Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: MCI Communications Services, Inc. d/b/a Verizon Business

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.149.112.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41255
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.149.112.121.		IN	A

;; AUTHORITY SECTION:
.			3464	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019063000 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 30 15:09:29 CST 2019
;; MSG SIZE  rcvd: 119
Host info
121.112.149.141.in-addr.arpa domain name pointer pool-141-149-112-121.pghk.east.verizon.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
121.112.149.141.in-addr.arpa	name = pool-141-149-112-121.pghk.east.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.209.157.162 attackbots
Unauthorized SSH login attempts
2019-07-01 05:58:49
37.247.108.101 attackspambots
[ssh] SSH attack
2019-07-01 05:40:55
185.182.56.85 attack
SQL Injection Exploit Attempts
2019-07-01 05:42:53
186.81.30.184 attack
ssh failed login
2019-07-01 06:01:47
186.2.183.101 attackbotsspam
Jun 30 19:23:25 MK-Soft-VM7 sshd\[13086\]: Invalid user pi from 186.2.183.101 port 48454
Jun 30 19:23:25 MK-Soft-VM7 sshd\[13088\]: Invalid user pi from 186.2.183.101 port 48456
Jun 30 19:23:25 MK-Soft-VM7 sshd\[13086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.2.183.101
Jun 30 19:23:25 MK-Soft-VM7 sshd\[13088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.2.183.101
...
2019-07-01 06:02:04
68.14.135.194 attackbots
Many RDP login attempts detected by IDS script
2019-07-01 05:45:43
191.252.142.144 attackspam
SQL Injection Exploit Attempts
2019-07-01 06:03:32
187.108.79.176 attackbotsspam
SMTP-sasl brute force
...
2019-07-01 05:38:33
106.57.208.227 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-07-01 06:04:50
181.113.228.245 attackbots
RDP Bruteforce
2019-07-01 05:38:14
188.31.182.23 attackspam
31 part of 123 Mac Hackers/all uk/i.e. hackers/also check bar codes/serial numbers that are specific to a country/5. 00000/any zero with a dot inside/tends to be duplicating other websites with wrap method/header changes/contact-us hyphen Mac. hackers 123/recommend a network monitor for home use/50 50 to find a decent one/avoid sophos -bbc biased promotion of relatives Phillips 123/part of the illegal networks is tampered bt lines/requesting for new one/when the original was fine and accessible - 225/repetitive boat requests reCAPTCHA.net -lag locks - new tampered versions include alb ru/alb pt/alb fr local/alb de local/alb ch local/alb NL local village/village-hotel.co.uk another Mac hacker set up leaving tokens inside and outside the house every night/also Mac Hackers 123 Stalkers -serials /builder requested the extra line/so bt operator was also left wandering why/twice extra line been requested/bt engineer local/loop in 127.0.0.1 is one exploited/illegal network runs when ours is off/and also duplicates
2019-07-01 05:31:11
200.24.70.78 attackbots
$f2bV_matches
2019-07-01 05:22:15
162.243.144.60 attack
Automatic report - Web App Attack
2019-07-01 05:22:39
177.21.133.168 attackbotsspam
$f2bV_matches
2019-07-01 05:37:22
187.62.152.172 attack
SMTP-sasl brute force
...
2019-07-01 05:34:37

Recently Reported IPs

49.145.253.194 114.226.250.190 244.91.10.184 14.27.52.156
217.185.232.215 109.229.0.234 108.127.129.43 36.230.210.163
194.46.94.240 59.253.120.187 178.33.215.169 116.36.97.80
36.233.94.149 188.40.100.144 89.245.247.138 118.161.12.76
37.210.207.101 119.99.249.225 119.118.139.56 77.40.64.213