Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.137.45.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.137.45.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 20:20:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 219.45.137.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.45.137.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.133.9.21 attackbots
Honeypot Attack, Port 23
2020-03-26 09:22:02
178.46.163.191 attackspambots
Invalid user jpnshi from 178.46.163.191 port 43688
2020-03-26 09:33:25
152.44.45.47 attack
-
2020-03-26 09:18:14
90.108.193.14 attack
Invalid user zhaoshaojing from 90.108.193.14 port 42500
2020-03-26 09:38:41
209.18.47.62 attackbots
Port scan
2020-03-26 09:37:00
118.89.160.141 attack
Mar 26 01:31:18 * sshd[27547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.160.141
Mar 26 01:31:20 * sshd[27547]: Failed password for invalid user sid from 118.89.160.141 port 35374 ssh2
2020-03-26 09:17:01
203.147.77.177 attack
B: Magento admin pass test (wrong country)
2020-03-26 09:31:35
177.43.251.153 attackbots
B: Abusive content scan (200)
2020-03-26 09:32:19
110.43.208.244 attack
Automatic report - Port Scan
2020-03-26 09:52:01
83.212.127.74 attack
Fail2Ban Ban Triggered (2)
2020-03-26 09:43:44
111.206.164.161 attackspam
firewall-block, port(s): 1433/tcp
2020-03-26 09:50:45
134.209.185.131 attack
Mar 25 22:14:51 firewall sshd[13417]: Invalid user uploader from 134.209.185.131
Mar 25 22:14:54 firewall sshd[13417]: Failed password for invalid user uploader from 134.209.185.131 port 48880 ssh2
Mar 25 22:21:08 firewall sshd[13764]: Invalid user admin from 134.209.185.131
...
2020-03-26 09:42:33
111.9.56.34 attackbots
Mar 26 00:07:05 serwer sshd\[14474\]: Invalid user qd from 111.9.56.34 port 54517
Mar 26 00:07:05 serwer sshd\[14474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.9.56.34
Mar 26 00:07:07 serwer sshd\[14474\]: Failed password for invalid user qd from 111.9.56.34 port 54517 ssh2
...
2020-03-26 09:15:52
51.252.87.129 attack
Brute force VPN server
2020-03-26 09:36:27
14.183.3.172 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-03-2020 21:40:11.
2020-03-26 09:45:06

Recently Reported IPs

219.212.235.161 63.29.222.114 143.35.100.70 52.142.128.229
72.145.89.115 241.161.193.142 63.12.56.241 225.203.185.55
217.68.34.250 62.96.119.70 95.43.50.245 172.5.88.251
213.144.229.54 29.219.59.225 219.94.210.150 118.140.204.237
198.93.183.166 76.171.67.101 110.41.239.59 240.157.157.40