Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Leavenworth

Region: Kansas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.107.158.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.107.158.144.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 01:44:02 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 144.158.107.141.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 141.107.158.144.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
139.59.77.237 attackspam
Jan  8 01:54:21 firewall sshd[26531]: Invalid user shclient from 139.59.77.237
Jan  8 01:54:22 firewall sshd[26531]: Failed password for invalid user shclient from 139.59.77.237 port 57237 ssh2
Jan  8 01:57:59 firewall sshd[26574]: Invalid user bqj from 139.59.77.237
...
2020-01-08 13:01:10
36.89.250.115 attack
Unauthorized connection attempt from IP address 36.89.250.115 on Port 445(SMB)
2020-01-08 09:03:54
132.232.52.86 attackspam
SSH-BruteForce
2020-01-08 09:01:06
200.93.74.221 attack
1578433537 - 01/07/2020 22:45:37 Host: 200.93.74.221/200.93.74.221 Port: 445 TCP Blocked
2020-01-08 09:10:13
45.121.163.21 spambotsattackproxynormal
dsd
2020-01-08 11:57:45
27.55.72.129 attackspambots
$f2bV_matches
2020-01-08 08:58:59
84.17.53.19 attackspam
0,12-01/05 [bc01/m10] PostRequest-Spammer scoring: essen
2020-01-08 08:53:54
120.92.33.13 attack
Jan  8 00:04:46 legacy sshd[5897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.33.13
Jan  8 00:04:48 legacy sshd[5897]: Failed password for invalid user backups from 120.92.33.13 port 23202 ssh2
Jan  8 00:08:12 legacy sshd[6087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.33.13
...
2020-01-08 09:12:30
185.175.93.103 attack
Scanning random ports - tries to find possible vulnerable services
2020-01-08 09:15:44
40.101.84.2 attack
DoS attack: ACK Scan
2020-01-08 09:13:27
118.70.177.32 attack
Unauthorized connection attempt from IP address 118.70.177.32 on Port 445(SMB)
2020-01-08 08:51:10
116.105.71.192 attackbots
Unauthorized connection attempt from IP address 116.105.71.192 on Port 445(SMB)
2020-01-08 08:52:23
35.223.236.180 attackbotsspam
WordPress brute force
2020-01-08 09:29:11
164.163.2.180 attack
Unauthorized connection attempt from IP address 164.163.2.180 on Port 445(SMB)
2020-01-08 09:08:13
192.99.245.190 attackspambots
Jan  7 03:17:26 XXX sshd[31760]: Invalid user hvo from 192.99.245.190 port 39262
2020-01-08 08:57:45

Recently Reported IPs

141.13.210.209 15.8.229.98 14.233.52.219 14.91.193.76
14.26.18.12 138.163.24.183 135.225.243.246 135.34.144.170
133.46.213.170 135.160.15.201 135.136.8.47 137.32.60.28
132.46.133.233 13.132.180.134 131.18.19.60 131.223.244.129
127.86.143.228 127.92.120.174 124.52.204.74 126.194.154.21