Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Robina

Region: Queensland

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: Network Technology (AUST) P/L

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.29.42.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;120.29.42.41.			IN	A

;; AUTHORITY SECTION:
.			320	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019063000 1800 900 604800 86400

;; Query time: 248 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 30 23:45:31 CST 2019
;; MSG SIZE  rcvd: 116

Host info
41.42.29.120.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 41.42.29.120.in-addr.arpa.: No answer

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.219.170.123 attackbots
445/tcp 445/tcp
[2020-08-11]2pkt
2020-08-12 08:03:24
27.79.63.116 attack
445/tcp
[2020-08-11]1pkt
2020-08-12 08:18:07
218.92.0.248 attackbots
$f2bV_matches
2020-08-12 07:54:40
111.72.196.89 attackbots
Aug 12 01:49:38 srv01 postfix/smtpd\[28021\]: warning: unknown\[111.72.196.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 01:53:06 srv01 postfix/smtpd\[28013\]: warning: unknown\[111.72.196.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 02:00:00 srv01 postfix/smtpd\[1508\]: warning: unknown\[111.72.196.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 02:00:12 srv01 postfix/smtpd\[1508\]: warning: unknown\[111.72.196.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 02:00:28 srv01 postfix/smtpd\[1508\]: warning: unknown\[111.72.196.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-12 08:03:55
41.138.133.196 attackspambots
Icarus honeypot on github
2020-08-12 08:33:02
190.214.72.42 attackspam
445/tcp
[2020-08-11]1pkt
2020-08-12 08:14:28
45.119.212.105 attackbots
Aug 11 22:46:58 eventyay sshd[23067]: Failed password for root from 45.119.212.105 port 59102 ssh2
Aug 11 22:51:28 eventyay sshd[23670]: Failed password for root from 45.119.212.105 port 41674 ssh2
...
2020-08-12 08:14:41
61.163.4.170 attack
1433/tcp
[2020-08-11]1pkt
2020-08-12 08:22:54
205.185.122.138 attack
ET DROP Dshield Block Listed Source group 1 - port: 11211 proto: tcp cat: Misc Attackbytes: 60
2020-08-12 08:27:53
89.19.67.17 spamattackproxy
Google.com
2020-08-12 08:19:27
109.123.117.243 attackbots
3306/tcp 10443/tcp 60000/tcp...
[2020-06-12/08-11]14pkt,12pt.(tcp),2pt.(udp)
2020-08-12 07:53:34
195.54.160.65 attack
404 NOT FOUND
2020-08-12 07:59:15
183.62.197.115 attackbotsspam
Aug 11 23:35:40 santamaria sshd\[32555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.197.115  user=root
Aug 11 23:35:42 santamaria sshd\[32555\]: Failed password for root from 183.62.197.115 port 38000 ssh2
Aug 11 23:37:58 santamaria sshd\[32573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.197.115  user=root
...
2020-08-12 07:55:40
123.207.85.150 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-08-12 08:19:15
83.40.190.241 attackbotsspam
23/tcp
[2020-08-11]1pkt
2020-08-12 07:58:01

Recently Reported IPs

97.57.116.111 188.57.8.166 125.160.207.213 150.143.72.111
58.208.129.84 141.212.175.155 168.228.150.20 103.245.115.4
131.47.75.189 123.14.119.154 204.17.16.140 157.46.16.248
151.58.152.67 175.223.34.110 171.27.113.105 138.185.94.205
176.99.206.43 2001:44c8:4700:3e02:2880:d841:27e1:2ec2 103.105.238.11 213.115.235.98