Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.136.33.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.136.33.150.			IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:16:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 150.33.136.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.33.136.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.137.67.58 attackbotsspam
2020-05-11T13:07:03.893075shield sshd\[5037\]: Invalid user rodrigoal from 219.137.67.58 port 57370
2020-05-11T13:07:03.897844shield sshd\[5037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.137.67.58
2020-05-11T13:07:06.294388shield sshd\[5037\]: Failed password for invalid user rodrigoal from 219.137.67.58 port 57370 ssh2
2020-05-11T13:10:15.979236shield sshd\[6051\]: Invalid user man1 from 219.137.67.58 port 12778
2020-05-11T13:10:15.983563shield sshd\[6051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.137.67.58
2020-05-11 21:56:00
37.187.0.20 attack
May 11 12:40:12 IngegnereFirenze sshd[23816]: Failed password for invalid user ito from 37.187.0.20 port 54456 ssh2
...
2020-05-11 22:38:53
54.36.163.62 attackbotsspam
May 11 09:54:57 NPSTNNYC01T sshd[30539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.62
May 11 09:54:58 NPSTNNYC01T sshd[30539]: Failed password for invalid user ftpuser from 54.36.163.62 port 55640 ssh2
May 11 09:58:41 NPSTNNYC01T sshd[30948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.62
...
2020-05-11 22:15:26
165.227.80.114 attackspam
May 11 15:00:54 h2779839 sshd[14101]: Invalid user svn from 165.227.80.114 port 56680
May 11 15:00:54 h2779839 sshd[14101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.80.114
May 11 15:00:54 h2779839 sshd[14101]: Invalid user svn from 165.227.80.114 port 56680
May 11 15:00:56 h2779839 sshd[14101]: Failed password for invalid user svn from 165.227.80.114 port 56680 ssh2
May 11 15:04:09 h2779839 sshd[14173]: Invalid user qa from 165.227.80.114 port 58752
May 11 15:04:09 h2779839 sshd[14173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.80.114
May 11 15:04:09 h2779839 sshd[14173]: Invalid user qa from 165.227.80.114 port 58752
May 11 15:04:10 h2779839 sshd[14173]: Failed password for invalid user qa from 165.227.80.114 port 58752 ssh2
May 11 15:07:20 h2779839 sshd[14207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.80.114  user=mysql
Ma
...
2020-05-11 22:28:29
78.234.142.90 attackspambots
May 11 14:07:07 ncomp sshd[2017]: Invalid user pi from 78.234.142.90
May 11 14:07:07 ncomp sshd[2017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.234.142.90
May 11 14:07:07 ncomp sshd[2017]: Invalid user pi from 78.234.142.90
May 11 14:07:09 ncomp sshd[2017]: Failed password for invalid user pi from 78.234.142.90 port 38852 ssh2
2020-05-11 22:43:49
128.199.82.232 attackbots
May 11 15:31:23 [host] sshd[1317]: pam_unix(sshd:a
May 11 15:31:25 [host] sshd[1317]: Failed password
May 11 15:35:18 [host] sshd[1482]: Invalid user st
2020-05-11 22:02:39
106.13.237.21 attack
Lines containing failures of 106.13.237.21
May 11 02:00:23 viking sshd[5138]: Invalid user talhostnamea from 106.13.237.21 port 39934
May 11 02:00:23 viking sshd[5138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.237.21 
May 11 02:00:25 viking sshd[5138]: Failed password for invalid user talhostnamea from 106.13.237.21 port 39934 ssh2
May 11 02:00:26 viking sshd[5138]: Received disconnect from 106.13.237.21 port 39934:11: Bye Bye [preauth]
May 11 02:00:26 viking sshd[5138]: Disconnected from invalid user talhostnamea 106.13.237.21 port 39934 [preauth]
May 11 02:17:13 viking sshd[14810]: Invalid user artur from 106.13.237.21 port 38230
May 11 02:17:13 viking sshd[14810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.237.21 
May 11 02:17:16 viking sshd[14810]: Failed password for invalid user artur from 106.13.237.21 port 38230 ssh2
May 11 02:17:18 viking sshd[14810]: Receiv........
------------------------------
2020-05-11 21:53:37
102.133.162.234 attack
2020-05-11T14:01:21.209769v22018076590370373 sshd[30273]: Invalid user pacific from 102.133.162.234 port 54190
2020-05-11T14:01:21.215970v22018076590370373 sshd[30273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.133.162.234
2020-05-11T14:01:21.209769v22018076590370373 sshd[30273]: Invalid user pacific from 102.133.162.234 port 54190
2020-05-11T14:01:23.110900v22018076590370373 sshd[30273]: Failed password for invalid user pacific from 102.133.162.234 port 54190 ssh2
2020-05-11T14:07:51.717571v22018076590370373 sshd[22840]: Invalid user sys from 102.133.162.234 port 46428
...
2020-05-11 22:00:32
179.124.34.8 attackbotsspam
May 11 10:55:04 dns1 sshd[30419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.8 
May 11 10:55:05 dns1 sshd[30419]: Failed password for invalid user aide from 179.124.34.8 port 38203 ssh2
May 11 11:02:14 dns1 sshd[30771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.8
2020-05-11 22:08:15
152.136.198.76 attackbots
May 11 16:08:20 pornomens sshd\[8986\]: Invalid user felicia from 152.136.198.76 port 49488
May 11 16:08:20 pornomens sshd\[8986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.198.76
May 11 16:08:22 pornomens sshd\[8986\]: Failed password for invalid user felicia from 152.136.198.76 port 49488 ssh2
...
2020-05-11 22:44:57
115.31.172.51 attackbots
May 11 09:06:19 firewall sshd[9139]: Invalid user user from 115.31.172.51
May 11 09:06:21 firewall sshd[9139]: Failed password for invalid user user from 115.31.172.51 port 48819 ssh2
May 11 09:07:46 firewall sshd[9161]: Invalid user user from 115.31.172.51
...
2020-05-11 22:06:57
45.5.0.7 attack
May 11 15:34:53 h2646465 sshd[26813]: Invalid user jenkins from 45.5.0.7
May 11 15:34:53 h2646465 sshd[26813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.5.0.7
May 11 15:34:53 h2646465 sshd[26813]: Invalid user jenkins from 45.5.0.7
May 11 15:34:56 h2646465 sshd[26813]: Failed password for invalid user jenkins from 45.5.0.7 port 39859 ssh2
May 11 15:47:14 h2646465 sshd[28732]: Invalid user viktor from 45.5.0.7
May 11 15:47:14 h2646465 sshd[28732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.5.0.7
May 11 15:47:14 h2646465 sshd[28732]: Invalid user viktor from 45.5.0.7
May 11 15:47:15 h2646465 sshd[28732]: Failed password for invalid user viktor from 45.5.0.7 port 56358 ssh2
May 11 15:50:52 h2646465 sshd[29330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.5.0.7  user=root
May 11 15:50:54 h2646465 sshd[29330]: Failed password for root from 45.5.0.7 port 53416 ssh2
...
2020-05-11 22:37:15
42.113.220.125 attackbotsspam
Unauthorized connection attempt from IP address 42.113.220.125 on Port 445(SMB)
2020-05-11 22:16:04
218.92.0.158 attackspam
2020-05-11T14:22:02.866673abusebot-2.cloudsearch.cf sshd[6321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
2020-05-11T14:22:04.896546abusebot-2.cloudsearch.cf sshd[6321]: Failed password for root from 218.92.0.158 port 15322 ssh2
2020-05-11T14:22:08.749012abusebot-2.cloudsearch.cf sshd[6321]: Failed password for root from 218.92.0.158 port 15322 ssh2
2020-05-11T14:22:02.866673abusebot-2.cloudsearch.cf sshd[6321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
2020-05-11T14:22:04.896546abusebot-2.cloudsearch.cf sshd[6321]: Failed password for root from 218.92.0.158 port 15322 ssh2
2020-05-11T14:22:08.749012abusebot-2.cloudsearch.cf sshd[6321]: Failed password for root from 218.92.0.158 port 15322 ssh2
2020-05-11T14:22:02.866673abusebot-2.cloudsearch.cf sshd[6321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.
...
2020-05-11 22:22:59
168.196.40.12 attackbotsspam
Lines containing failures of 168.196.40.12
May 11 00:01:07 jarvis sshd[9616]: Invalid user user from 168.196.40.12 port 43434
May 11 00:01:07 jarvis sshd[9616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.40.12 
May 11 00:01:08 jarvis sshd[9616]: Failed password for invalid user user from 168.196.40.12 port 43434 ssh2
May 11 00:01:10 jarvis sshd[9616]: Received disconnect from 168.196.40.12 port 43434:11: Bye Bye [preauth]
May 11 00:01:10 jarvis sshd[9616]: Disconnected from invalid user user 168.196.40.12 port 43434 [preauth]
May 11 00:07:07 jarvis sshd[10369]: Invalid user usuario from 168.196.40.12 port 60674
May 11 00:07:07 jarvis sshd[10369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.40.12 
May 11 00:07:08 jarvis sshd[10369]: Failed password for invalid user usuario from 168.196.40.12 port 60674 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1
2020-05-11 22:08:35

Recently Reported IPs

141.136.33.160 141.136.33.169 141.136.33.161 141.136.33.181
141.136.33.182 141.136.33.187 141.136.33.20 141.136.33.203
141.136.33.238 141.136.33.27 141.136.33.32 141.136.33.248
141.136.33.57 141.136.33.64 141.136.33.59 141.136.33.79
141.136.33.85 141.136.33.99 141.136.35.162 141.136.34.35