Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.161.99.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.161.99.99.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:59:50 CST 2022
;; MSG SIZE  rcvd: 106
Host info
99.99.161.141.in-addr.arpa domain name pointer redirects.uis.georgetown.edu.
99.99.161.141.in-addr.arpa domain name pointer math.georgetown.edu.
99.99.161.141.in-addr.arpa domain name pointer mald.georgetown.edu.
99.99.161.141.in-addr.arpa domain name pointer mld.georgetown.edu.
99.99.161.141.in-addr.arpa domain name pointer web03-pub.uis.georgetown.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.99.161.141.in-addr.arpa	name = math.georgetown.edu.
99.99.161.141.in-addr.arpa	name = mald.georgetown.edu.
99.99.161.141.in-addr.arpa	name = mld.georgetown.edu.
99.99.161.141.in-addr.arpa	name = web03-pub.uis.georgetown.edu.
99.99.161.141.in-addr.arpa	name = redirects.uis.georgetown.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.51.90.173 attackspambots
49.51.90.173 (CA/Canada/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 16 06:39:37 server4 sshd[9759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.183.151  user=root
Sep 16 06:40:18 server4 sshd[10499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.185.246  user=root
Sep 16 06:39:40 server4 sshd[9759]: Failed password for root from 152.136.183.151 port 59260 ssh2
Sep 16 06:40:20 server4 sshd[10499]: Failed password for root from 129.211.185.246 port 42676 ssh2
Sep 16 06:40:23 server4 sshd[10546]: Failed password for root from 51.77.140.36 port 34102 ssh2
Sep 16 06:41:39 server4 sshd[11623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.90.173  user=root

IP Addresses Blocked:

152.136.183.151 (CN/China/-)
129.211.185.246 (CN/China/-)
51.77.140.36 (FR/France/-)
2020-09-16 19:27:23
62.234.193.119 attackspambots
Sep 16 10:03:56 localhost sshd[936881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.193.119 
Sep 16 10:03:56 localhost sshd[936881]: Invalid user oracle from 62.234.193.119 port 49198
Sep 16 10:03:58 localhost sshd[936881]: Failed password for invalid user oracle from 62.234.193.119 port 49198 ssh2
Sep 16 10:04:48 localhost sshd[938654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.193.119  user=root
Sep 16 10:04:50 localhost sshd[938654]: Failed password for root from 62.234.193.119 port 59016 ssh2
...
2020-09-16 20:22:43
104.243.41.97 attackbots
Sep 16 10:12:51 lavrea sshd[252228]: Invalid user kevin from 104.243.41.97 port 42144
...
2020-09-16 20:03:04
164.90.217.12 attack
Invalid user admin from 164.90.217.12 port 11394
2020-09-16 20:21:40
121.33.237.102 attackbotsspam
Sep 16 14:19:09 rancher-0 sshd[82719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.33.237.102  user=root
Sep 16 14:19:11 rancher-0 sshd[82719]: Failed password for root from 121.33.237.102 port 53214 ssh2
...
2020-09-16 20:23:17
83.96.47.178 attackspam
1600188905 - 09/15/2020 18:55:05 Host: 83.96.47.178/83.96.47.178 Port: 445 TCP Blocked
2020-09-16 19:23:03
35.236.125.184 attackspambots
35.236.125.184 - - [16/Sep/2020:12:06:38 +0200] "GET /wp-login.php HTTP/1.1" 200 8712 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.236.125.184 - - [16/Sep/2020:12:06:40 +0200] "POST /wp-login.php HTTP/1.1" 200 8942 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.236.125.184 - - [16/Sep/2020:12:06:42 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-16 20:16:22
134.209.153.128 attackspambots
2020-09-16T09:43:01.630364snf-827550 sshd[5597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.153.128
2020-09-16T09:43:01.614896snf-827550 sshd[5597]: Invalid user jamaica from 134.209.153.128 port 52068
2020-09-16T09:43:03.638973snf-827550 sshd[5597]: Failed password for invalid user jamaica from 134.209.153.128 port 52068 ssh2
...
2020-09-16 19:09:34
138.197.152.148 attackspambots
TCP port : 24105
2020-09-16 19:24:34
104.244.72.203 attackbots
(mod_security) mod_security (id:980001) triggered by 104.244.72.203 (US/United States/-): 5 in the last 14400 secs; ID: rub
2020-09-16 20:20:32
193.56.28.14 attack
Sep 16 12:49:36 galaxy event: galaxy/lswi: smtp: staff@uni-potsdam.de [193.56.28.14] authentication failure using internet password
Sep 16 12:50:24 galaxy event: galaxy/lswi: smtp: staff@uni-potsdam.de [193.56.28.14] authentication failure using internet password
Sep 16 12:54:13 galaxy event: galaxy/lswi: smtp: mike@uni-potsdam.de [193.56.28.14] authentication failure using internet password
Sep 16 12:55:00 galaxy event: galaxy/lswi: smtp: mike@uni-potsdam.de [193.56.28.14] authentication failure using internet password
Sep 16 12:58:48 galaxy event: galaxy/lswi: smtp: john@uni-potsdam.de [193.56.28.14] authentication failure using internet password
...
2020-09-16 19:16:18
150.95.31.150 attackspambots
SSH Brute-Forcing (server1)
2020-09-16 19:34:46
103.136.40.90 attackbotsspam
Sep 16 05:09:00 ny01 sshd[4302]: Failed password for root from 103.136.40.90 port 58984 ssh2
Sep 16 05:12:56 ny01 sshd[4838]: Failed password for root from 103.136.40.90 port 42854 ssh2
2020-09-16 19:20:48
36.94.64.138 attackspam
Unauthorized connection attempt from IP address 36.94.64.138 on Port 445(SMB)
2020-09-16 20:03:41
36.133.0.37 attackspam
Sep 16 03:54:56 dignus sshd[2861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.0.37  user=root
Sep 16 03:54:58 dignus sshd[2861]: Failed password for root from 36.133.0.37 port 43696 ssh2
Sep 16 03:58:55 dignus sshd[3304]: Invalid user sysadmin from 36.133.0.37 port 40006
Sep 16 03:58:55 dignus sshd[3304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.0.37
Sep 16 03:58:58 dignus sshd[3304]: Failed password for invalid user sysadmin from 36.133.0.37 port 40006 ssh2
...
2020-09-16 19:08:23

Recently Reported IPs

141.138.91.39 141.144.233.242 141.164.140.131 141.164.132.32
141.164.192.110 141.164.197.241 141.164.157.67 141.164.192.61
141.164.35.136 141.164.37.31 141.164.38.213 141.164.38.230
141.164.38.22 141.164.50.119 141.164.52.252 141.164.40.140
141.164.55.23 141.164.60.67 141.164.62.138 141.164.63.160