Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.56.42.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.56.42.35.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 22:31:32 CST 2025
;; MSG SIZE  rcvd: 105
Host info
35.42.56.141.in-addr.arpa domain name pointer dhio-t-as1-b.verwaltung.htw-dresden.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
35.42.56.141.in-addr.arpa	name = dhio-t-as1-b.verwaltung.htw-dresden.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.71.167.165 attackspam
223.71.167.165 was recorded 6 times by 2 hosts attempting to connect to the following ports: 389,8883,9711,40000,1962. Incident counter (4h, 24h, all-time): 6, 55, 26947
2020-08-27 04:05:34
142.44.181.182 attackbotsspam
From: Sally Potter  (***SPAM*** Highly Effective Anti-Pollution Clean Air Breathing Mask)
 --_=_swift_v4_1598443264_4b4dae2d7edfd31e16303f9dcf67d396_=_
 Content-Type: text/plain; charset=utf-8
View full message

Report Spam to:
Re: 142.44.181.182 (Administrator of network where email originates)
 To: abuse@ovh.net (Notes)
 To: abuse@ovh.ca (Notes)
 To: noc@ovh.net (Notes)

Re: http://www.dkymedia.com/inter/index.php/campaig... (Administrator of network hosting website referenced in spam)
 To: noc@ovh.net (Notes)
 To: abuse@ovh.ca (Notes)
 To: abuse@ovh.net (Notes)
2020-08-27 03:48:52
113.31.107.34 attackspam
Aug 26 21:26:43 ip106 sshd[21297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.107.34 
Aug 26 21:26:46 ip106 sshd[21297]: Failed password for invalid user mqm from 113.31.107.34 port 46698 ssh2
...
2020-08-27 03:47:08
13.229.51.54 attackbots
Scanning
2020-08-27 04:07:30
202.164.130.83 attack
1598445186 - 08/26/2020 14:33:06 Host: 202.164.130.83/202.164.130.83 Port: 445 TCP Blocked
2020-08-27 04:09:11
198.57.27.65 attackbotsspam
Information Regarding Globe Life
2020-08-27 03:40:42
162.158.155.147 attackbots
Scanning
2020-08-27 04:10:41
80.254.120.190 attackbots
1598445215 - 08/26/2020 14:33:35 Host: 80.254.120.190/80.254.120.190 Port: 445 TCP Blocked
2020-08-27 03:48:20
122.116.240.165 attackbots
Unwanted checking 80 or 443 port
...
2020-08-27 04:06:16
94.102.50.146 attackspam
firewall-block, port(s): 6443/tcp
2020-08-27 04:13:30
62.234.137.128 attackbots
2020-08-26T13:16:19.823404shield sshd\[25864\]: Invalid user delilah from 62.234.137.128 port 54488
2020-08-26T13:16:20.015399shield sshd\[25864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128
2020-08-26T13:16:22.237701shield sshd\[25864\]: Failed password for invalid user delilah from 62.234.137.128 port 54488 ssh2
2020-08-26T13:19:29.748530shield sshd\[26884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128  user=root
2020-08-26T13:19:31.584534shield sshd\[26884\]: Failed password for root from 62.234.137.128 port 60308 ssh2
2020-08-27 03:53:28
104.131.55.236 attack
2020-08-26T07:33:35.578818morrigan.ad5gb.com sshd[1361554]: Invalid user sinusbot from 104.131.55.236 port 39312
2020-08-26T07:33:38.340761morrigan.ad5gb.com sshd[1361554]: Failed password for invalid user sinusbot from 104.131.55.236 port 39312 ssh2
2020-08-27 03:46:22
37.252.83.53 attack
Automatic report - XMLRPC Attack
2020-08-27 04:12:10
94.228.182.244 attackspam
$f2bV_matches
2020-08-27 03:55:11
138.121.128.19 attackspam
SSH login attempts.
2020-08-27 04:12:52

Recently Reported IPs

36.52.80.90 48.136.122.249 245.167.134.227 159.33.103.168
163.56.100.78 163.26.117.227 217.100.52.234 222.129.95.203
169.66.156.208 35.69.196.158 148.213.226.130 56.52.129.73
36.13.42.107 245.209.84.126 249.207.190.143 70.202.54.226
212.208.227.123 149.213.225.49 8.113.28.134 175.203.195.233