Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.67.142.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60641
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.67.142.26.			IN	A

;; AUTHORITY SECTION:
.			213	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:42:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
26.142.67.41.in-addr.arpa domain name pointer netcomafrica.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
26.142.67.41.in-addr.arpa	name = netcomafrica.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.167.87.198 attack
SSH Invalid Login
2020-06-14 05:48:57
112.85.42.88 attack
invalid login attempt (root)
2020-06-14 05:51:17
223.171.32.55 attackspambots
Jun 13 23:04:10 buvik sshd[6142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55
Jun 13 23:04:13 buvik sshd[6142]: Failed password for invalid user shupin from 223.171.32.55 port 46700 ssh2
Jun 13 23:09:10 buvik sshd[6876]: Invalid user salva from 223.171.32.55
...
2020-06-14 05:41:31
222.186.175.23 attackspam
Jun 13 23:29:09 dbanaszewski sshd[13634]: Unable to negotiate with 222.186.175.23 port 31957: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Jun 13 23:45:10 dbanaszewski sshd[13807]: Unable to negotiate with 222.186.175.23 port 10965: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
2020-06-14 05:46:41
83.24.243.9 attackbots
Jun 13 23:02:34 vps sshd[897388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.243.9.ipv4.supernova.orange.pl
Jun 13 23:02:36 vps sshd[897388]: Failed password for invalid user monitor from 83.24.243.9 port 50834 ssh2
Jun 13 23:08:52 vps sshd[925027]: Invalid user teste from 83.24.243.9 port 52110
Jun 13 23:08:52 vps sshd[925027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.243.9.ipv4.supernova.orange.pl
Jun 13 23:08:54 vps sshd[925027]: Failed password for invalid user teste from 83.24.243.9 port 52110 ssh2
...
2020-06-14 05:53:45
139.162.122.110 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-06-14 05:28:00
118.187.8.34 attack
2020-06-13T21:10:54.535812shield sshd\[22015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.8.34  user=root
2020-06-13T21:10:56.485673shield sshd\[22015\]: Failed password for root from 118.187.8.34 port 40372 ssh2
2020-06-13T21:15:08.145663shield sshd\[23805\]: Invalid user testuser from 118.187.8.34 port 48752
2020-06-13T21:15:08.150816shield sshd\[23805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.8.34
2020-06-13T21:15:09.968651shield sshd\[23805\]: Failed password for invalid user testuser from 118.187.8.34 port 48752 ssh2
2020-06-14 05:24:02
185.39.11.47 attack
Fail2Ban Ban Triggered
2020-06-14 05:28:59
179.107.7.49 attackspambots
Automatic report - Banned IP Access
2020-06-14 05:19:27
139.170.150.251 attackbotsspam
Jun 13 22:05:31 gestao sshd[23545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.251 
Jun 13 22:05:33 gestao sshd[23545]: Failed password for invalid user cosmika from 139.170.150.251 port 45143 ssh2
Jun 13 22:09:18 gestao sshd[23725]: Failed password for root from 139.170.150.251 port 25968 ssh2
...
2020-06-14 05:38:18
123.31.45.35 attackspam
2020-06-13T23:18[Censored Hostname] sshd[521382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.45.35
2020-06-13T23:18[Censored Hostname] sshd[521382]: Invalid user gearman from 123.31.45.35 port 41994
2020-06-13T23:18[Censored Hostname] sshd[521382]: Failed password for invalid user gearman from 123.31.45.35 port 41994 ssh2[...]
2020-06-14 05:48:28
157.230.100.192 attack
Jun 13 21:06:00 onepixel sshd[841128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.100.192 
Jun 13 21:06:00 onepixel sshd[841128]: Invalid user alanoly from 157.230.100.192 port 48554
Jun 13 21:06:02 onepixel sshd[841128]: Failed password for invalid user alanoly from 157.230.100.192 port 48554 ssh2
Jun 13 21:09:07 onepixel sshd[841746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.100.192  user=root
Jun 13 21:09:10 onepixel sshd[841746]: Failed password for root from 157.230.100.192 port 49344 ssh2
2020-06-14 05:41:50
41.72.219.102 attackspam
Jun 13 23:09:33 jane sshd[32454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.219.102 
Jun 13 23:09:35 jane sshd[32454]: Failed password for invalid user lbitcku from 41.72.219.102 port 36088 ssh2
...
2020-06-14 05:25:56
185.86.13.213 attackbotsspam
Automatic report - Banned IP Access
2020-06-14 05:47:07
138.197.175.236 attack
2020-06-13T21:09:26.179437server.espacesoutien.com sshd[23487]: Invalid user nt from 138.197.175.236 port 40278
2020-06-13T21:09:26.190837server.espacesoutien.com sshd[23487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.236
2020-06-13T21:09:26.179437server.espacesoutien.com sshd[23487]: Invalid user nt from 138.197.175.236 port 40278
2020-06-13T21:09:28.058178server.espacesoutien.com sshd[23487]: Failed password for invalid user nt from 138.197.175.236 port 40278 ssh2
...
2020-06-14 05:32:18

Recently Reported IPs

41.65.251.81 41.66.234.201 41.67.40.222 41.62.96.63
41.72.61.50 41.72.192.18 41.74.128.165 41.74.129.215
41.74.131.45 41.74.130.162 41.74.140.18 41.75.112.147
41.74.140.159 41.75.122.56 41.75.124.163 41.74.142.135
41.74.142.232 41.75.124.210 41.75.124.223 41.75.126.29