Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.138.140.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.138.140.149.		IN	A

;; AUTHORITY SECTION:
.			501	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:26:28 CST 2022
;; MSG SIZE  rcvd: 108
Host info
149.140.138.141.in-addr.arpa domain name pointer 141-138-140-149.colo.transip.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.140.138.141.in-addr.arpa	name = 141-138-140-149.colo.transip.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.149.126.97 attack
Attempted connection to port 84.
2020-06-15 02:32:51
204.111.241.83 attackspambots
SSHD unauthorised connection attempt (a)
2020-06-15 02:32:19
77.42.74.243 attackspam
Automatic report - Port Scan Attack
2020-06-15 02:07:05
177.84.143.208 attackspambots
Unauthorized connection attempt detected from IP address 177.84.143.208 to port 445
2020-06-15 02:19:25
41.185.73.242 attackspam
Jun 14 12:39:27 124388 sshd[27909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.73.242  user=root
Jun 14 12:39:30 124388 sshd[27909]: Failed password for root from 41.185.73.242 port 50722 ssh2
Jun 14 12:42:39 124388 sshd[27975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.73.242  user=root
Jun 14 12:42:41 124388 sshd[27975]: Failed password for root from 41.185.73.242 port 41642 ssh2
Jun 14 12:45:59 124388 sshd[28001]: Invalid user ftpuser from 41.185.73.242 port 60790
2020-06-15 01:51:05
178.170.219.47 attackbots
Attempted connection to port 8080.
2020-06-15 02:33:09
85.15.66.167 attack
Unauthorized connection attempt from IP address 85.15.66.167 on Port 445(SMB)
2020-06-15 01:52:32
73.41.104.30 attackspam
Jun 15 03:52:30 localhost sshd[3077847]: Connection closed by 73.41.104.30 port 34032 [preauth]
...
2020-06-15 01:56:52
106.12.202.180 attack
Jun 14 11:35:23 vps46666688 sshd[19760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.180
Jun 14 11:35:24 vps46666688 sshd[19760]: Failed password for invalid user rf from 106.12.202.180 port 32227 ssh2
...
2020-06-15 02:18:33
49.234.227.137 attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-15 01:53:33
45.136.110.227 attackspam
TCP scanned
2020-06-15 02:24:50
93.157.144.48 attack
Unauthorized connection attempt from IP address 93.157.144.48 on Port 445(SMB)
2020-06-15 02:23:45
114.67.110.143 attackbotsspam
" "
2020-06-15 02:12:14
139.59.18.197 attack
2020-06-14T07:24:28.313328linuxbox-skyline sshd[378376]: Invalid user torus from 139.59.18.197 port 37618
...
2020-06-15 02:13:24
95.180.254.60 attackbots
Attempted connection to port 8000.
2020-06-15 02:22:53

Recently Reported IPs

141.138.140.15 141.138.140.153 141.138.140.232 141.138.140.54
118.96.179.130 141.138.141.139 141.138.141.249 141.138.140.96
141.138.141.187 141.138.141.197 141.138.142.167 141.138.142.151
141.138.142.182 141.138.142.94 141.138.159.75 141.138.143.62
141.138.142.5 118.96.179.218 118.96.179.234 118.96.201.153