Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.39.229.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50645
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.39.229.57.			IN	A

;; AUTHORITY SECTION:
.			409	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:17:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
57.229.39.141.in-addr.arpa domain name pointer katalog.ub.uni-leipzig.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.229.39.141.in-addr.arpa	name = katalog.ub.uni-leipzig.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.129.141.30 attack
Dec 24 08:11:37 tuxlinux sshd[56825]: Invalid user admin from 183.129.141.30 port 53946
Dec 24 08:11:37 tuxlinux sshd[56825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.129.141.30 
Dec 24 08:11:37 tuxlinux sshd[56825]: Invalid user admin from 183.129.141.30 port 53946
Dec 24 08:11:37 tuxlinux sshd[56825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.129.141.30 
Dec 24 08:11:37 tuxlinux sshd[56825]: Invalid user admin from 183.129.141.30 port 53946
Dec 24 08:11:37 tuxlinux sshd[56825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.129.141.30 
Dec 24 08:11:39 tuxlinux sshd[56825]: Failed password for invalid user admin from 183.129.141.30 port 53946 ssh2
...
2019-12-24 23:26:17
46.38.144.57 attackbotsspam
SASL broute force
2019-12-24 23:37:58
188.131.169.24 attack
Dec 24 14:17:15 XXX sshd[24505]: Invalid user steven from 188.131.169.24 port 57216
2019-12-24 23:10:23
185.183.107.167 attackspambots
Automatic report - Windows Brute-Force Attack
2019-12-24 23:36:14
198.57.203.54 attackspambots
Automatic report - Banned IP Access
2019-12-24 23:28:22
218.92.0.172 attackspambots
Dec 24 16:36:23 dedicated sshd[1290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Dec 24 16:36:25 dedicated sshd[1290]: Failed password for root from 218.92.0.172 port 19264 ssh2
2019-12-24 23:44:01
190.255.39.38 attack
12/24/2019-13:22:54.916989 190.255.39.38 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-24 23:33:03
167.172.207.135 attackbots
TCP src-port=42550   dst-port=25   Listed on   barracuda rbldns-ru       (Project Honey Pot rated Suspicious)   (200)
2019-12-24 23:26:49
189.89.9.187 attack
Port 22 Scan, PTR: None
2019-12-24 23:11:20
185.209.0.32 attackbotsspam
firewall-block, port(s): 5333/tcp, 5444/tcp, 5505/tcp, 5599/tcp, 5606/tcp, 5700/tcp, 5750/tcp, 5808/tcp, 6002/tcp, 6007/tcp
2019-12-24 23:46:22
185.153.197.161 attack
Automatic report - Port Scan
2019-12-24 23:12:39
51.68.192.106 attack
Unauthorized connection attempt detected from IP address 51.68.192.106 to port 22
2019-12-24 23:39:50
112.64.32.118 attackspam
$f2bV_matches
2019-12-24 23:22:22
63.80.189.137 attackspam
$f2bV_matches
2019-12-24 23:33:48
218.92.0.158 attackspam
Dec 24 16:36:10 163-172-32-151 sshd[24026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Dec 24 16:36:12 163-172-32-151 sshd[24026]: Failed password for root from 218.92.0.158 port 14483 ssh2
...
2019-12-24 23:50:10

Recently Reported IPs

141.3.128.6 141.35.213.147 141.38.3.62 141.39.250.245
141.44.7.111 141.38.3.28 141.45.66.214 141.51.171.174
141.51.171.175 141.52.79.134 141.54.1.34 141.48.4.230
141.57.5.211 141.55.192.190 141.64.5.76 141.6.3.25
141.58.125.71 141.66.192.14 141.66.194.2 141.66.194.8