Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.28.126.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49673
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.28.126.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:32:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
136.126.28.141.in-addr.arpa domain name pointer fbdm126-136.dm126.hs-furtwangen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.126.28.141.in-addr.arpa	name = fbdm126-136.dm126.hs-furtwangen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.82.58.132 attackbots
203.82.58.132 - [18/Aug/2020:23:42:42 +0300] "POST /xmlrpc.php HTTP/1.1" 404 70900 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
203.82.58.132 - [18/Aug/2020:23:45:37 +0300] "POST /xmlrpc.php HTTP/1.1" 404 70892 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-08-19 06:46:28
52.169.157.242 attackspambots
Attempted connection to port 3390.
2020-08-19 06:35:55
193.239.147.38 attackbots
 TCP (SYN) 193.239.147.38:60962 -> port 81, len 44
2020-08-19 06:43:41
98.159.90.147 attack
Port 22 Scan, PTR: None
2020-08-19 06:18:21
181.124.155.168 attackbotsspam
SSH invalid-user multiple login try
2020-08-19 06:38:34
151.80.155.98 attackbotsspam
Aug 18 23:15:49 vps1 sshd[5450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.155.98  user=root
Aug 18 23:15:52 vps1 sshd[5450]: Failed password for invalid user root from 151.80.155.98 port 54582 ssh2
Aug 18 23:18:12 vps1 sshd[5488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.155.98  user=root
Aug 18 23:18:14 vps1 sshd[5488]: Failed password for invalid user root from 151.80.155.98 port 38972 ssh2
Aug 18 23:20:30 vps1 sshd[5522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.155.98 
Aug 18 23:20:32 vps1 sshd[5522]: Failed password for invalid user team from 151.80.155.98 port 51588 ssh2
Aug 18 23:22:51 vps1 sshd[5555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.155.98 
...
2020-08-19 06:35:04
154.123.134.178 attackspambots
Attempted connection to port 5555.
2020-08-19 06:47:37
198.211.102.110 attack
198.211.102.110 - - [18/Aug/2020:22:59:50 +0100] "POST /wp-login.php HTTP/1.1" 200 2225 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.102.110 - - [18/Aug/2020:22:59:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2202 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.102.110 - - [18/Aug/2020:22:59:54 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-19 06:28:01
93.99.138.88 attackspam
Invalid user william from 93.99.138.88 port 49166
2020-08-19 06:16:05
185.246.208.140 attack
Tried our host z.
2020-08-19 06:27:05
142.93.18.7 attackspambots
142.93.18.7 - - [18/Aug/2020:22:45:42 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [18/Aug/2020:22:45:47 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [18/Aug/2020:22:45:54 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [18/Aug/2020:22:45:55 +0200] "POST /wp-login.php HTTP/1.1" 200 2030 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [18/Aug/2020:22:45:55 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [18/Aug/2020:22:45:56 +0200] "POST /wp-login.php HTTP/1.1" 200 2030 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-19 06:15:24
178.223.104.233 attack
xmlrpc attack
2020-08-19 06:22:24
159.65.11.115 attackbots
Aug 18 22:45:44 melroy-server sshd[20662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.11.115 
Aug 18 22:45:46 melroy-server sshd[20662]: Failed password for invalid user web from 159.65.11.115 port 50622 ssh2
...
2020-08-19 06:27:33
201.130.181.207 attackbotsspam
Attempted connection to port 23.
2020-08-19 06:41:00
64.227.81.50 attackspambots
27017/tcp
[2020-08-18]1pkt
2020-08-19 06:33:35

Recently Reported IPs

214.102.185.237 164.143.100.162 52.59.235.55 54.164.233.120
34.50.90.177 209.120.30.96 87.239.145.252 198.4.248.126
5.188.173.155 118.107.212.137 8.235.168.47 150.13.143.181
227.123.11.251 26.36.61.9 6.49.255.181 29.67.77.55
91.15.229.33 92.124.220.210 120.6.25.79 193.80.128.130