Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Vodacom

Hostname: unknown

Organization: VODACOM

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.2.55.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61586
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.2.55.169.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 15 02:05:41 CST 2019
;; MSG SIZE  rcvd: 115
Host info
169.55.2.41.in-addr.arpa domain name pointer vc-cpt-41-2-55-169.umts.vodacom.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
169.55.2.41.in-addr.arpa	name = vc-cpt-41-2-55-169.umts.vodacom.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
5.128.29.155 attackspam
SP-Scan 57364:445 detected 2020.09.08 06:52:49
blocked until 2020.10.27 22:55:36
2020-09-09 17:15:13
58.23.137.154 attack
Helo
2020-09-09 17:25:16
120.203.160.18 attackspam
Sep  9 02:19:03 dhoomketu sshd[2963082]: Failed password for invalid user tortoisesvn from 120.203.160.18 port 45357 ssh2
Sep  9 02:23:08 dhoomketu sshd[2963142]: Invalid user sysadm from 120.203.160.18 port 17544
Sep  9 02:23:08 dhoomketu sshd[2963142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.203.160.18 
Sep  9 02:23:08 dhoomketu sshd[2963142]: Invalid user sysadm from 120.203.160.18 port 17544
Sep  9 02:23:11 dhoomketu sshd[2963142]: Failed password for invalid user sysadm from 120.203.160.18 port 17544 ssh2
...
2020-09-09 17:25:31
72.223.168.76 attackspam
7 Login Attempts
2020-09-09 17:32:55
138.68.236.50 attack
Sep  9 11:38:51 fhem-rasp sshd[8413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.236.50  user=root
Sep  9 11:38:53 fhem-rasp sshd[8413]: Failed password for root from 138.68.236.50 port 55734 ssh2
...
2020-09-09 17:46:57
116.109.181.210 attackbotsspam
20/9/8@12:51:29: FAIL: Alarm-Network address from=116.109.181.210
...
2020-09-09 17:46:09
176.107.182.236 attack
0,30-03/28 [bc01/m33] PostRequest-Spammer scoring: maputo01_x2b
2020-09-09 17:45:37
222.186.175.217 attackspam
Sep  9 14:29:36 gw1 sshd[24987]: Failed password for root from 222.186.175.217 port 3440 ssh2
Sep  9 14:29:40 gw1 sshd[24987]: Failed password for root from 222.186.175.217 port 3440 ssh2
...
2020-09-09 17:33:32
171.236.71.110 attackspambots
[portscan] Port scan
2020-09-09 17:18:49
197.248.16.118 attack
Failed password for root from 197.248.16.118 port 41696 ssh2
Failed password for root from 197.248.16.118 port 41624 ssh2
2020-09-09 17:11:33
95.46.140.49 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-09-09 17:17:27
192.241.223.132 attack
Port scan denied
2020-09-09 17:22:42
13.69.102.8 attack
Attempted Brute Force (dovecot)
2020-09-09 17:20:24
222.186.180.147 attackbotsspam
Sep  9 11:32:06 eventyay sshd[21091]: Failed password for root from 222.186.180.147 port 48138 ssh2
Sep  9 11:32:18 eventyay sshd[21091]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 48138 ssh2 [preauth]
Sep  9 11:32:24 eventyay sshd[21094]: Failed password for root from 222.186.180.147 port 44820 ssh2
...
2020-09-09 17:35:23
132.232.112.96 attackspambots
Sep  9 01:26:53 moo sshd[19236]: Failed password for r.r from 132.232.112.96 port 34498 ssh2
Sep  9 01:42:00 moo sshd[20006]: Failed password for invalid user em3 from 132.232.112.96 port 38522 ssh2
Sep  9 01:46:59 moo sshd[20478]: Failed password for invalid user fm from 132.232.112.96 port 57998 ssh2
Sep  9 02:00:48 moo sshd[21166]: Failed password for r.r from 132.232.112.96 port 59966 ssh2
Sep  9 02:05:13 moo sshd[21386]: Failed password for invalid user fffff from 132.232.112.96 port 51202 ssh2
Sep  9 02:18:36 moo sshd[22142]: Failed password for r.r from 132.232.112.96 port 53166 ssh2
Sep  9 02:23:06 moo sshd[22340]: Failed password for invalid user lotto from 132.232.112.96 port 44402 ssh2
Sep  9 02:36:21 moo sshd[22933]: Failed password for r.r from 132.232.112.96 port 46358 ssh2
Sep  9 02:40:55 moo sshd[23212]: Failed password for r.r from 132.232.112.96 port 37594 ssh2
Sep  9 02:45:29 moo sshd[23421]: Failed password for r.r from 132.232.112.96 port 57062 ssh2
........
------------------------------
2020-09-09 17:37:58

Recently Reported IPs

14.60.149.197 86.68.235.213 184.151.253.223 148.166.204.49
44.85.174.204 162.40.118.120 106.186.186.192 2a01:4f8:190:5004::2
187.74.26.114 222.218.220.247 132.118.218.138 165.22.83.11
177.227.69.36 87.67.201.6 81.107.243.20 207.46.13.77
44.196.53.162 113.186.212.255 194.147.35.51 31.234.108.161