Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.2.166.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.2.166.217.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 02:26:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
217.166.2.141.in-addr.arpa domain name pointer cbs217pc.stub.uni-frankfurt.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.166.2.141.in-addr.arpa	name = cbs217pc.stub.uni-frankfurt.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.93.141 attackbotsspam
May  4 13:58:33 sip sshd[1710]: Failed password for root from 106.12.93.141 port 47048 ssh2
May  4 14:07:56 sip sshd[5175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.141
May  4 14:07:58 sip sshd[5175]: Failed password for invalid user prueba from 106.12.93.141 port 49472 ssh2
2020-05-05 03:29:09
129.211.49.17 attack
May  5 02:27:01 itv-usvr-01 sshd[10141]: Invalid user f4 from 129.211.49.17
2020-05-05 03:40:50
141.98.81.99 attackbotsspam
May  4 21:17:48 piServer sshd[23397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.99 
May  4 21:17:51 piServer sshd[23397]: Failed password for invalid user Administrator from 141.98.81.99 port 42745 ssh2
May  4 21:18:21 piServer sshd[23502]: Failed password for root from 141.98.81.99 port 41047 ssh2
...
2020-05-05 03:25:33
123.140.114.252 attackspam
May  4 21:28:28 OPSO sshd\[20628\]: Invalid user claudia from 123.140.114.252 port 57694
May  4 21:28:28 OPSO sshd\[20628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.252
May  4 21:28:30 OPSO sshd\[20628\]: Failed password for invalid user claudia from 123.140.114.252 port 57694 ssh2
May  4 21:30:33 OPSO sshd\[21255\]: Invalid user test from 123.140.114.252 port 60150
May  4 21:30:33 OPSO sshd\[21255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.252
2020-05-05 03:54:18
99.17.246.167 attackspam
Found by fail2ban
2020-05-05 03:43:21
59.46.211.242 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-05 03:47:15
159.89.88.114 attackbots
May  4 21:03:39 PorscheCustomer sshd[31033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.88.114
May  4 21:03:41 PorscheCustomer sshd[31033]: Failed password for invalid user usertest from 159.89.88.114 port 57636 ssh2
May  4 21:07:17 PorscheCustomer sshd[31137]: Failed password for root from 159.89.88.114 port 38780 ssh2
...
2020-05-05 03:32:27
128.199.95.60 attackbots
May  4 20:20:00 server sshd[34391]: Failed password for invalid user ann from 128.199.95.60 port 40504 ssh2
May  4 20:22:37 server sshd[36962]: Failed password for root from 128.199.95.60 port 50046 ssh2
May  4 20:25:13 server sshd[39450]: Failed password for invalid user alpha from 128.199.95.60 port 59586 ssh2
2020-05-05 03:20:59
218.50.4.41 attackbotsspam
2020-05-04 21:11:34,138 fail2ban.actions: WARNING [ssh] Ban 218.50.4.41
2020-05-05 03:35:23
141.98.81.83 attack
May  4 21:17:39 piServer sshd[23380]: Failed password for root from 141.98.81.83 port 45793 ssh2
May  4 21:18:10 piServer sshd[23440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.83 
May  4 21:18:12 piServer sshd[23440]: Failed password for invalid user guest from 141.98.81.83 port 33343 ssh2
...
2020-05-05 03:30:30
61.55.158.78 attackspam
May  4 06:44:44 pixelmemory sshd[183455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.55.158.78 
May  4 06:44:44 pixelmemory sshd[183455]: Invalid user robles from 61.55.158.78 port 19484
May  4 06:44:46 pixelmemory sshd[183455]: Failed password for invalid user robles from 61.55.158.78 port 19484 ssh2
May  4 06:48:19 pixelmemory sshd[183866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.55.158.78  user=backup
May  4 06:48:21 pixelmemory sshd[183866]: Failed password for backup from 61.55.158.78 port 19485 ssh2
...
2020-05-05 03:39:46
119.252.166.10 attackspambots
Honeypot attack, port: 445, PTR: 10.166.iconpln.net.id.
2020-05-05 03:53:04
114.99.21.146 attack
Unauthorized IMAP connection attempt
2020-05-05 03:15:18
49.232.23.127 attackbots
20 attempts against mh-ssh on install-test
2020-05-05 03:59:23
1.54.67.71 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-05 03:52:16

Recently Reported IPs

214.44.42.83 207.106.69.95 81.240.194.213 124.170.7.154
228.161.16.81 216.181.8.202 47.172.156.250 140.0.77.68
57.106.167.146 204.68.137.55 193.74.64.92 217.71.93.38
241.18.25.93 234.212.27.161 92.99.44.138 127.211.103.19
226.114.87.50 231.239.154.82 56.67.243.191 99.93.160.231