Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.11.139.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.11.139.24.			IN	A

;; AUTHORITY SECTION:
.			237	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032102 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 22 17:58:16 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 24.139.11.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 24.139.11.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.43.117 attack
Feb 11 06:10:02 auw2 sshd\[19349\]: Invalid user qkn from 106.13.43.117
Feb 11 06:10:02 auw2 sshd\[19349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.43.117
Feb 11 06:10:04 auw2 sshd\[19349\]: Failed password for invalid user qkn from 106.13.43.117 port 46120 ssh2
Feb 11 06:14:55 auw2 sshd\[19751\]: Invalid user lwi from 106.13.43.117
Feb 11 06:14:55 auw2 sshd\[19751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.43.117
2020-02-12 01:03:28
94.29.126.9 attackbots
Unauthorized connection attempt from IP address 94.29.126.9 on Port 445(SMB)
2020-02-12 01:02:15
113.164.79.241 attackbots
1581428790 - 02/11/2020 14:46:30 Host: 113.164.79.241/113.164.79.241 Port: 445 TCP Blocked
2020-02-12 00:21:36
189.15.223.239 attackspambots
Automatic report - Port Scan Attack
2020-02-12 00:25:51
222.122.31.133 attackspambots
Feb 11 15:46:11 ncomp sshd[9829]: Invalid user gls from 222.122.31.133
Feb 11 15:46:11 ncomp sshd[9829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.122.31.133
Feb 11 15:46:11 ncomp sshd[9829]: Invalid user gls from 222.122.31.133
Feb 11 15:46:13 ncomp sshd[9829]: Failed password for invalid user gls from 222.122.31.133 port 36432 ssh2
2020-02-12 00:28:07
172.94.53.146 attackspambots
Automatic report - SSH Brute-Force Attack
2020-02-12 00:58:55
178.236.60.227 attack
Unauthorized connection attempt from IP address 178.236.60.227 on Port 445(SMB)
2020-02-12 00:54:32
5.135.158.228 attackbotsspam
Hacking
2020-02-12 01:02:34
92.118.93.248 attackbots
1581436102 - 02/11/2020 16:48:22 Host: 92.118.93.248/92.118.93.248 Port: 445 TCP Blocked
2020-02-12 00:35:03
182.73.47.154 attackbots
$f2bV_matches
2020-02-12 00:54:06
212.118.18.203 attackspambots
Unauthorized connection attempt from IP address 212.118.18.203 on Port 445(SMB)
2020-02-12 00:26:40
49.149.97.85 attackspambots
Unauthorized connection attempt from IP address 49.149.97.85 on Port 445(SMB)
2020-02-12 00:31:29
217.197.225.38 attack
Unauthorized connection attempt from IP address 217.197.225.38 on Port 445(SMB)
2020-02-12 00:22:04
189.19.231.208 attack
Unauthorized connection attempt from IP address 189.19.231.208 on Port 445(SMB)
2020-02-12 00:59:27
182.253.90.33 attackspam
Unauthorized connection attempt from IP address 182.253.90.33 on Port 445(SMB)
2020-02-12 00:23:46

Recently Reported IPs

5.196.130.241 103.20.198.250 228.97.134.132 7.18.30.171
18.148.148.82 229.124.113.4 92.29.235.201 192.1.212.218
89.143.173.42 182.109.246.82 113.138.8.99 46.176.131.19
169.238.64.168 12.104.216.161 73.5.243.117 107.145.144.22
54.103.27.15 46.237.210.76 56.70.3.32 135.107.127.241