Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.20.37.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40264
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.20.37.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:51:00 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 108.37.20.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.37.20.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.8.167.47 attackspambots
2020-08-01 05:46:23 SMTP protocol error in "AUTH LOGIN" H=\(Xr9c0p\) \[106.8.167.47\]:1282 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2020-08-01 05:46:24 SMTP protocol error in "AUTH LOGIN" H=\(p90V56\) \[106.8.167.47\]:1617 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2020-08-01 05:46:25 SMTP protocol error in "AUTH LOGIN" H=\(3ngM8ckRMg\) \[106.8.167.47\]:1728 I=\[193.107.88.166\]:25 AUTH command used when not advertised
...
2020-08-01 19:58:30
37.48.70.74 attackspambots
2020-07-28 06:19:41,077 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 37.48.70.74
2020-07-28 06:35:16,038 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 37.48.70.74
2020-07-28 06:51:47,920 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 37.48.70.74
2020-07-28 07:08:23,281 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 37.48.70.74
2020-07-28 07:25:08,160 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 37.48.70.74
...
2020-08-01 19:31:54
129.213.100.138 attackspambots
*Port Scan* detected from 129.213.100.138 (US/United States/Washington/Seattle (Pike Pine Retail Core)/-). 4 hits in the last 125 seconds
2020-08-01 19:46:14
20.52.52.144 attackbotsspam
Unauthorized connection attempt detected from IP address 20.52.52.144 to port 7002
2020-08-01 19:48:08
144.76.81.229 attackbots
20 attempts against mh-misbehave-ban on milky
2020-08-01 19:45:49
134.209.235.106 attackspam
Flask-IPban - exploit URL requested:/wp-login.php
2020-08-01 19:59:40
188.166.77.159 attackbots
Fail2Ban Ban Triggered
2020-08-01 19:51:05
42.112.46.99 attack
20/7/31@23:46:40: FAIL: Alarm-Network address from=42.112.46.99
...
2020-08-01 19:48:40
46.8.178.118 attack
Unauthorized connection attempt detected from IP address 46.8.178.118 to port 1433
2020-08-01 19:53:15
78.117.221.120 attackspambots
Invalid user blue from 78.117.221.120 port 11953
2020-08-01 19:27:56
164.155.93.4 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-01 19:38:36
202.143.111.42 attack
$f2bV_matches
2020-08-01 19:53:42
167.172.61.40 attackbots
Repeated brute force against a port
2020-08-01 19:43:00
14.182.151.38 attackspambots
07/31/2020-23:47:24.887801 14.182.151.38 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-01 19:21:49
195.211.87.245 attackspam
trying to access non-authorized port
2020-08-01 19:45:15

Recently Reported IPs

199.22.239.160 41.65.91.171 220.232.180.142 78.49.144.72
160.128.63.15 187.46.138.36 82.21.199.01 49.29.185.217
239.127.54.121 202.76.4.122 252.193.213.133 87.215.103.92
16.234.2.2 35.191.166.67 35.36.230.146 135.213.61.225
229.184.204.7 209.41.124.215 90.98.196.59 16.176.147.90