Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.12.255.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52230
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.12.255.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:28:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
54.255.12.41.in-addr.arpa domain name pointer vc-kzn-41-12-255-54.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.255.12.41.in-addr.arpa	name = vc-kzn-41-12-255-54.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.231.132.94 attackspambots
Invalid user kristen from 111.231.132.94 port 41952
2019-07-13 22:53:57
106.13.60.155 attackbotsspam
Jul 13 16:50:37 vps647732 sshd[2242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.155
Jul 13 16:50:39 vps647732 sshd[2242]: Failed password for invalid user romaric from 106.13.60.155 port 60238 ssh2
...
2019-07-13 22:55:02
168.0.8.240 attack
Invalid user admin from 168.0.8.240 port 48964
2019-07-13 22:33:19
80.28.234.134 attackbotsspam
Jul 13 14:32:14 MK-Soft-Root2 sshd\[13267\]: Invalid user jack from 80.28.234.134 port 60730
Jul 13 14:32:14 MK-Soft-Root2 sshd\[13267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.28.234.134
Jul 13 14:32:17 MK-Soft-Root2 sshd\[13267\]: Failed password for invalid user jack from 80.28.234.134 port 60730 ssh2
...
2019-07-13 23:03:57
14.98.223.82 attack
Invalid user noc from 14.98.223.82 port 61032
2019-07-13 22:12:06
209.216.230.30 attack
Invalid user paul from 209.216.230.30 port 16940
2019-07-13 22:18:39
58.119.3.77 attack
Invalid user app from 58.119.3.77 port 33383
2019-07-13 23:09:05
201.216.193.65 attack
Jul 13 16:04:10 rpi sshd[24789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.216.193.65 
Jul 13 16:04:12 rpi sshd[24789]: Failed password for invalid user jboss from 201.216.193.65 port 41870 ssh2
2019-07-13 22:21:58
83.14.215.162 attack
Invalid user weblogic from 83.14.215.162 port 60378
2019-07-13 23:02:08
157.230.237.76 attackbotsspam
FTP Brute-Force reported by Fail2Ban
2019-07-13 22:39:16
118.25.92.221 attack
Invalid user apptest from 118.25.92.221 port 37946
2019-07-13 22:50:48
111.231.87.204 attackbotsspam
Invalid user redis from 111.231.87.204 port 37360
2019-07-13 22:54:34
104.236.31.227 attack
Invalid user default from 104.236.31.227 port 41348
2019-07-13 22:55:40
51.75.243.22 attackspambots
Invalid user cos from 51.75.243.22 port 44070
2019-07-13 23:11:06
167.99.75.174 attackbotsspam
SSH Brute Force, server-1 sshd[1509]: Failed password for invalid user demarini from 167.99.75.174 port 53450 ssh2
2019-07-13 22:34:06

Recently Reported IPs

56.220.165.183 6.1.210.246 235.151.197.127 209.140.200.84
177.35.184.79 175.221.119.237 157.233.38.118 246.104.232.159
133.184.100.208 44.76.255.104 72.230.224.218 169.230.34.30
148.44.128.185 214.66.227.174 70.158.184.35 188.126.38.162
137.116.179.15 118.250.163.50 4.162.189.240 171.224.91.77