Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.129.55.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.129.55.41.			IN	A

;; AUTHORITY SECTION:
.			264	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 06:11:51 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 41.55.129.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.55.129.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.186.237.86 attackbots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-26 04:13:06
123.252.134.147 attack
445/tcp 445/tcp
[2020-02-25]2pkt
2020-02-26 04:28:55
218.92.0.178 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
Failed password for root from 218.92.0.178 port 15675 ssh2
Failed password for root from 218.92.0.178 port 15675 ssh2
Failed password for root from 218.92.0.178 port 15675 ssh2
Failed password for root from 218.92.0.178 port 15675 ssh2
2020-02-26 03:59:37
114.227.134.145 attackspambots
Automatic report - Port Scan Attack
2020-02-26 04:24:01
98.151.105.18 attackbotsspam
4567/tcp
[2020-02-25]1pkt
2020-02-26 04:23:48
211.230.110.156 attack
23/tcp
[2020-02-25]1pkt
2020-02-26 04:07:06
118.37.162.126 attackbots
23/tcp
[2020-02-25]1pkt
2020-02-26 03:57:14
113.237.249.65 attackbots
2323/tcp
[2020-02-25]1pkt
2020-02-26 04:11:31
176.119.109.24 attack
0,31-00/00 [bc00/m99] PostRequest-Spammer scoring: Durban01
2020-02-26 04:17:57
80.253.20.94 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 04:04:40
194.32.96.72 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 04:27:47
178.238.30.50 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 04:23:15
113.254.140.148 attack
1433/tcp
[2020-02-25]1pkt
2020-02-26 04:24:25
31.28.118.222 attack
9530/tcp
[2020-02-25]1pkt
2020-02-26 03:59:06
195.206.62.142 attackbotsspam
Feb 25 17:36:07 debian-2gb-nbg1-2 kernel: \[4907765.389880\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.206.62.142 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=3426 DF PROTO=TCP SPT=65373 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2020-02-26 04:24:52

Recently Reported IPs

0.129.113.1 0.129.129.229 0.130.182.251 0.139.23.60
0.129.109.253 0.128.84.91 0.127.16.240 0.130.223.244
0.129.117.166 0.129.251.188 0.129.181.117 0.129.245.207
0.129.250.34 0.130.14.134 0.129.178.163 0.140.123.138
0.13.153.128 0.129.233.129 0.131.129.30 0.129.217.193