Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
141.8.192.132 spamattack
Phishing
2024-01-10 13:51:57
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.8.192.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.8.192.40.			IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:17:27 CST 2022
;; MSG SIZE  rcvd: 105
Host info
40.192.8.141.in-addr.arpa domain name pointer amber.from.sh.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.192.8.141.in-addr.arpa	name = amber.from.sh.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.72.210.140 attackbotsspam
148.72.210.140 - - \[24/Jul/2020:09:27:04 +0200\] "POST /wp-login.php HTTP/1.0" 200 6400 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
148.72.210.140 - - \[24/Jul/2020:09:27:07 +0200\] "POST /wp-login.php HTTP/1.0" 200 6267 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
148.72.210.140 - - \[24/Jul/2020:09:27:10 +0200\] "POST /wp-login.php HTTP/1.0" 200 6263 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-24 16:01:26
104.243.41.97 attack
Jul 24 10:06:50 buvik sshd[30743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.41.97
Jul 24 10:06:52 buvik sshd[30743]: Failed password for invalid user yang from 104.243.41.97 port 43668 ssh2
Jul 24 10:09:22 buvik sshd[31176]: Invalid user dennis from 104.243.41.97
...
2020-07-24 16:19:20
138.0.26.3 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-24 16:01:48
49.232.87.218 attack
Jul 24 07:42:57 mail sshd[10758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.87.218
Jul 24 07:42:59 mail sshd[10758]: Failed password for invalid user glavbuh from 49.232.87.218 port 46222 ssh2
...
2020-07-24 15:43:41
118.69.161.67 attackspam
Bruteforce detected by fail2ban
2020-07-24 16:16:16
178.71.214.163 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-24 15:57:28
106.246.92.234 attackspam
SSH Brute Force
2020-07-24 16:20:24
157.245.104.19 attackbots
Brute force SMTP login attempted.
...
2020-07-24 16:14:03
92.50.249.166 attackbots
2020-07-24T07:30:19.894740shield sshd\[827\]: Invalid user nn from 92.50.249.166 port 53692
2020-07-24T07:30:19.904928shield sshd\[827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166
2020-07-24T07:30:21.902066shield sshd\[827\]: Failed password for invalid user nn from 92.50.249.166 port 53692 ssh2
2020-07-24T07:34:45.878350shield sshd\[1684\]: Invalid user sye from 92.50.249.166 port 37902
2020-07-24T07:34:45.886875shield sshd\[1684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166
2020-07-24 16:21:42
91.191.193.92 attackspambots
Port Scan
...
2020-07-24 16:12:17
206.189.88.253 attackspam
 TCP (SYN) 206.189.88.253:51782 -> port 18070, len 44
2020-07-24 15:54:33
94.25.174.242 attackspam
1595567946 - 07/24/2020 07:19:06 Host: 94.25.174.242/94.25.174.242 Port: 445 TCP Blocked
2020-07-24 15:52:41
35.160.213.76 attack
35.160.213.76 - - [24/Jul/2020:06:18:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.160.213.76 - - [24/Jul/2020:06:18:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.160.213.76 - - [24/Jul/2020:06:18:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2400 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-24 16:15:55
124.204.65.82 attack
"Unauthorized connection attempt on SSHD detected"
2020-07-24 16:02:15
111.67.206.115 attackspambots
2020-07-24T10:11:09.087970vps751288.ovh.net sshd\[9528\]: Invalid user temp from 111.67.206.115 port 54034
2020-07-24T10:11:09.093847vps751288.ovh.net sshd\[9528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.206.115
2020-07-24T10:11:10.764567vps751288.ovh.net sshd\[9528\]: Failed password for invalid user temp from 111.67.206.115 port 54034 ssh2
2020-07-24T10:18:12.235669vps751288.ovh.net sshd\[9552\]: Invalid user cable from 111.67.206.115 port 37396
2020-07-24T10:18:12.243670vps751288.ovh.net sshd\[9552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.206.115
2020-07-24 16:18:27

Recently Reported IPs

141.8.192.37 141.8.192.31 141.8.192.28 141.8.192.49
141.8.192.54 141.8.192.46 141.8.192.58 141.8.192.64
141.8.192.68 141.8.192.60 141.8.192.72 141.8.192.88
141.8.192.76 141.8.192.86 141.8.192.74 141.8.192.93
141.8.192.98 141.8.193.103 141.8.193.176 141.8.193.145