Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.127.55.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.127.55.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 13:38:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 82.55.127.141.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 141.127.55.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
150.109.183.94 attackbots
Unauthorized connection attempt detected from IP address 150.109.183.94 to port 789 [T]
2020-08-29 22:19:30
195.54.160.21 attackbotsspam
195.54.160.21 - - \[29/Aug/2020:15:26:15 +0200\] "GET /solr/admin/info/system\?wt=json HTTP/1.1" 403 436 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/78.0.3904.108 Safari/537.36"
195.54.160.21 - - \[29/Aug/2020:15:37:39 +0200\] "GET /\?XDEBUG_SESSION_START=phpstorm HTTP/1.1" 403 436 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/78.0.3904.108 Safari/537.36"
195.54.160.21 - - \[29/Aug/2020:15:49:53 +0200\] "GET /\?a=fetch\&content=\die\(@md5\(HelloThinkCMF\)\)\ HTTP/1.1" 403 436 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/78.0.3904.108 Safari/537.36"
...
2020-08-29 22:10:24
188.128.82.202 attack
Unauthorized connection attempt detected from IP address 188.128.82.202 to port 445 [T]
2020-08-29 22:38:52
172.105.89.161 attackspam
 TCP (SYN) 172.105.89.161:45550 -> port 161, len 44
2020-08-29 22:16:00
192.8.202.121 attackbots
Unauthorized connection attempt detected from IP address 192.8.202.121 to port 445 [T]
2020-08-29 22:36:24
103.75.188.126 attack
Unauthorized connection attempt detected from IP address 103.75.188.126 to port 25 [T]
2020-08-29 21:59:57
139.207.109.108 attackbotsspam
Unauthorized connection attempt detected from IP address 139.207.109.108 to port 445 [T]
2020-08-29 22:20:23
196.52.43.131 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-29 22:09:16
1.192.90.228 attackspam
Unauthorized connection attempt detected from IP address 1.192.90.228 to port 445 [T]
2020-08-29 22:06:49
49.204.77.2 attack
Unauthorized connection attempt detected from IP address 49.204.77.2 to port 445 [T]
2020-08-29 22:02:54
187.162.10.180 attack
Unauthorized connection attempt detected from IP address 187.162.10.180 to port 23 [T]
2020-08-29 22:13:54
42.113.110.124 attackbots
Unauthorized connection attempt detected from IP address 42.113.110.124 to port 81 [T]
2020-08-29 22:04:52
221.213.62.10 attack
Unauthorized connection attempt detected from IP address 221.213.62.10 to port 25 [T]
2020-08-29 22:07:39
188.166.78.16 attack
Port scan denied
2020-08-29 22:38:25
45.55.32.34 attack
Port scan denied
2020-08-29 22:03:53

Recently Reported IPs

29.21.124.48 25.148.202.72 26.225.235.44 94.230.237.153
197.78.180.70 168.209.55.20 209.99.95.31 87.91.242.15
230.176.20.21 158.102.59.187 250.163.25.61 61.119.144.140
234.140.26.79 155.86.138.96 226.152.212.42 173.198.32.203
59.66.84.10 103.8.68.229 84.32.144.250 138.84.75.179