Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.212.121.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38406
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.212.121.94.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 03:47:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
94.121.212.141.in-addr.arpa domain name pointer researchscan094.eecs.umich.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.121.212.141.in-addr.arpa	name = researchscan094.eecs.umich.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.128.227.250 attackbotsspam
Reject by firewall but more than 10000 hits during 10 hours
2019-11-15 07:52:49
132.232.79.78 attackbots
46 failed attempt(s) in the last 24h
2019-11-15 07:55:44
81.28.167.30 attackbotsspam
2019-11-14T23:24:29.033567abusebot-2.cloudsearch.cf sshd\[6611\]: Invalid user adamos from 81.28.167.30 port 38764
2019-11-15 07:59:46
36.112.137.55 attack
Nov 14 13:23:57 hpm sshd\[29380\]: Invalid user gerin from 36.112.137.55
Nov 14 13:23:57 hpm sshd\[29380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55
Nov 14 13:24:00 hpm sshd\[29380\]: Failed password for invalid user gerin from 36.112.137.55 port 54411 ssh2
Nov 14 13:28:19 hpm sshd\[29735\]: Invalid user macos from 36.112.137.55
Nov 14 13:28:19 hpm sshd\[29735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55
2019-11-15 07:40:32
138.68.4.8 attackspam
2019-11-14T17:23:01.6890121495-001 sshd\[49039\]: Invalid user admin from 138.68.4.8 port 42352
2019-11-14T17:23:01.6965121495-001 sshd\[49039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8
2019-11-14T17:23:03.7116431495-001 sshd\[49039\]: Failed password for invalid user admin from 138.68.4.8 port 42352 ssh2
2019-11-14T17:26:28.5943931495-001 sshd\[49211\]: Invalid user helwege from 138.68.4.8 port 50982
2019-11-14T17:26:28.6017971495-001 sshd\[49211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8
2019-11-14T17:26:31.0333581495-001 sshd\[49211\]: Failed password for invalid user helwege from 138.68.4.8 port 50982 ssh2
...
2019-11-15 07:36:26
217.182.158.104 attackbots
2019-11-14T23:09:08.215271abusebot-6.cloudsearch.cf sshd\[1743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip104.ip-217-182-158.eu  user=root
2019-11-15 07:28:26
130.61.72.90 attackspam
Nov 15 01:36:03 server sshd\[11975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.72.90  user=mail
Nov 15 01:36:05 server sshd\[11975\]: Failed password for mail from 130.61.72.90 port 59324 ssh2
Nov 15 01:39:27 server sshd\[8894\]: Invalid user hung from 130.61.72.90 port 40066
Nov 15 01:39:27 server sshd\[8894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.72.90
Nov 15 01:39:29 server sshd\[8894\]: Failed password for invalid user hung from 130.61.72.90 port 40066 ssh2
2019-11-15 07:47:30
194.182.86.126 attackspambots
Invalid user beas from 194.182.86.126 port 58490
2019-11-15 07:45:15
65.153.45.34 attack
Nov 14 13:29:40 auw2 sshd\[30859\]: Invalid user ftpuser from 65.153.45.34
Nov 14 13:29:40 auw2 sshd\[30859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.153.45.34
Nov 14 13:29:42 auw2 sshd\[30859\]: Failed password for invalid user ftpuser from 65.153.45.34 port 58530 ssh2
Nov 14 13:33:30 auw2 sshd\[31150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.153.45.34  user=root
Nov 14 13:33:32 auw2 sshd\[31150\]: Failed password for root from 65.153.45.34 port 39294 ssh2
2019-11-15 07:47:57
164.132.192.5 attack
2019-11-14T22:37:14.918801abusebot-4.cloudsearch.cf sshd\[4539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.ip-164-132-192.eu  user=root
2019-11-15 07:35:22
202.171.77.46 attack
B: Magento admin pass test (wrong country)
2019-11-15 07:31:11
129.204.152.222 attackspambots
Nov 14 13:26:32 auw2 sshd\[30617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.152.222  user=root
Nov 14 13:26:34 auw2 sshd\[30617\]: Failed password for root from 129.204.152.222 port 58044 ssh2
Nov 14 13:30:54 auw2 sshd\[30938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.152.222  user=root
Nov 14 13:30:56 auw2 sshd\[30938\]: Failed password for root from 129.204.152.222 port 38342 ssh2
Nov 14 13:35:15 auw2 sshd\[31295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.152.222  user=root
2019-11-15 07:51:15
213.194.139.95 attack
Automatic report - Port Scan Attack
2019-11-15 07:50:36
36.155.115.95 attackspambots
Nov 15 00:51:00 vps691689 sshd[4950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95
Nov 15 00:51:02 vps691689 sshd[4950]: Failed password for invalid user ftpuser from 36.155.115.95 port 59252 ssh2
...
2019-11-15 07:59:26
201.159.154.204 attackbotsspam
Nov 15 00:19:12 lnxded64 sshd[31697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.159.154.204
2019-11-15 07:34:22

Recently Reported IPs

137.226.255.125 137.226.255.222 141.212.121.179 141.212.122.6
141.212.122.51 169.229.222.39 169.229.223.172 169.229.29.48
169.229.35.173 169.229.223.208 169.229.224.110 169.229.36.191
169.229.225.5 169.229.36.56 169.229.225.59 169.229.225.160
169.229.36.228 169.229.36.218 169.229.151.54 169.229.152.53