Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lind

Region: Rheinland-Pfalz

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.26.21.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.26.21.14.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110701 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 08 04:44:33 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 14.21.26.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.21.26.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.3.203.103 attackspam
May 31 09:13:09 DNS-2 sshd[2202]: User r.r from 116.3.203.103 not allowed because not listed in AllowUsers
May 31 09:13:09 DNS-2 sshd[2202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.3.203.103  user=r.r
May 31 09:13:11 DNS-2 sshd[2202]: Failed password for invalid user r.r from 116.3.203.103 port 33132 ssh2
May 31 09:13:13 DNS-2 sshd[2202]: Received disconnect from 116.3.203.103 port 33132:11: Bye Bye [preauth]
May 31 09:13:13 DNS-2 sshd[2202]: Disconnected from invalid user r.r 116.3.203.103 port 33132 [preauth]
May 31 09:17:49 DNS-2 sshd[4242]: User r.r from 116.3.203.103 not allowed because not listed in AllowUsers
May 31 09:17:49 DNS-2 sshd[4242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.3.203.103  user=r.r
May 31 09:17:52 DNS-2 sshd[4242]: Failed password for invalid user r.r from 116.3.203.103 port 56042 ssh2
May 31 09:17:54 DNS-2 sshd[4242]: Received disconnect fr........
-------------------------------
2020-06-01 06:43:13
188.24.186.226 attackspambots
Automatic report - Port Scan Attack
2020-06-01 06:40:44
155.94.128.203 attackbots
155.94.128.203 has been banned for [spam]
...
2020-06-01 06:54:41
162.247.74.213 attackbots
$f2bV_matches
2020-06-01 06:59:57
60.225.224.120 attackbotsspam
2020-05-3122:24:141jfUVB-00063l-2d\<=info@whatsup2013.chH=\(localhost\)[60.225.224.120]:45184P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2261id=4D48FEADA6725D1EC2C78E36F2DDA6F3@whatsup2013.chT="Ionlywantasmallamountofyourpersonalinterest"forskonija@yahoo.com2020-05-3122:24:391jfUVa-00065b-A1\<=info@whatsup2013.chH=\(localhost\)[14.186.176.213]:36759P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2285id=595CEAB9B266490AD6D39A22E66E8776@whatsup2013.chT="Justsimplyrequirethetiniestbitofyourinterest"forleeparsons30721@gmail.com2020-05-3122:23:151jfUUE-0005xu-G8\<=info@whatsup2013.chH=\(localhost\)[121.186.96.167]:56772P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2293id=949127747FAB84C71B1E57EF2B2297ED@whatsup2013.chT="Justsimplywantsomeyourfocus"forxtrail39@hotmail.com2020-05-3122:23:281jfUUR-0005yu-PU\<=info@whatsup2013.chH=\(localhost\)[183.88.243.221]:38768P=esmtpsaX=TLS
2020-06-01 06:37:02
115.84.91.147 attack
(imapd) Failed IMAP login from 115.84.91.147 (LA/Laos/-): 1 in the last 3600 secs
2020-06-01 06:56:47
46.33.33.69 attackbots
/ucp.php?mode=register&sid=57f925c30e6ad488ad1b4fc41c44cb64
2020-06-01 07:15:29
61.175.134.190 attackbotsspam
May 31 17:21:39 firewall sshd[13687]: Failed password for root from 61.175.134.190 port 59053 ssh2
May 31 17:24:09 firewall sshd[13751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.134.190  user=root
May 31 17:24:11 firewall sshd[13751]: Failed password for root from 61.175.134.190 port 42380 ssh2
...
2020-06-01 07:01:36
222.186.30.35 attack
May 31 19:03:05 plusreed sshd[27924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
May 31 19:03:06 plusreed sshd[27924]: Failed password for root from 222.186.30.35 port 47024 ssh2
...
2020-06-01 07:04:33
92.63.194.105 attackspam
May 31 23:23:48 root sshd[27219]: Invalid user user from 92.63.194.105
...
2020-06-01 07:16:29
201.191.203.154 attack
May 31 23:16:17 h2779839 sshd[24176]: Invalid user Password@12345\r from 201.191.203.154 port 55764
May 31 23:16:17 h2779839 sshd[24176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.191.203.154
May 31 23:16:17 h2779839 sshd[24176]: Invalid user Password@12345\r from 201.191.203.154 port 55764
May 31 23:16:19 h2779839 sshd[24176]: Failed password for invalid user Password@12345\r from 201.191.203.154 port 55764 ssh2
May 31 23:17:19 h2779839 sshd[24235]: Invalid user 123abc@\r from 201.191.203.154 port 37348
May 31 23:17:19 h2779839 sshd[24235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.191.203.154
May 31 23:17:19 h2779839 sshd[24235]: Invalid user 123abc@\r from 201.191.203.154 port 37348
May 31 23:17:21 h2779839 sshd[24235]: Failed password for invalid user 123abc@\r from 201.191.203.154 port 37348 ssh2
May 31 23:18:23 h2779839 sshd[24246]: Invalid user t0ch20x\r from 201.191.203.154 port 
...
2020-06-01 06:58:01
52.188.107.82 attackbotsspam
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-06-01 07:00:51
111.229.226.212 attackbotsspam
May 31 22:13:54 ns382633 sshd\[15561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.226.212  user=root
May 31 22:13:55 ns382633 sshd\[15561\]: Failed password for root from 111.229.226.212 port 40046 ssh2
May 31 22:20:26 ns382633 sshd\[17112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.226.212  user=root
May 31 22:20:28 ns382633 sshd\[17112\]: Failed password for root from 111.229.226.212 port 55962 ssh2
May 31 22:23:50 ns382633 sshd\[17379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.226.212  user=root
2020-06-01 07:12:38
111.229.4.66 attack
odoo8
...
2020-06-01 07:14:17
183.67.19.134 attackspambots
Port probing on unauthorized port 1433
2020-06-01 06:54:09

Recently Reported IPs

144.151.110.197 196.10.99.70 33.70.194.192 165.253.202.230
216.215.146.152 174.91.37.225 129.4.8.120 87.73.109.205
0.32.255.47 70.88.232.131 68.109.42.109 80.55.164.227
87.60.10.128 221.62.167.21 208.234.200.79 44.255.198.203
114.244.157.204 215.133.105.208 49.255.35.27 162.177.251.167