Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Karlsruhe

Region: Baden-Württemberg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.3.94.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.3.94.239.			IN	A

;; AUTHORITY SECTION:
.			437	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060701 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 08 07:31:10 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 239.94.3.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.94.3.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.195.160.147 attackspambots
Jul  5 06:06:30 tanzim-HP-Z238-Microtower-Workstation sshd\[13357\]: Invalid user service from 78.195.160.147
Jul  5 06:06:30 tanzim-HP-Z238-Microtower-Workstation sshd\[13357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.195.160.147
Jul  5 06:06:33 tanzim-HP-Z238-Microtower-Workstation sshd\[13357\]: Failed password for invalid user service from 78.195.160.147 port 36880 ssh2
...
2019-07-05 12:56:46
54.38.182.156 attackbots
Jul  5 02:10:56 mail sshd\[20028\]: Invalid user grafana from 54.38.182.156 port 42422
Jul  5 02:10:56 mail sshd\[20028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.182.156
Jul  5 02:10:59 mail sshd\[20028\]: Failed password for invalid user grafana from 54.38.182.156 port 42422 ssh2
Jul  5 02:13:08 mail sshd\[20318\]: Invalid user adminuser from 54.38.182.156 port 39614
Jul  5 02:13:08 mail sshd\[20318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.182.156
2019-07-05 13:21:07
134.209.196.169 attack
WordPress wp-login brute force :: 134.209.196.169 0.164 BYPASS [05/Jul/2019:13:20:34  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-05 13:16:06
218.4.163.146 attackbots
Jul  5 01:10:55 localhost sshd\[28823\]: Invalid user soporte from 218.4.163.146
Jul  5 01:10:55 localhost sshd\[28823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.163.146
Jul  5 01:10:57 localhost sshd\[28823\]: Failed password for invalid user soporte from 218.4.163.146 port 54237 ssh2
Jul  5 01:12:48 localhost sshd\[28834\]: Invalid user test from 218.4.163.146
Jul  5 01:12:48 localhost sshd\[28834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.163.146
...
2019-07-05 13:26:36
116.89.53.66 attackbots
Jul  5 00:46:25 lnxweb62 sshd[11444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.89.53.66
2019-07-05 13:28:57
109.70.100.19 attackspam
Automatic report - Web App Attack
2019-07-05 12:58:03
88.88.193.230 attack
Jul  5 05:40:06 * sshd[16876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.88.193.230
Jul  5 05:40:08 * sshd[16876]: Failed password for invalid user gz from 88.88.193.230 port 40649 ssh2
2019-07-05 12:54:33
81.192.8.14 attack
Jul  5 09:43:31 martinbaileyphotography sshd\[10976\]: Invalid user admin from 81.192.8.14 port 55610
Jul  5 09:43:33 martinbaileyphotography sshd\[10976\]: Failed password for invalid user admin from 81.192.8.14 port 55610 ssh2
Jul  5 09:47:23 martinbaileyphotography sshd\[11115\]: Invalid user pk from 81.192.8.14 port 41662
Jul  5 09:47:25 martinbaileyphotography sshd\[11115\]: Failed password for invalid user pk from 81.192.8.14 port 41662 ssh2
Jul  5 09:49:44 martinbaileyphotography sshd\[11190\]: Invalid user rtkit from 81.192.8.14 port 39098
...
2019-07-05 13:12:25
178.238.225.175 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-07-05 13:16:30
111.231.204.229 attackspam
Jul  5 00:46:33 server sshd[25744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.204.229
...
2019-07-05 13:27:29
218.148.117.203 attackbots
DATE:2019-07-05_00:45:37, IP:218.148.117.203, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-05 13:48:21
203.99.184.247 attackspambots
RDP Bruteforce
2019-07-05 13:21:37
35.234.99.107 attackbotsspam
05.07.2019 02:49:34 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-07-05 13:23:51
77.41.96.108 attackspam
Automatic report - Web App Attack
2019-07-05 13:42:43
31.210.65.150 attackbots
2019-07-05T01:33:32.386951scmdmz1 sshd\[23278\]: Invalid user fei from 31.210.65.150 port 57203
2019-07-05T01:33:32.391267scmdmz1 sshd\[23278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.65.150
2019-07-05T01:33:34.624909scmdmz1 sshd\[23278\]: Failed password for invalid user fei from 31.210.65.150 port 57203 ssh2
...
2019-07-05 13:00:06

Recently Reported IPs

187.48.172.174 97.252.30.179 172.45.222.24 208.93.58.81
180.155.239.195 95.167.242.98 78.220.229.12 220.137.195.129
202.92.126.175 101.151.122.230 193.225.197.199 90.23.251.9
83.80.116.223 70.115.56.179 175.39.133.182 151.30.253.128
97.199.95.181 32.190.208.129 179.227.218.69 196.141.32.47