08-05 10:10:35
77.247.108.110 attackbots
Port Scan: TCP/85
2019-08-05 10:13:53
62.87.151.1 attackbotsspam
Port Scan: TCP/8080
2019-08-05 10:17:57
186.236.201.83 attack
Port Scan: TCP/5555
2019-08-05 09:58:56
65.158.243.42 attackspambots
Port Scan: UDP/137
2019-08-05 09:40:58
41.36.31.47 attack
Port Scan: TCP/23
2019-08-05 10:19:57
96.44.147.122 attackspam
Port Scan: TCP/80
2019-08-05 10:08:50
68.216.179.206 attack
Port Scan: TCP/445
2019-08-05 10:16:27
114.24.27.155 attackspambots
23/tcp
[2019-08-04]1pkt
2019-08-05 10:06:26
66.55.138.215 attackspambots
Port Scan: TCP/445
2019-08-05 09:40:27
205.232.183.194 attackbotsspam
Port Scan: UDP/137
2019-08-05 09:55:05
91.250.242.12 attack
Aug  5 02:32:20 lnxweb61 sshd[15355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.250.242.12
Aug  5 02:32:20 lnxweb61 sshd[15355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.250.242.12
Aug  5 02:32:23 lnxweb61 sshd[15355]: Failed password for invalid user admin from 91.250.242.12 port 42511 ssh2
2019-08-05 09:35:11
83.28.70.79 attack
Port Scan: TCP/60001
2019-08-05 10:12:22

Recently Reported IPs

58.242.82.6 218.92.0.137 113.255.21.140 218.4.196.178
187.172.11.141 58.87.120.53 187.35.153.143 96.22.1.5
185.229.243.206 186.67.23.122 106.13.15.185 186.90.183.170
37.145.176.147 179.43.174.180 116.111.72.180 191.255.54.107
176.60.80.5 121.33.248.234 51.15.187.51 223.80.49.208