Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jena

Region: Thüringen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.35.67.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.35.67.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:43:08 CST 2025
;; MSG SIZE  rcvd: 105
Host info
30.67.35.141.in-addr.arpa domain name pointer n230001.mti.uni-jena.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.67.35.141.in-addr.arpa	name = n230001.mti.uni-jena.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.233.143.219 attackspam
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2020-01-23 15:25:07
222.186.175.140 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Failed password for root from 222.186.175.140 port 56472 ssh2
Failed password for root from 222.186.175.140 port 56472 ssh2
Failed password for root from 222.186.175.140 port 56472 ssh2
Failed password for root from 222.186.175.140 port 56472 ssh2
2020-01-23 15:40:30
89.212.162.78 attack
SSH invalid-user multiple login attempts
2020-01-23 15:17:15
139.199.80.67 attackspambots
Unauthorized connection attempt detected from IP address 139.199.80.67 to port 2220 [J]
2020-01-23 15:25:32
111.230.223.94 attackbotsspam
Unauthorized connection attempt detected from IP address 111.230.223.94 to port 2220 [J]
2020-01-23 15:22:55
103.107.105.7 attackbots
Invalid user daniel from 103.107.105.7 port 60058
2020-01-23 15:42:16
192.241.202.169 attack
Unauthorized connection attempt detected from IP address 192.241.202.169 to port 2220 [J]
2020-01-23 15:25:48
211.23.125.95 attackspam
Jan 16 11:48:32 host sshd[31196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-23-125-95.hinet-ip.hinet.net  user=root
Jan 16 11:48:33 host sshd[31196]: Failed password for root from 211.23.125.95 port 34130 ssh2
...
2020-01-23 15:23:17
45.143.222.145 attackspam
Attempts against SMTP/SSMTP
2020-01-23 15:45:45
172.111.134.20 attackspambots
Jan 22 07:09:06 php1 sshd\[15492\]: Invalid user system from 172.111.134.20
Jan 22 07:09:06 php1 sshd\[15492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.111.134.20
Jan 22 07:09:08 php1 sshd\[15492\]: Failed password for invalid user system from 172.111.134.20 port 57958 ssh2
Jan 22 07:12:45 php1 sshd\[15982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.111.134.20  user=root
Jan 22 07:12:48 php1 sshd\[15982\]: Failed password for root from 172.111.134.20 port 56828 ssh2
2020-01-23 15:39:49
113.28.150.75 attackbotsspam
Invalid user deploy2 from 113.28.150.75 port 62209
2020-01-23 15:50:05
123.56.253.170 attack
Fail2Ban Ban Triggered
2020-01-23 15:28:14
117.121.97.115 attackspambots
Unauthorized connection attempt detected from IP address 117.121.97.115 to port 2220 [J]
2020-01-23 15:18:33
68.183.110.49 attackspam
Invalid user kate from 68.183.110.49 port 51446
2020-01-23 15:11:50
158.69.204.215 attackspam
Jan 23 08:23:44 lnxded63 sshd[13881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.204.215
Jan 23 08:23:44 lnxded63 sshd[13881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.204.215
2020-01-23 15:29:18

Recently Reported IPs

168.247.1.132 131.65.224.136 83.181.85.152 188.128.151.145
94.3.163.194 253.70.104.219 55.225.43.208 204.242.194.48
18.184.88.4 211.100.185.44 62.140.10.83 201.205.97.249
135.133.211.212 31.29.112.123 192.167.63.55 231.111.179.15
156.165.201.91 45.238.93.9 239.42.139.21 249.239.169.124