Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.196.243.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19739
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.196.243.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:02:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 49.243.196.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.243.196.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.166.141.58 attackbotsspam
Apr 28 15:47:41 debian-2gb-nbg1-2 kernel: \[10340587.229886\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=180.166.141.58 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x00 TTL=237 ID=62080 PROTO=TCP SPT=50029 DPT=29411 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-28 22:00:05
162.13.38.154 attackbotsspam
RecipientDoesNotExist    Timestamp : 28-Apr-20 13:01      (From . root@503959-app1.ukatn.com)    Listed on   rbldns-ru     (267)
2020-04-28 22:38:02
58.35.18.244 attackbotsspam
Unauthorized connection attempt detected from IP address 58.35.18.244 to port 23 [T]
2020-04-28 22:13:02
103.124.92.184 attack
Apr 28 16:05:21 home sshd[29475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.92.184
Apr 28 16:05:23 home sshd[29475]: Failed password for invalid user techuser from 103.124.92.184 port 58750 ssh2
Apr 28 16:10:18 home sshd[30303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.92.184
...
2020-04-28 22:27:17
191.54.24.146 attackbotsspam
Honeypot attack, port: 445, PTR: 191-054-024-146.xd-dynamic.algarnetsuper.com.br.
2020-04-28 22:31:20
83.97.20.30 attack
(sshd) Failed SSH login from 83.97.20.30 (RO/Romania/30.20.97.83.ro.ovo.sc): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 28 15:14:04 ubnt-55d23 sshd[13884]: Did not receive identification string from 83.97.20.30 port 41323
Apr 28 15:25:24 ubnt-55d23 sshd[15695]: Did not receive identification string from 83.97.20.30 port 48503
2020-04-28 21:58:54
80.82.78.100 attack
80.82.78.100 was recorded 11 times by 8 hosts attempting to connect to the following ports: 41092,48899. Incident counter (4h, 24h, all-time): 11, 83, 25702
2020-04-28 21:59:24
109.166.88.55 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-28 22:18:34
113.77.37.83 attackspambots
Unauthorized connection attempt detected from IP address 113.77.37.83 to port 23 [T]
2020-04-28 22:18:13
185.50.149.11 attack
2020-04-28 16:29:14 dovecot_login authenticator failed for \(\[185.50.149.11\]\) \[185.50.149.11\]: 535 Incorrect authentication data \(set_id=support@nophost.com\)
2020-04-28 16:29:22 dovecot_login authenticator failed for \(\[185.50.149.11\]\) \[185.50.149.11\]: 535 Incorrect authentication data
2020-04-28 16:29:32 dovecot_login authenticator failed for \(\[185.50.149.11\]\) \[185.50.149.11\]: 535 Incorrect authentication data
2020-04-28 16:29:37 dovecot_login authenticator failed for \(\[185.50.149.11\]\) \[185.50.149.11\]: 535 Incorrect authentication data
2020-04-28 16:29:51 dovecot_login authenticator failed for \(\[185.50.149.11\]\) \[185.50.149.11\]: 535 Incorrect authentication data
2020-04-28 22:33:46
187.149.41.30 attackbotsspam
Honeypot attack, port: 81, PTR: dsl-187-149-41-30-dyn.prod-infinitum.com.mx.
2020-04-28 22:22:17
47.93.112.231 attack
暴力破解黑客攻擊
2020-04-28 22:38:02
213.217.0.131 attack
Apr 28 16:14:19 debian-2gb-nbg1-2 kernel: \[10342185.869069\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.131 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=5621 PROTO=TCP SPT=58619 DPT=49788 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-28 22:16:09
83.239.98.210 attack
1588075996 - 04/28/2020 14:13:16 Host: 83.239.98.210/83.239.98.210 Port: 445 TCP Blocked
2020-04-28 22:30:18
164.132.145.70 attack
$f2bV_matches
2020-04-28 22:37:34

Recently Reported IPs

166.129.55.43 216.110.124.30 190.36.204.138 147.110.235.133
170.1.176.204 22.238.84.126 77.70.161.122 212.237.207.21
170.14.161.149 107.70.203.48 251.61.61.57 82.143.109.152
253.84.72.185 175.227.28.14 39.17.23.145 60.108.160.142
60.106.30.234 240.53.216.234 235.249.11.159 48.34.20.22