Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.85.120.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48485
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.85.120.225.			IN	A

;; AUTHORITY SECTION:
.			459	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112900 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 29 15:26:25 CST 2019
;; MSG SIZE  rcvd: 117
Host info
225.120.85.41.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 225.120.85.41.in-addr.arpa.: No answer

Authoritative answers can be found from:
225.120.85.41.in-addr.arpa
	origin = ns1.frogfoot.net
	mail addr = hostmaster.frogfoot.net
	serial = 60272073
	refresh = 3600
	retry = 300
	expire = 86400
	minimum = 300
Related IP info:
Related comments:
IP Type Details Datetime
52.149.131.224 attackspambots
$f2bV_matches
2020-07-10 05:53:16
222.186.190.2 attack
Fail2Ban Ban Triggered (2)
2020-07-10 05:38:58
120.27.1.89 attackbotsspam
Failed password for invalid user cristian from 120.27.1.89 port 41816 ssh2
2020-07-10 05:46:25
103.28.36.10 attackspambots
103.28.36.10 - - [09/Jul/2020:22:20:27 +0200] "POST /xmlrpc.php HTTP/2.0" 403 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
103.28.36.10 - - [09/Jul/2020:22:20:27 +0200] "POST /xmlrpc.php HTTP/2.0" 403 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
...
2020-07-10 05:38:19
114.24.232.228 attackspam
Attempted connection to port 23.
2020-07-10 05:57:44
165.22.116.15 attackspam
Port Scan detected!
...
2020-07-10 05:22:28
93.174.93.197 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 84 - port: 53413 proto: UDP cat: Misc Attack
2020-07-10 05:47:45
138.68.82.194 attack
Jul  9 23:29:30 vps647732 sshd[4037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194
Jul  9 23:29:32 vps647732 sshd[4037]: Failed password for invalid user yiyuan from 138.68.82.194 port 38272 ssh2
...
2020-07-10 05:43:01
184.168.27.107 attack
REQUESTED PAGE: /xmlrpc.php
2020-07-10 05:42:46
193.169.252.21 attackbotsspam
firewall-block, port(s): 37810/udp, 47808/udp
2020-07-10 05:50:44
134.209.63.140 attackspam
firewall-block, port(s): 22738/tcp
2020-07-10 05:55:05
139.199.59.31 attack
(sshd) Failed SSH login from 139.199.59.31 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul  9 23:36:21 s1 sshd[25270]: Invalid user tony from 139.199.59.31 port 42347
Jul  9 23:36:23 s1 sshd[25270]: Failed password for invalid user tony from 139.199.59.31 port 42347 ssh2
Jul  9 23:47:34 s1 sshd[26469]: Invalid user limengting from 139.199.59.31 port 59378
Jul  9 23:47:36 s1 sshd[26469]: Failed password for invalid user limengting from 139.199.59.31 port 59378 ssh2
Jul  9 23:52:02 s1 sshd[26966]: Invalid user krissy from 139.199.59.31 port 49259
2020-07-10 05:30:42
192.241.245.248 attack
firewall-block, port(s): 10606/tcp
2020-07-10 05:46:02
142.44.153.251 attack
Fraudulent and criminal email SPAM.
2020-07-10 05:41:29
54.37.205.243 attackbotsspam
Port scan on 1 port(s): 445
2020-07-10 05:31:52

Recently Reported IPs

232.113.234.229 179.177.248.25 219.111.18.73 106.145.195.238
213.197.243.3 74.26.64.143 78.186.38.5 151.146.123.150
167.223.2.225 154.194.3.125 115.70.147.210 55.225.200.102
116.120.58.66 151.116.197.75 111.120.5.179 139.54.45.155
185.155.111.192 82.78.15.226 124.160.47.162 57.42.249.183