Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Freiburg im Breisgau

Region: Baden-Württemberg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.28.225.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9894
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.28.225.160.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011500 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 15 14:56:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 160.225.28.141.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 141.28.225.160.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
139.59.95.143 attackbots
Attempted connection to port 10000.
2020-04-24 01:49:44
129.211.20.61 attack
SSH Brute Force
2020-04-24 02:09:34
14.160.39.138 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-04-24 02:00:00
179.107.84.18 attack
Unauthorized connection attempt from IP address 179.107.84.18 on Port 445(SMB)
2020-04-24 01:44:42
94.214.176.220 attackbots
Attempted connection to port 37215.
2020-04-24 01:38:44
180.105.216.88 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-04-24 01:32:55
171.4.241.229 attackbotsspam
Unauthorized connection attempt from IP address 171.4.241.229 on Port 445(SMB)
2020-04-24 01:54:38
103.40.240.222 attackspam
ECShop Remote Code Execution Vulnerability
2020-04-24 01:33:18
123.203.37.50 attackspambots
Attempted connection to port 5555.
2020-04-24 01:51:16
52.167.224.118 attack
RDP Bruteforce
2020-04-24 01:45:57
1.222.126.235 attackbotsspam
Unauthorized connection attempt detected from IP address 1.222.126.235 to port 445 [T]
2020-04-24 02:02:17
106.12.89.160 attackspam
SSH bruteforce
2020-04-24 01:55:28
42.118.145.74 attackspam
Unauthorized connection attempt from IP address 42.118.145.74 on Port 445(SMB)
2020-04-24 02:06:43
192.241.238.51 attack
RPC Portmapper DUMP Request Detected
2020-04-24 01:34:57
5.45.69.188 attackbotsspam
Dear Sir / Madam, 

Yesterday, my close friend (Simona Simova) was contacted via fake Facebook profile to be informed that she has a profile on a escort website. While researching via the German phone number used in the advert, we have came across more ads. These profiles are created without her permission and she is now very upset. 

Here is a list of the profiles we have found: 

- https://escortsitesofia.com/de/eleonora-7/ (5.45.69.188)
- https://escortsitesofia.com/de/sia-9/ (5.45.69.188)


We have already hired a lawyer in Germany who will escalate the issue to the authorities.
2020-04-24 02:07:12

Recently Reported IPs

37.85.44.255 97.84.33.129 156.93.16.135 87.79.249.204
190.227.12.212 104.234.21.98 125.160.154.42 145.147.255.99
197.120.252.25 64.21.170.202 83.80.22.111 57.22.200.104
19.108.246.52 180.165.247.176 158.62.48.100 224.77.204.47
160.186.64.163 133.157.231.29 166.240.44.51 169.22.213.129