Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Randburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
41.75.140.15 attackspambots
Unauthorized connection attempt from IP address 41.75.140.15 on Port 445(SMB)
2020-04-02 01:01:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.75.140.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.75.140.123.			IN	A

;; AUTHORITY SECTION:
.			158	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111101 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 12 13:46:30 CST 2019
;; MSG SIZE  rcvd: 117
Host info
123.140.75.41.in-addr.arpa domain name pointer dsl-41-75-140-123.za.ecnza.net.
Nslookup info:
123.140.75.41.in-addr.arpa	name = dsl-41-75-140-123.za.ecnza.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
128.187.106.49 attackspam
Invalid user mbarski from 128.187.106.49 port 59285
2019-12-20 04:55:12
217.107.115.99 attackbots
" "
2019-12-20 05:14:02
178.121.107.172 attackbotsspam
Unauthorized IMAP connection attempt
2019-12-20 04:58:58
95.110.227.64 attack
Fail2Ban - SSH Bruteforce Attempt
2019-12-20 04:50:26
190.204.230.57 attackspam
Unauthorized connection attempt from IP address 190.204.230.57 on Port 445(SMB)
2019-12-20 05:04:16
78.84.16.85 attackspambots
Unauthorized connection attempt from IP address 78.84.16.85 on Port 445(SMB)
2019-12-20 05:20:16
41.33.240.117 attack
Unauthorized connection attempt from IP address 41.33.240.117 on Port 445(SMB)
2019-12-20 04:59:24
45.124.86.65 attackspambots
[ssh] SSH attack
2019-12-20 05:12:00
52.229.160.94 attack
Invalid user unset from 52.229.160.94 port 33210
2019-12-20 05:05:02
67.55.92.89 attack
Dec 19 20:39:41 localhost sshd\[44608\]: Invalid user christiane123 from 67.55.92.89 port 52518
Dec 19 20:39:41 localhost sshd\[44608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89
Dec 19 20:39:43 localhost sshd\[44608\]: Failed password for invalid user christiane123 from 67.55.92.89 port 52518 ssh2
Dec 19 20:44:32 localhost sshd\[44777\]: Invalid user 1234550 from 67.55.92.89 port 58108
Dec 19 20:44:32 localhost sshd\[44777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89
...
2019-12-20 04:54:01
61.19.202.132 attackbotsspam
Unauthorized connection attempt from IP address 61.19.202.132 on Port 445(SMB)
2019-12-20 05:18:25
217.61.5.122 attack
Dec 19 08:16:38 web9 sshd\[9678\]: Invalid user itnet from 217.61.5.122
Dec 19 08:16:38 web9 sshd\[9678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.5.122
Dec 19 08:16:40 web9 sshd\[9678\]: Failed password for invalid user itnet from 217.61.5.122 port 46162 ssh2
Dec 19 08:21:59 web9 sshd\[10600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.5.122  user=root
Dec 19 08:22:01 web9 sshd\[10600\]: Failed password for root from 217.61.5.122 port 53362 ssh2
2019-12-20 05:08:05
113.160.166.156 attackspam
Unauthorized connection attempt from IP address 113.160.166.156 on Port 445(SMB)
2019-12-20 05:19:11
138.204.234.14 attack
Unauthorized connection attempt from IP address 138.204.234.14 on Port 445(SMB)
2019-12-20 04:59:36
129.158.73.119 attack
Dec 19 21:55:56 lnxded63 sshd[20044]: Failed password for root from 129.158.73.119 port 49273 ssh2
Dec 19 21:55:56 lnxded63 sshd[20044]: Failed password for root from 129.158.73.119 port 49273 ssh2
2019-12-20 04:59:56

Recently Reported IPs

177.54.241.154 157.245.1.113 182.114.243.79 125.44.239.65
175.110.108.124 182.126.81.146 166.231.139.48 219.120.147.8
64.224.239.0 1.35.67.205 98.222.101.59 160.93.221.162
82.146.57.79 82.192.135.115 103.229.67.69 158.30.92.112
202.179.31.58 182.116.110.144 162.213.241.175 42.237.55.131