Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.148.72.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.148.72.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 00:50:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 117.72.148.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 117.72.148.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.164.119.104 attackbots
Attempts against non-existent wp-login
2020-06-02 07:50:37
180.76.147.105 attackspambots
Jun  1 17:38:22 Host-KLAX-C sshd[22659]: Disconnected from invalid user root 180.76.147.105 port 34334 [preauth]
...
2020-06-02 07:42:09
106.12.106.232 attack
SASL PLAIN auth failed: ruser=...
2020-06-02 07:31:36
58.186.51.122 attack
1,44-02/03 [bc01/m06] PostRequest-Spammer scoring: harare01_holz
2020-06-02 07:37:46
68.46.52.46 attackspam
Brute forcing email accounts
2020-06-02 07:54:11
185.176.27.210 attackbots
06/01/2020-18:32:51.549823 185.176.27.210 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-02 07:51:14
113.247.138.52 attackspam
prod6
...
2020-06-02 07:53:14
37.252.190.224 attack
2020-06-02T00:16:33.198810+02:00  sshd[3101]: Failed password for root from 37.252.190.224 port 58454 ssh2
2020-06-02 07:35:11
167.172.181.41 attack
Automatic report - XMLRPC Attack
2020-06-02 07:38:54
119.29.187.218 attack
2020-06-02T01:13:00.125204v22018076590370373 sshd[6647]: Failed password for root from 119.29.187.218 port 43134 ssh2
2020-06-02T01:15:58.628923v22018076590370373 sshd[2503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.187.218  user=root
2020-06-02T01:16:00.162000v22018076590370373 sshd[2503]: Failed password for root from 119.29.187.218 port 34808 ssh2
2020-06-02T01:18:45.894555v22018076590370373 sshd[18644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.187.218  user=root
2020-06-02T01:18:48.357977v22018076590370373 sshd[18644]: Failed password for root from 119.29.187.218 port 54707 ssh2
...
2020-06-02 07:56:35
59.188.12.165 attackspam
Unauthorized connection attempt from IP address 59.188.12.165 on Port 445(SMB)
2020-06-02 08:00:00
159.65.149.139 attackbotsspam
Jun  2 01:49:45 xeon sshd[11894]: Failed password for root from 159.65.149.139 port 58708 ssh2
2020-06-02 08:05:45
114.84.147.141 attackbots
Unauthorized connection attempt from IP address 114.84.147.141 on Port 445(SMB)
2020-06-02 08:06:01
106.243.2.244 attackspam
k+ssh-bruteforce
2020-06-02 07:31:11
186.7.102.227 attackbotsspam
Unauthorized connection attempt from IP address 186.7.102.227 on Port 445(SMB)
2020-06-02 07:52:12

Recently Reported IPs

255.132.153.207 175.206.175.13 151.58.223.21 89.116.120.189
243.133.73.0 210.55.0.206 76.153.22.212 209.21.230.55
136.152.76.186 130.64.224.118 158.108.105.179 137.169.136.170
190.211.184.195 202.100.54.110 189.170.250.126 130.217.33.181
25.94.130.184 50.182.36.211 166.207.38.219 254.88.154.143