Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.72.131.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.72.131.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:42:39 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.131.72.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.131.72.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.165.254.218 attackspam
2019-09-04T15:09:29.412709mail01 postfix/smtpd[23809]: warning: unknown[61.165.254.218]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-04T15:09:38.240650mail01 postfix/smtpd[23809]: warning: unknown[61.165.254.218]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-04T15:09:50.267759mail01 postfix/smtpd[23809]: warning: unknown[61.165.254.218]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-05 00:26:30
127.0.0.1 attackbotsspam
Test Connectivity
2019-09-05 00:25:58
167.71.217.110 attackspambots
Sep  4 06:09:37 kapalua sshd\[6923\]: Invalid user user from 167.71.217.110
Sep  4 06:09:37 kapalua sshd\[6923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.110
Sep  4 06:09:39 kapalua sshd\[6923\]: Failed password for invalid user user from 167.71.217.110 port 39272 ssh2
Sep  4 06:17:02 kapalua sshd\[7682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.110  user=root
Sep  4 06:17:05 kapalua sshd\[7682\]: Failed password for root from 167.71.217.110 port 43914 ssh2
2019-09-05 00:17:13
91.121.211.59 attackspambots
$f2bV_matches
2019-09-05 00:10:13
167.71.14.214 attack
Sep  4 12:15:36 plusreed sshd[19181]: Invalid user johanna from 167.71.14.214
...
2019-09-05 00:17:40
49.88.112.90 attackspambots
Sep  4 11:54:41 plusreed sshd[13883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
Sep  4 11:54:43 plusreed sshd[13883]: Failed password for root from 49.88.112.90 port 48168 ssh2
...
2019-09-04 23:57:41
27.208.133.58 attack
Sep  4 03:09:56 kapalua sshd\[21127\]: Invalid user admin from 27.208.133.58
Sep  4 03:09:56 kapalua sshd\[21127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.208.133.58
Sep  4 03:09:58 kapalua sshd\[21127\]: Failed password for invalid user admin from 27.208.133.58 port 39090 ssh2
Sep  4 03:10:01 kapalua sshd\[21127\]: Failed password for invalid user admin from 27.208.133.58 port 39090 ssh2
Sep  4 03:10:03 kapalua sshd\[21127\]: Failed password for invalid user admin from 27.208.133.58 port 39090 ssh2
2019-09-05 00:00:53
106.75.55.123 attack
Sep  4 15:09:31 icinga sshd[14792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.55.123
Sep  4 15:09:33 icinga sshd[14792]: Failed password for invalid user mark1 from 106.75.55.123 port 53598 ssh2
...
2019-09-05 00:52:29
88.234.142.53 attackspam
60001/tcp
[2019-09-04]1pkt
2019-09-05 00:13:13
5.199.130.188 attackspam
2019-09-04T17:33:12.480544lon01.zurich-datacenter.net sshd\[15820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor.piratenpartei-nrw.de  user=root
2019-09-04T17:33:14.579823lon01.zurich-datacenter.net sshd\[15820\]: Failed password for root from 5.199.130.188 port 38147 ssh2
2019-09-04T17:33:16.848900lon01.zurich-datacenter.net sshd\[15820\]: Failed password for root from 5.199.130.188 port 38147 ssh2
2019-09-04T17:33:20.575972lon01.zurich-datacenter.net sshd\[15820\]: Failed password for root from 5.199.130.188 port 38147 ssh2
2019-09-04T17:33:23.189729lon01.zurich-datacenter.net sshd\[15820\]: Failed password for root from 5.199.130.188 port 38147 ssh2
...
2019-09-04 23:50:49
119.146.145.104 attackbotsspam
Sep  4 15:34:09 mail sshd\[23397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104
Sep  4 15:34:10 mail sshd\[23397\]: Failed password for invalid user lukas from 119.146.145.104 port 4896 ssh2
Sep  4 15:38:38 mail sshd\[24089\]: Invalid user wp from 119.146.145.104 port 4897
Sep  4 15:38:38 mail sshd\[24089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104
Sep  4 15:38:40 mail sshd\[24089\]: Failed password for invalid user wp from 119.146.145.104 port 4897 ssh2
2019-09-05 00:19:25
113.186.187.225 attackbotsspam
445/tcp
[2019-09-04]1pkt
2019-09-05 00:28:12
66.8.205.220 attackbotsspam
Sep  4 17:59:08 dedicated sshd[27517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.8.205.220  user=root
Sep  4 17:59:10 dedicated sshd[27517]: Failed password for root from 66.8.205.220 port 58276 ssh2
2019-09-05 00:15:18
45.115.232.23 attackspam
firewall-block, port(s): 3389/tcp
2019-09-04 23:56:09
185.220.102.7 attack
Sep  4 18:03:11 minden010 sshd[31028]: Failed password for root from 185.220.102.7 port 34637 ssh2
Sep  4 18:03:21 minden010 sshd[31028]: Failed password for root from 185.220.102.7 port 34637 ssh2
Sep  4 18:03:24 minden010 sshd[31028]: Failed password for root from 185.220.102.7 port 34637 ssh2
Sep  4 18:03:24 minden010 sshd[31028]: error: maximum authentication attempts exceeded for root from 185.220.102.7 port 34637 ssh2 [preauth]
...
2019-09-05 00:23:29

Recently Reported IPs

103.33.186.66 245.102.227.84 90.83.21.1 108.246.206.24
162.178.99.245 252.15.113.144 49.213.104.101 236.18.58.137
130.58.84.172 5.214.102.117 5.200.92.92 68.117.77.91
180.243.249.237 86.56.152.166 232.85.248.167 57.84.229.250
140.145.119.9 104.146.87.94 63.86.162.211 38.147.162.108