Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nairobi

Region: Nairobi

Country: Kenya

Internet Service Provider: Safaricom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.80.136.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12401
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.80.136.201.			IN	A

;; AUTHORITY SECTION:
.			237	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032201 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 23 02:16:06 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 201.136.80.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.136.80.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.114.109.210 attackspam
Unauthorized connection attempt from IP address 46.114.109.210 on Port 445(SMB)
2020-09-21 08:01:29
114.67.108.60 attack
Invalid user upload from 114.67.108.60 port 47482
2020-09-21 12:05:53
103.199.98.220 attackbotsspam
Invalid user webftp from 103.199.98.220 port 39014
2020-09-21 12:23:51
106.12.186.130 attackspambots
 TCP (SYN) 106.12.186.130:43930 -> port 12557, len 44
2020-09-21 12:24:31
106.12.222.209 attack
Sep 20 23:55:41 onepixel sshd[1401874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.222.209 
Sep 20 23:55:41 onepixel sshd[1401874]: Invalid user hadoop from 106.12.222.209 port 39382
Sep 20 23:55:44 onepixel sshd[1401874]: Failed password for invalid user hadoop from 106.12.222.209 port 39382 ssh2
Sep 21 00:00:10 onepixel sshd[1402596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.222.209  user=root
Sep 21 00:00:12 onepixel sshd[1402596]: Failed password for root from 106.12.222.209 port 47834 ssh2
2020-09-21 08:09:15
162.243.128.224 attackbotsspam
Found on   Binary Defense     / proto=6  .  srcport=38015  .  dstport=47808  .     (2314)
2020-09-21 08:08:51
108.41.179.72 attackspambots
Sep 20 19:04:09 vps639187 sshd\[29893\]: Invalid user pi from 108.41.179.72 port 41445
Sep 20 19:04:09 vps639187 sshd\[29893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.41.179.72
Sep 20 19:04:12 vps639187 sshd\[29893\]: Failed password for invalid user pi from 108.41.179.72 port 41445 ssh2
...
2020-09-21 12:04:01
221.238.182.3 attackbotsspam
[ssh] SSH attack
2020-09-21 12:21:50
141.105.104.175 attack
Fail2Ban automatic report:
SSH suspicious user names:
Sep 20 19:04:10 serw sshd[23861]: Connection closed by invalid user admin 141.105.104.175 port 41940 [preauth]
2020-09-21 12:08:51
180.151.9.198 attackspam
$f2bV_matches
2020-09-21 12:20:49
100.3.129.59 attack
Auto Detect Rule!
proto TCP (SYN), 100.3.129.59:9706->gjan.info:1433, len 40
2020-09-21 07:55:40
190.5.242.114 attackbotsspam
20 attempts against mh-ssh on pcx
2020-09-21 12:15:12
106.12.28.152 attackbotsspam
Sep 21 04:43:01 pve1 sshd[21035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.152 
Sep 21 04:43:02 pve1 sshd[21035]: Failed password for invalid user dts from 106.12.28.152 port 56806 ssh2
...
2020-09-21 12:03:46
162.243.145.195 attackspam
CMS (WordPress or Joomla) login attempt.
2020-09-21 07:55:55
1.171.98.88 attack
Sep 20 19:04:01 vps639187 sshd\[29853\]: Invalid user cablecom from 1.171.98.88 port 38513
Sep 20 19:04:02 vps639187 sshd\[29853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.171.98.88
Sep 20 19:04:04 vps639187 sshd\[29853\]: Failed password for invalid user cablecom from 1.171.98.88 port 38513 ssh2
...
2020-09-21 12:14:26

Recently Reported IPs

218.27.249.252 83.131.80.36 163.106.178.136 27.37.2.201
59.203.55.96 117.242.232.1 78.20.131.47 49.102.3.40
185.224.128.251 153.228.240.75 69.125.70.147 184.126.41.121
64.97.128.13 114.57.144.146 216.58.202.40 29.40.137.155
103.113.22.89 177.11.121.19 146.4.8.22 107.173.17.148