Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: Safaricom Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Unauthorized connection attempt detected from IP address 41.90.122.21 to port 445
2020-03-01 17:56:17
attackbots
unauthorized connection attempt
2020-01-12 16:50:40
attackspambots
Unauthorized connection attempt from IP address 41.90.122.21 on Port 445(SMB)
2019-12-19 04:19:26
attackspambots
Unauthorized connection attempt from IP address 41.90.122.21 on Port 445(SMB)
2019-12-09 22:28:43
attack
Unauthorized connection attempt from IP address 41.90.122.21 on Port 445(SMB)
2019-11-14 03:42:13
attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-10-28 17:17:13
attackspambots
Unauthorized connection attempt from IP address 41.90.122.21 on Port 445(SMB)
2019-10-20 23:44:05
attackbots
Unauthorized connection attempt from IP address 41.90.122.21 on Port 445(SMB)
2019-07-12 16:23:31
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.90.122.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37621
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.90.122.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 16:39:11 CST 2019
;; MSG SIZE  rcvd: 116

Host info
21.122.90.41.in-addr.arpa domain name pointer 41-90-122-21.safaricombusiness.co.ke.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
21.122.90.41.in-addr.arpa	name = 41-90-122-21.safaricombusiness.co.ke.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
213.32.16.127 attack
Nov 20 09:24:08 SilenceServices sshd[8727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.16.127
Nov 20 09:24:10 SilenceServices sshd[8727]: Failed password for invalid user jn from 213.32.16.127 port 54644 ssh2
Nov 20 09:28:17 SilenceServices sshd[9885]: Failed password for root from 213.32.16.127 port 35026 ssh2
2019-11-20 18:18:49
185.175.93.45 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 51680 proto: TCP cat: Misc Attack
2019-11-20 18:09:21
187.16.96.35 attack
2019-11-20 08:27:37,342 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 187.16.96.35
2019-11-20 08:58:06,033 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 187.16.96.35
2019-11-20 09:31:32,865 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 187.16.96.35
2019-11-20 10:06:10,681 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 187.16.96.35
2019-11-20 10:39:42,186 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 187.16.96.35
...
2019-11-20 18:31:06
51.91.20.174 attackspambots
Invalid user yvie from 51.91.20.174 port 58184
2019-11-20 18:10:28
60.172.70.52 attack
badbot
2019-11-20 18:08:56
14.112.230.176 attackspambots
badbot
2019-11-20 18:04:19
42.242.10.6 attackbotsspam
badbot
2019-11-20 18:20:16
113.100.89.191 attack
badbot
2019-11-20 18:01:31
89.35.39.180 attackbotsspam
Web App Attack
2019-11-20 18:04:58
165.90.205.29 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-20 18:19:28
176.106.178.197 attackspambots
Nov 20 08:41:00 pkdns2 sshd\[6139\]: Invalid user psswd from 176.106.178.197Nov 20 08:41:02 pkdns2 sshd\[6139\]: Failed password for invalid user psswd from 176.106.178.197 port 43310 ssh2Nov 20 08:44:56 pkdns2 sshd\[6267\]: Invalid user gavriella from 176.106.178.197Nov 20 08:44:58 pkdns2 sshd\[6267\]: Failed password for invalid user gavriella from 176.106.178.197 port 33657 ssh2Nov 20 08:48:54 pkdns2 sshd\[6447\]: Invalid user appuser from 176.106.178.197Nov 20 08:48:56 pkdns2 sshd\[6447\]: Failed password for invalid user appuser from 176.106.178.197 port 52229 ssh2
...
2019-11-20 18:31:24
219.239.105.55 attackspam
2019-11-20T06:53:24.168035shield sshd\[11783\]: Invalid user nfs from 219.239.105.55 port 55048
2019-11-20T06:53:24.172220shield sshd\[11783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.105.55
2019-11-20T06:53:26.933312shield sshd\[11783\]: Failed password for invalid user nfs from 219.239.105.55 port 55048 ssh2
2019-11-20T06:58:36.228876shield sshd\[12782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.105.55  user=root
2019-11-20T06:58:38.163750shield sshd\[12782\]: Failed password for root from 219.239.105.55 port 42899 ssh2
2019-11-20 17:53:02
222.66.38.46 attack
badbot
2019-11-20 18:07:18
185.156.73.38 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-20 18:24:33
77.247.108.88 attack
Automatic report - Port Scan Attack
2019-11-20 18:10:15

Recently Reported IPs

221.68.224.75 171.254.10.118 125.19.68.2 212.107.238.101
181.49.155.250 138.197.156.62 31.186.136.27 1.6.59.159
122.1.240.183 83.219.139.66 179.80.39.106 221.122.59.121
113.160.37.26 210.212.240.234 179.212.136.204 193.188.22.136
78.143.18.127 91.224.17.93 95.158.137.254 201.187.110.42