Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.139.18.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.139.18.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:12:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.18.139.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.18.139.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.219.36.147 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 41 - Mon Apr  9 19:40:16 2018
2020-03-09 04:52:22
27.76.240.32 attack
20/3/8@09:14:56: FAIL: Alarm-Network address from=27.76.240.32
20/3/8@09:14:56: FAIL: Alarm-Network address from=27.76.240.32
...
2020-03-09 04:54:59
121.33.114.199 attackspam
Brute force blocker - service: proftpd1 - aantal: 147 - Tue Apr 10 11:00:16 2018
2020-03-09 04:39:04
92.118.37.74 attackspam
Mar  8 21:42:33 debian-2gb-nbg1-2 kernel: \[5959307.993628\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=8055 PROTO=TCP SPT=58558 DPT=17115 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-09 04:45:40
14.204.136.125 attackbots
Mar  8 10:47:00 tuxlinux sshd[30525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.136.125  user=root
Mar  8 10:47:02 tuxlinux sshd[30525]: Failed password for root from 14.204.136.125 port 48476 ssh2
Mar  8 10:47:00 tuxlinux sshd[30525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.136.125  user=root
Mar  8 10:47:02 tuxlinux sshd[30525]: Failed password for root from 14.204.136.125 port 48476 ssh2
Mar  8 21:33:49 tuxlinux sshd[42050]: Invalid user service from 14.204.136.125 port 3255
Mar  8 21:33:49 tuxlinux sshd[42050]: Invalid user service from 14.204.136.125 port 3255
Mar  8 21:33:49 tuxlinux sshd[42050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.136.125 
...
2020-03-09 04:53:07
124.205.214.162 attackbots
Brute force blocker - service: proftpd1 - aantal: 148 - Wed Apr 11 05:45:15 2018
2020-03-09 04:37:07
112.118.126.244 attackbots
Honeypot attack, port: 5555, PTR: n112118126244.netvigator.com.
2020-03-09 04:44:24
221.226.43.62 attack
Mar  8 15:55:57 MainVPS sshd[9568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.43.62  user=root
Mar  8 15:55:58 MainVPS sshd[9568]: Failed password for root from 221.226.43.62 port 41785 ssh2
Mar  8 16:04:59 MainVPS sshd[27106]: Invalid user wangq from 221.226.43.62 port 33828
Mar  8 16:04:59 MainVPS sshd[27106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.43.62
Mar  8 16:04:59 MainVPS sshd[27106]: Invalid user wangq from 221.226.43.62 port 33828
Mar  8 16:05:01 MainVPS sshd[27106]: Failed password for invalid user wangq from 221.226.43.62 port 33828 ssh2
...
2020-03-09 04:34:51
117.158.82.21 attackbots
Brute force blocker - service: proftpd1, proftpd2 - aantal: 111 - Mon Apr  9 09:25:15 2018
2020-03-09 04:54:34
212.109.4.125 attackspam
Mar  7 22:16:02 ms-srv sshd[37010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.109.4.125  user=sshd
Mar  7 22:16:04 ms-srv sshd[37010]: Failed password for invalid user sshd from 212.109.4.125 port 32952 ssh2
2020-03-09 04:35:18
123.235.200.197 attackspambots
Brute force blocker - service: proftpd1 - aantal: 33 - Mon Apr  9 23:30:14 2018
2020-03-09 04:50:32
177.152.124.21 attackspam
Mar  8 16:45:44 ns41 sshd[6916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.21
2020-03-09 04:32:48
164.132.73.5 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-09 04:35:58
60.220.198.22 attack
Brute force blocker - service: proftpd1, proftpd2 - aantal: 73 - Sun Apr  8 11:50:14 2018
2020-03-09 05:00:18
212.64.10.105 attackspam
Mar  8 15:52:36 ns382633 sshd\[5634\]: Invalid user stephen from 212.64.10.105 port 45480
Mar  8 15:52:36 ns382633 sshd\[5634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.10.105
Mar  8 15:52:38 ns382633 sshd\[5634\]: Failed password for invalid user stephen from 212.64.10.105 port 45480 ssh2
Mar  8 16:08:50 ns382633 sshd\[8321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.10.105  user=root
Mar  8 16:08:52 ns382633 sshd\[8321\]: Failed password for root from 212.64.10.105 port 39510 ssh2
2020-03-09 04:53:22

Recently Reported IPs

200.43.219.175 87.181.91.86 8.216.22.43 137.119.62.245
71.90.71.129 84.141.74.74 35.193.146.14 240.64.86.75
74.213.134.255 51.219.2.131 103.148.234.108 126.158.26.238
13.24.244.235 115.145.125.76 215.218.69.124 37.103.144.134
209.54.94.202 180.3.219.254 66.53.230.27 241.17.150.131