Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Geneva

Region: Geneva

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.195.254.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.195.254.55.			IN	A

;; AUTHORITY SECTION:
.			317	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112401 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 25 04:58:20 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 55.254.195.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.254.195.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.232.31.157 attackspam
Oct  8 00:34:30 web1 sshd[16990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct  8 00:34:32 web1 sshd[16990]: Failed password for root from 132.232.31.157 port 36820 ssh2
Oct  8 00:47:54 web1 sshd[21548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct  8 00:47:56 web1 sshd[21548]: Failed password for root from 132.232.31.157 port 47654 ssh2
Oct  8 01:01:30 web1 sshd[26185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct  8 01:01:32 web1 sshd[26185]: Failed password for root from 132.232.31.157 port 37580 ssh2
Oct  8 01:10:44 web1 sshd[29427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct  8 01:10:45 web1 sshd[29427]: Failed password for root from 132.232.31.157 port 49686 ssh2
Oct  8 01:19:43 web1 sshd[32
...
2020-10-08 02:50:53
112.29.171.34 attackbotsspam
" "
2020-10-08 03:02:44
106.12.217.128 attack
" "
2020-10-08 02:51:52
68.183.55.223 attack
Misc Attack - Port=20285
2020-10-08 02:59:19
94.102.51.28 attackbots
 TCP (SYN) 94.102.51.28:45039 -> port 19163, len 44
2020-10-08 02:53:29
164.90.226.205 attackspambots
Oct  7 18:09:31 plex-server sshd[1519857]: Failed password for root from 164.90.226.205 port 49004 ssh2
Oct  7 18:11:42 plex-server sshd[1520847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.226.205  user=root
Oct  7 18:11:44 plex-server sshd[1520847]: Failed password for root from 164.90.226.205 port 58564 ssh2
Oct  7 18:13:49 plex-server sshd[1521702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.226.205  user=root
Oct  7 18:13:51 plex-server sshd[1521702]: Failed password for root from 164.90.226.205 port 39890 ssh2
...
2020-10-08 03:14:59
43.226.39.55 attack
5x Failed Password
2020-10-08 03:09:42
41.160.182.50 attackspambots
Unauthorized connection attempt from IP address 41.160.182.50 on Port 445(SMB)
2020-10-08 02:43:13
59.45.76.90 attack
fail2ban: brute force SSH detected
2020-10-08 03:08:02
104.151.246.108 attackbots
SIP attack
2020-10-08 02:46:22
128.14.137.180 attackspambots
Found on   Github Combined on 3 lists    / proto=6  .  srcport=30347  .  dstport=80 HTTP  .     (2144)
2020-10-08 02:54:02
52.251.39.67 attackbotsspam
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.801+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="1135716333",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/52.251.39.67/5543",Challenge="1602081665/60ef6b0a73f0862268ca43e21f04966e",Response="20a89a556f1b13d21e39356081c3275b",ExpectedResponse=""
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.852+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="3826012407",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/52.251.39.67/5543",Challenge="1602081665/60ef6b0a73f0862268ca43e21f04966e",Response="e6c9f20450368a272c66f99cf5c4bab0",ExpectedResponse=""
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.92
...
2020-10-08 03:01:52
218.92.0.246 attackbotsspam
Oct  7 20:57:01 sso sshd[4507]: Failed password for root from 218.92.0.246 port 27654 ssh2
Oct  7 20:57:03 sso sshd[4507]: Failed password for root from 218.92.0.246 port 27654 ssh2
...
2020-10-08 02:58:28
51.79.52.2 attackspam
Oct  7 17:02:09 * sshd[5446]: Failed password for root from 51.79.52.2 port 33014 ssh2
2020-10-08 03:09:13
51.68.71.239 attack
Oct  7 16:22:46 ws26vmsma01 sshd[71136]: Failed password for root from 51.68.71.239 port 57716 ssh2
...
2020-10-08 02:46:43

Recently Reported IPs

186.225.103.238 105.187.115.43 84.174.99.196 93.86.201.91
101.169.191.171 3.174.10.117 151.53.173.77 191.176.190.181
70.81.164.225 83.165.137.20 196.201.39.150 142.163.92.19
172.33.177.184 216.175.21.74 104.248.251.166 36.84.218.195
112.66.211.213 182.86.114.161 89.114.25.87 139.255.250.20