Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.42.194.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.42.194.100.			IN	A

;; AUTHORITY SECTION:
.			273	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 02:50:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 100.194.42.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.194.42.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.117.195 attackbotsspam
Lines containing failures of 106.12.117.195
Jun  3 12:08:21 keyhelp sshd[32465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.117.195  user=r.r
Jun  3 12:08:23 keyhelp sshd[32465]: Failed password for r.r from 106.12.117.195 port 35002 ssh2
Jun  3 12:08:23 keyhelp sshd[32465]: Received disconnect from 106.12.117.195 port 35002:11: Bye Bye [preauth]
Jun  3 12:08:23 keyhelp sshd[32465]: Disconnected from authenticating user r.r 106.12.117.195 port 35002 [preauth]
Jun  3 12:18:13 keyhelp sshd[1780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.117.195  user=r.r
Jun  3 12:18:15 keyhelp sshd[1780]: Failed password for r.r from 106.12.117.195 port 43220 ssh2
Jun  3 12:18:15 keyhelp sshd[1780]: Received disconnect from 106.12.117.195 port 43220:11: Bye Bye [preauth]
Jun  3 12:18:15 keyhelp sshd[1780]: Disconnected from authenticating user r.r 106.12.117.195 port 43220 [preauth]

........
------------------------------
2020-06-04 03:35:37
193.112.163.159 attackbots
detected by Fail2Ban
2020-06-04 03:21:04
196.52.43.85 attack
Honeypot hit.
2020-06-04 03:51:17
142.93.103.141 attackspam
Jun  3 07:55:58 server1 sshd\[24401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
Jun  3 07:56:00 server1 sshd\[24401\]: Failed password for root from 142.93.103.141 port 38182 ssh2
Jun  3 07:59:34 server1 sshd\[25866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
Jun  3 07:59:36 server1 sshd\[25866\]: Failed password for root from 142.93.103.141 port 43072 ssh2
Jun  3 08:03:06 server1 sshd\[27075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
...
2020-06-04 03:23:56
145.255.21.151 attackbots
Port probing on unauthorized port 445
2020-06-04 03:38:39
189.90.255.108 attack
Jun  3 16:43:24 ws12vmsma01 sshd[10890]: Failed password for root from 189.90.255.108 port 50264 ssh2
Jun  3 16:46:34 ws12vmsma01 sshd[11489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-189-90-255-108.isp.valenet.com.br  user=root
Jun  3 16:46:37 ws12vmsma01 sshd[11489]: Failed password for root from 189.90.255.108 port 50802 ssh2
...
2020-06-04 03:47:40
78.171.62.226 attackbotsspam
xmlrpc attack
2020-06-04 03:34:17
49.233.182.23 attackbots
5x Failed Password
2020-06-04 03:50:23
104.89.124.168 attack
Intrusion Prevention packet dropped  port 80 (http) proto 6 (tcp)       Listed on    rbldns-ru also spfbl-net   (156)
2020-06-04 03:44:05
217.165.22.147 attack
Jun  3 14:50:46 sso sshd[23307]: Failed password for root from 217.165.22.147 port 51820 ssh2
...
2020-06-04 03:28:49
51.79.66.198 attackspam
Jun  3 20:58:42  sshd\[21690\]: User root from 198.ip-51-79-66.net not allowed because not listed in AllowUsersJun  3 20:58:44  sshd\[21690\]: Failed password for invalid user root from 51.79.66.198 port 44032 ssh2
...
2020-06-04 03:45:34
34.242.233.98 attackbots
34.242.233.98 - - [03/Jun/2020:13:46:55 +0200] "GET /wp-login.php HTTP/1.1" 200 6106 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.242.233.98 - - [03/Jun/2020:13:46:57 +0200] "POST /wp-login.php HTTP/1.1" 200 6390 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.242.233.98 - - [03/Jun/2020:13:46:58 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-04 03:53:22
222.186.180.6 attackspam
Jun  3 21:45:10 server sshd[30482]: Failed none for root from 222.186.180.6 port 8524 ssh2
Jun  3 21:45:12 server sshd[30482]: Failed password for root from 222.186.180.6 port 8524 ssh2
Jun  3 21:45:17 server sshd[30482]: Failed password for root from 222.186.180.6 port 8524 ssh2
2020-06-04 03:54:56
87.251.74.141 attack
Jun  3 21:10:39 debian-2gb-nbg1-2 kernel: \[13470200.952542\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.141 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=36035 PROTO=TCP SPT=55115 DPT=8639 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-04 03:28:34
154.221.30.108 attackbotsspam
Jun  3 19:35:58 MainVPS sshd[1159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.30.108  user=root
Jun  3 19:35:59 MainVPS sshd[1159]: Failed password for root from 154.221.30.108 port 35300 ssh2
Jun  3 19:41:05 MainVPS sshd[5593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.30.108  user=root
Jun  3 19:41:07 MainVPS sshd[5593]: Failed password for root from 154.221.30.108 port 55636 ssh2
Jun  3 19:44:48 MainVPS sshd[8802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.30.108  user=root
Jun  3 19:44:50 MainVPS sshd[8802]: Failed password for root from 154.221.30.108 port 60372 ssh2
...
2020-06-04 03:49:21

Recently Reported IPs

54.160.174.19 13.238.14.166 25.4.68.112 168.104.67.170
250.154.39.185 128.249.15.17 18.222.209.41 159.0.142.163
74.26.89.56 72.211.243.18 53.215.99.248 21.196.55.147
197.234.146.38 77.163.221.8 184.68.142.234 132.44.43.68
110.20.75.108 75.211.86.235 163.93.125.97 175.60.149.138