Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Greece

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.237.250.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.237.250.134.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:42:37 CST 2022
;; MSG SIZE  rcvd: 108
Host info
134.250.237.141.in-addr.arpa domain name pointer ppp141237250134.access.hol.gr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.250.237.141.in-addr.arpa	name = ppp141237250134.access.hol.gr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.91.56.33 attackspam
Jun 30 20:10:27 jane sshd[11596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.56.33 
Jun 30 20:10:29 jane sshd[11596]: Failed password for invalid user angel from 51.91.56.33 port 53918 ssh2
...
2020-07-01 18:44:03
179.12.238.19 attackbots
23/tcp
[2020-06-28]1pkt
2020-07-01 18:38:15
146.185.25.176 attackbots
 TCP (SYN) 146.185.25.176:80 -> port 80, len 44
2020-07-01 19:07:45
151.196.57.128 attackbots
B: Abusive ssh attack
2020-07-01 19:23:33
134.209.164.184 attackbotsspam
TCP port : 21403
2020-07-01 19:14:29
157.245.83.8 attack
Jun 30 18:32:03 h2865660 sshd[27495]: Invalid user ansible from 157.245.83.8 port 57008
Jun 30 18:32:03 h2865660 sshd[27495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.83.8
Jun 30 18:32:03 h2865660 sshd[27495]: Invalid user ansible from 157.245.83.8 port 57008
Jun 30 18:32:05 h2865660 sshd[27495]: Failed password for invalid user ansible from 157.245.83.8 port 57008 ssh2
Jun 30 18:33:44 h2865660 sshd[27514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.83.8  user=root
Jun 30 18:33:46 h2865660 sshd[27514]: Failed password for root from 157.245.83.8 port 38592 ssh2
Jun 30 18:35:33 h2865660 sshd[27534]: Invalid user david from 157.245.83.8 port 48408
Jun 30 18:35:33 h2865660 sshd[27534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.83.8
Jun 30 18:35:33 h2865660 sshd[27534]: Invalid user david from 157.245.83.8 port 48408
Jun 30 18:35:3
...
2020-07-01 19:22:48
168.227.48.251 attack
HTTP/HTTPs Attack
2020-07-01 19:26:30
139.255.66.12 attackspam
May 14 08:44:08 srv01 sshd[14257]: Did not receive identification string from 139.255.66.12 port 61792
May 14 08:44:11 srv01 sshd[14258]: Invalid user admin2 from 139.255.66.12 port 61831
May 14 08:44:11 srv01 sshd[14258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.66.12
May 14 08:44:11 srv01 sshd[14258]: Invalid user admin2 from 139.255.66.12 port 61831
May 14 08:44:13 srv01 sshd[14258]: Failed password for invalid user admin2 from 139.255.66.12 port 61831 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.255.66.12
2020-07-01 18:57:24
74.57.54.180 attack
trying to access non-authorized port
2020-07-01 18:56:03
45.95.168.145 attackspam
 TCP (SYN) 45.95.168.145:57403 -> port 8000, len 44
2020-07-01 19:06:02
114.34.50.84 attackspam
Honeypot attack, port: 81, PTR: 114-34-50-84.HINET-IP.hinet.net.
2020-07-01 18:57:48
188.255.220.62 attack
Brute force against mail service (dovecot)
2020-07-01 19:16:34
189.236.129.24 attackbotsspam
Port probing on unauthorized port 23
2020-07-01 18:52:35
49.51.9.134 attackspam
Unauthorized connection attempt detected from IP address 49.51.9.134 to port 22
2020-07-01 18:56:17
114.67.239.220 attackspambots
Invalid user oracle from 114.67.239.220 port 56381
2020-07-01 19:12:59

Recently Reported IPs

141.237.118.197 141.237.236.11 141.237.216.16 141.237.186.65
141.237.30.240 141.237.63.48 141.237.2.8 141.237.109.73
141.237.72.41 141.255.100.75 141.255.75.187 141.255.43.200
141.255.16.241 141.255.75.116 141.255.21.21 141.94.79.214
141.237.58.133 141.255.34.173 141.95.104.69 141.95.105.155