Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: BASF Business Services GmbH

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.6.43.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53372
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.6.43.71.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 13 02:19:24 CST 2019
;; MSG SIZE  rcvd: 115
Host info
71.43.6.141.in-addr.arpa has no PTR record
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 71.43.6.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.184.42.217 attackspam
2020-03-10T05:13:46.111259shield sshd\[30501\]: Invalid user liuchuang from 123.184.42.217 port 51718
2020-03-10T05:13:46.120979shield sshd\[30501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.184.42.217
2020-03-10T05:13:47.762398shield sshd\[30501\]: Failed password for invalid user liuchuang from 123.184.42.217 port 51718 ssh2
2020-03-10T05:15:55.874388shield sshd\[30768\]: Invalid user test4 from 123.184.42.217 port 47212
2020-03-10T05:15:55.883106shield sshd\[30768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.184.42.217
2020-03-10 13:22:37
185.220.182.70 attack
Mar 10 07:09:14 pkdns2 sshd\[56813\]: Invalid user developer from 185.220.182.70Mar 10 07:09:16 pkdns2 sshd\[56813\]: Failed password for invalid user developer from 185.220.182.70 port 53150 ssh2Mar 10 07:13:38 pkdns2 sshd\[56992\]: Invalid user ace from 185.220.182.70Mar 10 07:13:40 pkdns2 sshd\[56992\]: Failed password for invalid user ace from 185.220.182.70 port 41202 ssh2Mar 10 07:17:59 pkdns2 sshd\[57189\]: Invalid user act-ftp from 185.220.182.70Mar 10 07:18:01 pkdns2 sshd\[57189\]: Failed password for invalid user act-ftp from 185.220.182.70 port 57494 ssh2
...
2020-03-10 13:18:20
62.171.139.59 attack
Mar 10 06:12:04 silence02 sshd[3236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.171.139.59
Mar 10 06:12:06 silence02 sshd[3236]: Failed password for invalid user centos from 62.171.139.59 port 44078 ssh2
Mar 10 06:14:51 silence02 sshd[3412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.171.139.59
2020-03-10 13:16:35
132.148.129.180 attackspambots
Mar 10 06:29:52 lnxweb62 sshd[14191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.129.180
Mar 10 06:29:53 lnxweb62 sshd[14191]: Failed password for invalid user fabriefijen from 132.148.129.180 port 40828 ssh2
Mar 10 06:33:12 lnxweb62 sshd[15900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.129.180
2020-03-10 13:58:52
218.92.0.145 attackbotsspam
Mar 10 06:25:59 nextcloud sshd\[10091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Mar 10 06:26:01 nextcloud sshd\[10091\]: Failed password for root from 218.92.0.145 port 46297 ssh2
Mar 10 06:26:05 nextcloud sshd\[10091\]: Failed password for root from 218.92.0.145 port 46297 ssh2
2020-03-10 13:40:25
142.93.122.58 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-10 13:20:25
61.177.172.158 attackspambots
2020-03-10T05:18:05.267787shield sshd\[31022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2020-03-10T05:18:07.130328shield sshd\[31022\]: Failed password for root from 61.177.172.158 port 42765 ssh2
2020-03-10T05:18:08.849209shield sshd\[31022\]: Failed password for root from 61.177.172.158 port 42765 ssh2
2020-03-10T05:18:11.175062shield sshd\[31022\]: Failed password for root from 61.177.172.158 port 42765 ssh2
2020-03-10T05:21:32.511627shield sshd\[31513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2020-03-10 13:21:44
222.186.42.155 attackspambots
Mar 10 06:22:48 markkoudstaal sshd[26658]: Failed password for root from 222.186.42.155 port 43736 ssh2
Mar 10 06:22:52 markkoudstaal sshd[26658]: Failed password for root from 222.186.42.155 port 43736 ssh2
Mar 10 06:22:53 markkoudstaal sshd[26658]: Failed password for root from 222.186.42.155 port 43736 ssh2
2020-03-10 13:29:26
222.186.180.147 attackspam
Mar 10 05:11:20 combo sshd[31497]: Failed password for root from 222.186.180.147 port 61406 ssh2
Mar 10 05:11:24 combo sshd[31497]: Failed password for root from 222.186.180.147 port 61406 ssh2
Mar 10 05:11:27 combo sshd[31497]: Failed password for root from 222.186.180.147 port 61406 ssh2
...
2020-03-10 13:33:37
92.221.145.57 attackbots
20 attempts against mh-misbehave-ban on pluto
2020-03-10 13:42:34
88.147.99.13 attackspambots
Automatic report - Port Scan Attack
2020-03-10 13:29:54
167.114.98.96 attack
$f2bV_matches
2020-03-10 13:54:54
51.158.120.115 attackbots
Mar 10 04:54:25 ns381471 sshd[13525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.120.115
Mar 10 04:54:27 ns381471 sshd[13525]: Failed password for invalid user app from 51.158.120.115 port 39658 ssh2
2020-03-10 13:37:02
103.94.6.69 attackbotsspam
Mar 10 09:51:15 gw1 sshd[15557]: Failed password for root from 103.94.6.69 port 60162 ssh2
...
2020-03-10 13:31:04
159.89.139.228 attackspambots
Mar 10 05:56:07 * sshd[32388]: Failed password for root from 159.89.139.228 port 38032 ssh2
2020-03-10 13:50:11

Recently Reported IPs

63.201.13.245 178.58.31.73 39.240.201.29 73.201.142.187
1.45.74.79 176.57.70.20 141.53.153.249 128.9.0.129
41.146.33.57 55.22.233.72 133.30.3.208 35.207.3.244
204.56.151.191 86.136.219.107 74.121.242.170 23.249.163.136
35.180.124.236 1.188.186.85 58.153.51.174 191.5.225.74