Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.55.136.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.55.136.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 20:58:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
131.136.55.141.in-addr.arpa domain name pointer tier-a-ipmi.me.hs-mittweida.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.136.55.141.in-addr.arpa	name = tier-a-ipmi.me.hs-mittweida.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
50.53.181.112 attackspam
Automatic report - SSH Brute-Force Attack
2020-02-10 23:28:14
106.13.55.24 attackbotsspam
Feb 10 15:46:04 MK-Soft-Root2 sshd[23726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.55.24 
Feb 10 15:46:06 MK-Soft-Root2 sshd[23726]: Failed password for invalid user ydr from 106.13.55.24 port 47238 ssh2
...
2020-02-10 23:06:48
195.154.119.48 attack
detected by Fail2Ban
2020-02-10 23:34:52
5.172.14.241 attack
Feb 10 10:31:09 plusreed sshd[22686]: Invalid user fqu from 5.172.14.241
...
2020-02-10 23:34:04
82.79.34.26 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-10 23:20:14
83.102.172.104 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-10 23:15:17
3.104.156.83 attackbots
$f2bV_matches
2020-02-10 23:31:14
219.143.126.173 attack
ICMP MH Probe, Scan /Distributed -
2020-02-10 23:14:33
123.200.26.202 attackbots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-10 23:08:31
183.228.105.128 attack
Automatic report - Port Scan
2020-02-10 23:11:08
61.84.196.50 attackbotsspam
Feb 10 15:22:03 cp sshd[23501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50
2020-02-10 23:09:04
68.183.236.29 attack
Feb 10 15:57:42 legacy sshd[20684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
Feb 10 15:57:44 legacy sshd[20684]: Failed password for invalid user bvf from 68.183.236.29 port 42932 ssh2
Feb 10 16:01:13 legacy sshd[20981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
...
2020-02-10 23:20:56
218.22.129.38 attackspambots
Brute force attempt
2020-02-10 23:29:30
219.143.126.0 attackspam
ICMP MH Probe, Scan /Distributed -
2020-02-10 23:40:03
185.73.113.89 attackbotsspam
Feb 10 15:53:51 mout sshd[15526]: Invalid user ckx from 185.73.113.89 port 57840
2020-02-10 23:35:41

Recently Reported IPs

203.112.118.118 212.154.46.212 83.215.21.229 166.205.216.12
72.216.57.81 80.28.85.119 131.46.20.254 188.187.61.168
137.49.189.40 229.71.113.199 117.138.207.35 214.229.115.181
23.167.67.150 132.118.17.195 93.148.106.34 156.23.23.172
201.251.84.113 166.49.7.186 242.214.90.215 59.194.93.155