Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       141.0.0.0 - 141.255.255.255
CIDR:           141.0.0.0/8
NetName:        RIPE-ERX-141
NetHandle:      NET-141-0-0-0-0
Parent:          ()
NetType:        Early Registrations, Maintained by RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        1993-05-01
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/141.0.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.176.56.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.176.56.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051500 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 22:07:03 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 116.56.176.141.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 141.176.56.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
121.156.155.204 attack
Unauthorized connection attempt detected from IP address 121.156.155.204 to port 8000 [J]
2020-02-23 18:28:56
122.117.253.148 attackbots
Unauthorized connection attempt detected from IP address 122.117.253.148 to port 23 [J]
2020-02-23 18:28:01
171.101.22.63 attack
Unauthorized connection attempt detected from IP address 171.101.22.63 to port 26 [J]
2020-02-23 18:24:42
114.35.98.24 attack
Unauthorized connection attempt detected from IP address 114.35.98.24 to port 23 [J]
2020-02-23 19:00:03
121.157.223.85 attackbots
Unauthorized connection attempt detected from IP address 121.157.223.85 to port 23 [J]
2020-02-23 18:58:08
104.219.250.131 attackbotsspam
ssh brute force
2020-02-23 18:36:31
93.119.150.213 attackbots
Unauthorized connection attempt detected from IP address 93.119.150.213 to port 23 [J]
2020-02-23 18:38:17
172.105.92.229 attack
Unauthorized connection attempt detected from IP address 172.105.92.229 to port 902 [J]
2020-02-23 18:55:18
212.97.189.25 attackbots
Unauthorized connection attempt detected from IP address 212.97.189.25 to port 81 [J]
2020-02-23 18:49:39
106.13.187.27 attackbotsspam
Unauthorized connection attempt detected from IP address 106.13.187.27 to port 2220 [J]
2020-02-23 18:34:56
124.195.206.128 attack
Automatic report - Port Scan Attack
2020-02-23 18:26:22
62.219.227.137 attack
Unauthorized connection attempt detected from IP address 62.219.227.137 to port 4567 [J]
2020-02-23 18:42:23
113.203.237.106 attack
Unauthorized connection attempt detected from IP address 113.203.237.106 to port 1433 [J]
2020-02-23 19:00:22
176.43.73.119 attackspam
Unauthorized connection attempt detected from IP address 176.43.73.119 to port 23 [J]
2020-02-23 18:54:22
177.92.247.105 attackbotsspam
Unauthorized connection attempt detected from IP address 177.92.247.105 to port 23 [J]
2020-02-23 18:22:57

Recently Reported IPs

159.149.163.25 137.118.201.35 57.141.2.56 121.129.137.231
12.172.72.20 192.168.66.1 103.137.215.85 141.223.126.34
128.119.193.16 172.235.36.197 89.21.67.177 69.5.169.53
69.5.169.48 69.5.169.34 207.211.179.220 10.21.204.108
10.100.7.167 190.202.19.89 43.164.197.117 2606:4700:10::6816:3626