Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Leeuwarden

Region: Friesland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.252.81.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62056
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.252.81.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062900 1800 900 604800 86400

;; Query time: 190 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 00:50:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 109.81.252.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.81.252.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.25.123.156 attackbots
2019-10-11	06:40:06	185.25.123.156	karthikshereen@143gmail.com	newshosting@mydomain.com		dnsbl	reject RCPT: 550 5.7.1 Service unavailable; client [185.25.123.156] blocked using zen.spamhaus.org
2019-10-22 18:38:37
35.240.14.151 attack
3389BruteforceFW21
2019-10-22 18:25:23
149.28.89.132 attackspambots
port scan and connect, tcp 5432 (postgresql)
2019-10-22 18:44:52
177.47.130.181 attackbotsspam
$f2bV_matches
2019-10-22 18:28:10
45.77.150.202 attackspambots
$f2bV_matches
2019-10-22 18:47:11
149.129.252.83 attack
Oct 22 07:54:08 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[18820]: Failed password for root from 149.129.252.83 port 47948 ssh2
Oct 22 07:58:27 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[18833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.252.83
Oct 22 07:58:29 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[18833]: Failed password for invalid user catalina from 149.129.252.83 port 34456 ssh2
...
2019-10-22 18:21:29
187.195.108.140 attackspambots
Automatic report - Port Scan Attack
2019-10-22 18:38:07
190.53.30.218 attack
Brute force attempt
2019-10-22 18:45:24
52.130.67.235 attackbotsspam
Invalid user pi from 52.130.67.235 port 38366
2019-10-22 18:30:05
139.59.142.82 attackspambots
Automatic report - XMLRPC Attack
2019-10-22 18:42:40
218.92.0.192 attackbotsspam
Oct 22 11:48:38 legacy sshd[22458]: Failed password for root from 218.92.0.192 port 35400 ssh2
Oct 22 11:50:32 legacy sshd[22497]: Failed password for root from 218.92.0.192 port 33840 ssh2
...
2019-10-22 18:18:03
23.106.122.127 attack
" "
2019-10-22 18:16:38
159.203.201.144 attack
UTC: 2019-10-21 port: 22/tcp
2019-10-22 18:18:25
18.222.209.6 attackbots
$f2bV_matches
2019-10-22 18:35:43
35.247.80.225 attackspambots
$f2bV_matches
2019-10-22 18:17:14

Recently Reported IPs

163.244.143.214 126.51.109.68 119.180.12.118 124.61.169.219
120.76.157.234 116.174.205.117 110.83.150.74 102.236.235.80
112.25.10.225 106.249.126.83 111.176.71.67 8.185.105.239
97.41.69.232 84.168.196.209 71.105.119.247 61.141.49.162
53.65.30.118 91.62.176.176 77.154.30.59 52.185.150.155