Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lephalale

Region: Limpopo

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.57.142.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.57.142.129.			IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091802 1800 900 604800 86400

;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 19 09:47:51 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 129.142.57.41.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 129.142.57.41.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
49.235.153.54 attackspambots
Brute force attempt
2020-07-21 07:09:11
138.255.213.77 attackbotsspam
Automatic report - Banned IP Access
2020-07-21 07:28:28
35.200.206.240 attackspambots
Jul 21 00:48:07 sip sshd[1022569]: Invalid user aga from 35.200.206.240 port 38390
Jul 21 00:48:10 sip sshd[1022569]: Failed password for invalid user aga from 35.200.206.240 port 38390 ssh2
Jul 21 00:52:30 sip sshd[1022593]: Invalid user js from 35.200.206.240 port 43154
...
2020-07-21 07:17:44
222.186.173.142 attackbots
2020-07-20T23:13:16.645182server.espacesoutien.com sshd[10967]: Failed password for root from 222.186.173.142 port 23948 ssh2
2020-07-20T23:13:19.901440server.espacesoutien.com sshd[10967]: Failed password for root from 222.186.173.142 port 23948 ssh2
2020-07-20T23:13:23.374438server.espacesoutien.com sshd[10967]: Failed password for root from 222.186.173.142 port 23948 ssh2
2020-07-20T23:13:26.580227server.espacesoutien.com sshd[10967]: Failed password for root from 222.186.173.142 port 23948 ssh2
...
2020-07-21 07:14:44
138.197.89.212 attack
Jul 20 22:42:04 pornomens sshd\[7316\]: Invalid user andrew from 138.197.89.212 port 49944
Jul 20 22:42:04 pornomens sshd\[7316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
Jul 20 22:42:06 pornomens sshd\[7316\]: Failed password for invalid user andrew from 138.197.89.212 port 49944 ssh2
...
2020-07-21 07:12:43
202.72.245.124 attack
Unauthorized connection attempt from IP address 202.72.245.124 on Port 445(SMB)
2020-07-21 07:22:37
36.250.229.115 attack
Jul 21 00:43:17 sso sshd[6684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.250.229.115
Jul 21 00:43:18 sso sshd[6684]: Failed password for invalid user kdj from 36.250.229.115 port 39632 ssh2
...
2020-07-21 07:10:38
182.61.175.219 attackspambots
2020-07-21T01:02:45.660661n23.at sshd[1493344]: Invalid user ming from 182.61.175.219 port 57724
2020-07-21T01:02:47.883046n23.at sshd[1493344]: Failed password for invalid user ming from 182.61.175.219 port 57724 ssh2
2020-07-21T01:08:09.808108n23.at sshd[1497578]: Invalid user jgu from 182.61.175.219 port 45998
...
2020-07-21 07:08:21
218.92.0.216 attackspam
Jul 21 01:04:55 vps sshd[755427]: Failed password for root from 218.92.0.216 port 36202 ssh2
Jul 21 01:04:58 vps sshd[755427]: Failed password for root from 218.92.0.216 port 36202 ssh2
Jul 21 01:05:10 vps sshd[760775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.216  user=root
Jul 21 01:05:12 vps sshd[760775]: Failed password for root from 218.92.0.216 port 52871 ssh2
Jul 21 01:05:15 vps sshd[760775]: Failed password for root from 218.92.0.216 port 52871 ssh2
...
2020-07-21 07:07:23
193.122.163.81 attack
Jul 21 00:49:04 vpn01 sshd[15040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.163.81
Jul 21 00:49:05 vpn01 sshd[15040]: Failed password for invalid user moritz from 193.122.163.81 port 38106 ssh2
...
2020-07-21 07:28:56
20.41.80.226 attack
1131. On Jul 20 2020 experienced a Brute Force SSH login attempt -> 3 unique times by 20.41.80.226.
2020-07-21 06:58:54
37.193.123.110 attack
Jul 20 22:42:12 debian-2gb-nbg1-2 kernel: \[17536271.048859\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.193.123.110 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=8631 PROTO=TCP SPT=25973 DPT=23 WINDOW=21629 RES=0x00 SYN URGP=0
2020-07-21 07:06:39
184.168.46.186 attackbots
C2,WP GET /oldsite/wp-includes/wlwmanifest.xml
2020-07-21 07:22:56
194.61.24.177 attackbots
1064. On Jul 20 2020 experienced a Brute Force SSH login attempt -> 2228 unique times by 194.61.24.177.
2020-07-21 07:27:05
49.234.16.16 attackbots
Invalid user admin from 49.234.16.16 port 52384
2020-07-21 06:58:26

Recently Reported IPs

94.96.54.189 162.170.205.185 90.91.32.19 90.45.146.141
60.148.35.96 128.249.45.228 183.169.119.17 183.15.141.244
185.105.244.184 69.141.116.36 202.166.153.10 76.234.123.153
117.198.243.239 163.188.48.168 67.230.79.28 85.198.66.252
74.57.70.47 64.123.199.71 84.37.148.195 126.58.12.190