Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Bull HN Information Systems Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.112.204.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39180
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.112.204.214.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun May 05 19:21:07 +08 2019
;; MSG SIZE  rcvd: 119

Host info
Host 214.204.112.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 214.204.112.141.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
139.59.10.186 attackspambots
k+ssh-bruteforce
2020-04-19 05:37:09
114.204.218.154 attackspam
Apr 18 20:17:53 vlre-nyc-1 sshd\[1352\]: Invalid user eh from 114.204.218.154
Apr 18 20:17:53 vlre-nyc-1 sshd\[1352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.218.154
Apr 18 20:17:55 vlre-nyc-1 sshd\[1352\]: Failed password for invalid user eh from 114.204.218.154 port 41427 ssh2
Apr 18 20:20:09 vlre-nyc-1 sshd\[1461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.218.154  user=root
Apr 18 20:20:12 vlre-nyc-1 sshd\[1461\]: Failed password for root from 114.204.218.154 port 59528 ssh2
...
2020-04-19 05:34:33
83.12.171.68 attack
SSH Invalid Login
2020-04-19 05:55:12
208.91.109.90 attackbots
Brute force scanner
2020-04-19 05:49:25
181.129.14.218 attackspambots
SSH Invalid Login
2020-04-19 05:50:34
120.70.98.195 attack
Invalid user oracle from 120.70.98.195 port 36064
2020-04-19 06:06:05
106.13.82.151 attack
SSH Invalid Login
2020-04-19 05:51:40
185.156.73.49 attackbotsspam
Apr 18 23:45:26 debian-2gb-nbg1-2 kernel: \[9505296.088223\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.49 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=51809 PROTO=TCP SPT=47666 DPT=103 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-19 05:47:19
223.240.118.5 attack
Apr 18 22:19:53 nextcloud sshd\[24933\]: Invalid user test from 223.240.118.5
Apr 18 22:19:53 nextcloud sshd\[24933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.118.5
Apr 18 22:19:55 nextcloud sshd\[24933\]: Failed password for invalid user test from 223.240.118.5 port 42126 ssh2
2020-04-19 06:02:34
185.176.27.14 attack
04/18/2020-17:14:10.594958 185.176.27.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-19 05:32:19
45.40.217.136 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-04-19 05:52:32
220.134.23.150 attackbots
1587241205 - 04/18/2020 22:20:05 Host: 220.134.23.150/220.134.23.150 Port: 445 TCP Blocked
2020-04-19 05:45:31
176.107.133.108 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-19 06:03:19
185.153.198.240 attackspambots
Port Scan: Events[1] countPorts[1]: 34004 ..
2020-04-19 06:00:30
124.128.158.35 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-19 06:00:54

Recently Reported IPs

132.150.52.33 112.120.48.33 5.188.86.170 195.67.21.47
209.182.213.119 188.188.141.95 115.87.239.39 111.35.168.115
138.41.59.234 80.119.71.173 176.115.14.79 49.128.82.182
110.134.225.5 141.239.167.98 220.163.228.84 81.171.81.207
221.126.114.231 105.156.122.134 215.116.36.221 223.111.182.42