Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.2.129.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.2.129.51.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 21:44:51 CST 2025
;; MSG SIZE  rcvd: 104
Host info
51.129.2.41.in-addr.arpa domain name pointer vc-cpt-41-2-129-51.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.129.2.41.in-addr.arpa	name = vc-cpt-41-2-129-51.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.140.192.7 attackbotsspam
Sep  3 04:22:22 mail sshd\[13905\]: Invalid user css from 14.140.192.7 port 61648
Sep  3 04:22:22 mail sshd\[13905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.140.192.7
Sep  3 04:22:24 mail sshd\[13905\]: Failed password for invalid user css from 14.140.192.7 port 61648 ssh2
Sep  3 04:22:52 mail sshd\[13967\]: Invalid user ftp1 from 14.140.192.7 port 49451
Sep  3 04:22:52 mail sshd\[13967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.140.192.7
2019-09-03 11:05:32
139.198.18.184 attackbots
2019-09-03T02:30:44.857718abusebot-7.cloudsearch.cf sshd\[24296\]: Invalid user hwang from 139.198.18.184 port 47874
2019-09-03 11:02:46
120.92.138.124 attack
Sep  3 00:59:53 markkoudstaal sshd[10844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.138.124
Sep  3 00:59:55 markkoudstaal sshd[10844]: Failed password for invalid user 08642` from 120.92.138.124 port 61506 ssh2
Sep  3 01:04:36 markkoudstaal sshd[11299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.138.124
2019-09-03 11:10:52
37.59.43.215 attackspambots
VoIP Brute Force - 37.59.43.215 - Auto Report
...
2019-09-03 10:46:11
91.134.141.89 attackspambots
Sep  3 04:56:54 SilenceServices sshd[17989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.141.89
Sep  3 04:56:56 SilenceServices sshd[17989]: Failed password for invalid user more from 91.134.141.89 port 39676 ssh2
Sep  3 05:00:35 SilenceServices sshd[19411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.141.89
2019-09-03 11:06:05
203.210.86.38 attack
Sep  3 04:42:07 dedicated sshd[4456]: Invalid user robert123 from 203.210.86.38 port 52201
2019-09-03 10:51:45
141.98.9.67 attackspambots
Sep  3 04:58:39 webserver postfix/smtpd\[13964\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 04:59:35 webserver postfix/smtpd\[13964\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 05:00:31 webserver postfix/smtpd\[13964\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 05:01:26 webserver postfix/smtpd\[13574\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 05:02:22 webserver postfix/smtpd\[13574\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-03 11:02:21
71.237.171.150 attack
Sep  3 02:15:08 MK-Soft-VM6 sshd\[1553\]: Invalid user dst from 71.237.171.150 port 45710
Sep  3 02:15:08 MK-Soft-VM6 sshd\[1553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.237.171.150
Sep  3 02:15:10 MK-Soft-VM6 sshd\[1553\]: Failed password for invalid user dst from 71.237.171.150 port 45710 ssh2
...
2019-09-03 11:14:03
105.208.56.49 attack
port scan and connect, tcp 80 (http)
2019-09-03 10:39:02
54.37.204.154 attackbots
Sep  3 05:16:08 www5 sshd\[13204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.204.154  user=root
Sep  3 05:16:10 www5 sshd\[13204\]: Failed password for root from 54.37.204.154 port 48302 ssh2
Sep  3 05:20:00 www5 sshd\[13539\]: Invalid user test from 54.37.204.154
Sep  3 05:20:00 www5 sshd\[13539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.204.154
...
2019-09-03 10:35:53
222.221.248.242 attack
Sep  3 01:04:35 cp sshd[25920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.221.248.242
2019-09-03 11:11:25
88.84.200.139 attack
Sep  2 19:57:22 aat-srv002 sshd[30063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139
Sep  2 19:57:25 aat-srv002 sshd[30063]: Failed password for invalid user programmer from 88.84.200.139 port 41746 ssh2
Sep  2 20:01:10 aat-srv002 sshd[30172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139
Sep  2 20:01:13 aat-srv002 sshd[30172]: Failed password for invalid user informix from 88.84.200.139 port 34435 ssh2
...
2019-09-03 10:31:21
186.137.123.202 attack
Sep  3 01:20:28 ip-172-31-62-245 sshd\[18988\]: Invalid user nicu from 186.137.123.202\
Sep  3 01:20:30 ip-172-31-62-245 sshd\[18988\]: Failed password for invalid user nicu from 186.137.123.202 port 51520 ssh2\
Sep  3 01:25:30 ip-172-31-62-245 sshd\[19002\]: Invalid user se from 186.137.123.202\
Sep  3 01:25:32 ip-172-31-62-245 sshd\[19002\]: Failed password for invalid user se from 186.137.123.202 port 41418 ssh2\
Sep  3 01:30:26 ip-172-31-62-245 sshd\[19006\]: Invalid user hugo from 186.137.123.202\
2019-09-03 10:32:33
209.97.166.179 attack
proto=tcp  .  spt=44735  .  dpt=25  .     (listed on Blocklist de  Sep 02)     (366)
2019-09-03 10:36:42
77.70.96.195 attackbots
Sep  3 05:29:26 www4 sshd\[61230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.70.96.195  user=www-data
Sep  3 05:29:28 www4 sshd\[61230\]: Failed password for www-data from 77.70.96.195 port 59916 ssh2
Sep  3 05:33:30 www4 sshd\[61705\]: Invalid user magasin from 77.70.96.195
...
2019-09-03 10:44:36

Recently Reported IPs

36.56.198.119 252.5.89.115 67.179.71.251 234.52.141.227
230.158.231.6 60.5.196.187 196.146.93.137 17.52.251.142
194.164.111.108 117.98.16.193 4.251.129.16 108.209.62.54
246.253.73.192 240.48.187.138 150.124.3.113 84.69.93.12
240.39.16.143 184.66.55.187 150.93.74.3 137.208.222.59