Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Harare

Region: Harare (city)

Country: Zimbabwe

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '41.85.216.0 - 41.85.219.255'

% No abuse contact registered for 41.85.216.0 - 41.85.219.255

inetnum:        41.85.216.0 - 41.85.219.255
netname:        Brooke
descr:          Regional POP
country:        ZW
admin-c:        DK44-AFRINIC
admin-c:        SM131-AFRINIC
tech-c:         CM89-AFRINIC
tech-c:         SM131-AFRINIC
status:         ASSIGNED PA
mnt-by:         TF-196-29-32-0-196-29-39-255-MNT
source:         AFRINIC # Filtered
parent:         41.85.192.0 - 41.85.223.255

person:         Charles Mashamba
address:        1112 sunningdale3, Harare
address:        Harare 263
address:        Zimbabwe
phone:          tel:+263-77-264-9961
nic-hdl:        CM89-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-E4RSKHVYJSC5GC64GGXTUMRC0YTFZXHZ-MNT

person:         Daylight Katengwe
address:        52-54 Samora Machel Ave
address:        Harare 0000
address:        Zimbabwe
phone:          tel:+263-77-264-9961
nic-hdl:        DK44-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-QTQXOYWEBWMRBFNOLJK1GL35KZAWV1CT-MNT

person:         Shingirai Matare
address:        54-56 Pegasus house, Samora Machael, 263 Harare Zimbabwe
phone:          tel:+263-242707533
nic-hdl:        SM131-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-WYYBSJ14HPNVOATNH9K0EUGCI8WMDYNE-MNT

% Information related to '41.85.217.0/24AS37183'

route:          41.85.217.0/24
origin:         AS37183
descr:          Utande
mnt-by:         TF-196-29-32-0-196-29-39-255-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.85.217.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.85.217.172.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 00:35:59 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 172.217.85.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.217.85.41.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
113.184.20.20 attackspambots
445/tcp
[2019-07-03]1pkt
2019-07-03 19:14:06
187.16.96.35 attack
Jul  3 06:48:53 core01 sshd\[13824\]: Invalid user zai from 187.16.96.35 port 42142
Jul  3 06:48:53 core01 sshd\[13824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.96.35
...
2019-07-03 18:40:29
5.250.136.139 attack
SIPVicious Scanner Detection
2019-07-03 18:56:15
92.169.172.144 attack
Jul  2 12:33:53 xb3 sshd[29783]: Failed password for r.r from 92.169.172.144 port 49302 ssh2
Jul  2 12:33:53 xb3 sshd[29783]: Connection closed by 92.169.172.144 [preauth]
Jul  2 12:33:56 xb3 sshd[29843]: Failed password for r.r from 92.169.172.144 port 49572 ssh2
Jul  2 12:33:56 xb3 sshd[29843]: Connection closed by 92.169.172.144 [preauth]
Jul  2 12:33:58 xb3 sshd[29884]: Failed password for r.r from 92.169.172.144 port 49864 ssh2
Jul  2 12:33:58 xb3 sshd[29884]: Connection closed by 92.169.172.144 [preauth]
Jul  2 12:34:00 xb3 sshd[29917]: Failed password for r.r from 92.169.172.144 port 50064 ssh2
Jul  2 12:34:00 xb3 sshd[29917]: Connection closed by 92.169.172.144 [preauth]
Jul  2 12:34:03 xb3 sshd[29947]: Failed password for r.r from 92.169.172.144 port 50320 ssh2
Jul  2 12:34:03 xb3 sshd[29947]: Connection closed by 92.169.172.144 [preauth]
Jul  2 12:34:05 xb3 sshd[30908]: Failed password for r.r from 92.169.172.144 port 50590 ssh2
Jul  2 12:34:05 xb3 sshd[30908]........
-------------------------------
2019-07-03 19:20:49
109.76.41.167 attackspambots
Trying to deliver email spam, but blocked by RBL
2019-07-03 18:51:05
34.217.114.221 attackspam
User agent spoofing, by Amazon Technologies Inc.
2019-07-03 19:25:32
201.139.111.202 attack
2019-07-03T10:16:34.996558abusebot-2.cloudsearch.cf sshd\[3990\]: Invalid user charlott from 201.139.111.202 port 39924
2019-07-03 18:53:41
157.44.148.247 attackbots
SMB Server BruteForce Attack
2019-07-03 18:36:01
186.84.172.62 attackbotsspam
web-1 [ssh] SSH Attack
2019-07-03 19:16:49
114.33.190.222 attackbotsspam
88/tcp
[2019-07-03]1pkt
2019-07-03 18:41:51
95.8.239.95 attackbots
23/tcp
[2019-07-03]1pkt
2019-07-03 19:16:29
114.235.129.119 attackspambots
Jul  2 16:45:05 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service)
Jul  2 16:45:06 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service)
Jul  2 16:45:06 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service)
Jul  2 16:45:07 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service)
Jul  2 16:45:07 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service)
Jul  2 16:45:07 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service)
Jul  2 16:45:08 wildwolf ssh-ho........
------------------------------
2019-07-03 18:33:44
175.107.63.2 attack
8111/tcp
[2019-07-03]1pkt
2019-07-03 18:48:53
5.196.29.194 attackbots
SSH Brute Force, server-1 sshd[428]: Failed password for invalid user lebesgue from 5.196.29.194 port 46781 ssh2
2019-07-03 18:58:54
112.249.183.66 attackspam
Unauthorised access (Jul  3) SRC=112.249.183.66 LEN=44 TTL=49 ID=43184 TCP DPT=8080 WINDOW=35243 SYN
2019-07-03 19:12:03

Recently Reported IPs

44.39.60.21 33.93.15.248 251.240.66.246 23.44.178.220
121.134.176.117 2606:4700:10::6814:7034 182.204.147.77 159.154.160.212
2606:4700:10::6814:6822 2606:4700:10::6816:515 193.176.211.239 193.176.211.230
193.176.211.207 193.176.211.219 193.176.211.202 193.176.211.206
193.176.211.223 193.176.211.59 193.176.211.228 193.176.211.150