Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Port Elizabeth

Region: Eastern Cape

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.85.227.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40217
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.85.227.48.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112401 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 25 03:12:37 CST 2019
;; MSG SIZE  rcvd: 116
Host info
48.227.85.41.in-addr.arpa domain name pointer 41-85-227-48.dynamicdsl.netwide.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.227.85.41.in-addr.arpa	name = 41-85-227-48.dynamicdsl.netwide.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.142.39.247 attack
firewall-block, port(s): 23/tcp
2019-08-08 19:24:10
202.51.189.122 attackbotsspam
Brute force attempt
2019-08-08 19:43:18
3.87.147.63 attack
Aug  8 02:08:35   TCP Attack: SRC=3.87.147.63 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=236  DF PROTO=TCP SPT=53666 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0
2019-08-08 19:56:26
150.223.27.65 attackbotsspam
Aug  8 06:29:08 [host] sshd[25143]: Invalid user paige from 150.223.27.65
Aug  8 06:29:08 [host] sshd[25143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.27.65
Aug  8 06:29:10 [host] sshd[25143]: Failed password for invalid user paige from 150.223.27.65 port 50131 ssh2
2019-08-08 19:32:24
139.199.84.234 attackbotsspam
Aug  8 08:18:02 rpi sshd[12682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.84.234 
Aug  8 08:18:04 rpi sshd[12682]: Failed password for invalid user cs from 139.199.84.234 port 57238 ssh2
2019-08-08 19:57:32
183.90.124.87 attack
Automatic report - Port Scan Attack
2019-08-08 19:33:16
78.186.254.130 attackbotsspam
Unauthorised access (Aug  8) SRC=78.186.254.130 LEN=40 TTL=242 ID=63155 DF TCP DPT=8080 WINDOW=14600 SYN
2019-08-08 19:22:56
149.202.88.21 attackbots
Aug  8 10:42:15 root sshd[2956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.88.21 
Aug  8 10:42:17 root sshd[2956]: Failed password for invalid user boom from 149.202.88.21 port 42572 ssh2
Aug  8 10:46:31 root sshd[3005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.88.21 
...
2019-08-08 19:46:43
103.249.100.48 attack
Automatic report - Banned IP Access
2019-08-08 19:36:52
104.248.177.184 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-08 19:26:38
186.109.249.93 attackbots
Automatic report - Port Scan Attack
2019-08-08 19:05:15
159.65.191.184 attackbots
2019-08-08T10:31:35.910252abusebot.cloudsearch.cf sshd\[30788\]: Invalid user minecraft from 159.65.191.184 port 38794
2019-08-08 19:54:09
189.230.7.143 attackbots
Unauthorised access (Aug  8) SRC=189.230.7.143 LEN=44 TTL=242 ID=47723 TCP DPT=445 WINDOW=1024 SYN
2019-08-08 19:08:00
162.243.233.43 spam
Email Spam
2019-08-08 19:57:29
101.89.150.214 attackbots
$f2bV_matches
2019-08-08 19:38:06

Recently Reported IPs

100.186.187.175 104.43.32.142 79.154.233.5 143.89.26.15
153.40.234.77 60.116.130.109 119.120.106.3 137.216.54.109
86.234.86.243 211.245.252.134 186.54.131.105 219.79.132.86
24.85.146.222 199.167.193.170 107.124.178.44 175.119.235.105
138.236.211.91 87.172.167.107 24.116.234.20 113.23.120.195